About the security between Core Networks and Access networks(5GC -- RAN), (1) How a secure session is created? What do security needs - integrity & authentication only? (2) Does it use IPsec or DTLS? (3) Does the security session has a time latency limit? (4) What is the capacity of the devices used to create the secure session ?
About the security between Core Networks and Access networks(5GC -- RAN), (1) How a secure session is created? What do security needs - integrity & authentication only? (2) Does it use IPsec or DTLS? (3) Does the security session has a time latency limit? (4) What is the capacity of the devices used to create the secure session ?
?
Thank you Mr.Martin
Very good! Comprehensive and clear!
Thank you so much
Thanks a lot, a very beneficial video indeed
So Clear and comprehensive, Thank you Mr.Martin