ImageVerifierCode 换一换
格式:PDF , 页数:2 ,大小:440.91KB ,
资源ID:3041797      下载积分:2 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.wnwk.com/docdown/3041797.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(CISA-美国5G市场份额和风险分析简报(英文)-2019.8-1页.pdf)为本站会员(a****2)主动上传,蜗牛文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知蜗牛文库(发送邮件至admin@wnwk.com或直接QQ联系客服),我们立即给予删除!

CISA-美国5G市场份额和风险分析简报(英文)-2019.8-1页.pdf

1、MAJOR COMPONENTS OF 5G NETWORKINGField Programmable Gate Arrays(FPGA)Market Leaders(2017)11.US Intel2.US XilinxSmall Cell ChipsetMarket Leaders(2017)11.US Qualcomm2.US Intel3.CH HiSilicon4.EU NXP Semiconductor5.EU Ericsson6.US CaviumSmall Cell Power AmplifierMarket Leaders(2017)11.US Texas Instrumen

2、ts2.EU NXP Semiconductor3.US Qorvo4.US Broadcom5.US AnadigicsNetwork ProcessorMarket Leaders(2016)11.US Intel2.US Broadcom3.CH HiSilicon4.US Qualcomm5.US Texas InstrumentsServerMarket Leaders(2Q18)11.US Dell2.US HPE3.US IBM4.CH Lenovo5.CH InspurData Converter ChipMarket Leaders(2017)11.US Texas Inst

3、ruments2.US Analog DevicesEthernet Switch Chips Market Leaders(2015)11.US BroadcomSmall Cell Antenna ArrayMarket Leaders(2017)11.EU Alpha Wireless2.EU Ericsson3.US Galtronics 1Lewis,James.2018.“How Will 5G Shape Innovation and Security:A Primer.”Center for Strategic&International Studies.https:/csis

4、- May 2019.ADCThe Cybersecurity and Infrastructure Security Agency(CISA)/National Risk Management Center(NRMC)is the planning,analysis,and collaboration center working in close coordination with the critical infrastructure community to Identify;Analyze;Prioritize;and Manage the most strategic risks

5、to National Critical Functions.These are the functions of government and the private sector so vital to the United States that their disruption,corruption,or dysfunction would have a debilitating impact on security,national economic security,national public health or safety,or any combination thereo

6、f.All NRMC products are visible to authorized users at HSIN-CI and Intelink.For more information,contact NRMChq.dhs.gov or visit https:/www.dhs.gov/cisa/national-risk-management-center.Market data is based on 4G LTE market share.Additionally,the network architecture and corresponding vendors are int

7、ended to be high level.Further granularity would result in a broader list of primary vendors,including additional American-based vendors.5G is the next generation of wireless networks,building upon existing 4G Long-Term Evolution(LTE)infrastructure and improving the bandwidth,capacity,and reliabilit

8、y of wireless broadband services.It is intended to meet increasing data and communication requirements,including capacity for tens of billions of connected devices that will make up the Internet of Things(IoT),ultra-low latency required for critical near-real time communications,and faster speeds to

9、 support emerging technologies.5G is expected to bring security improvements and a better user experience,but supply chain,deployment,network security,and competition and choice vulnerabilities may affect the security and resilience of 5G networks.5G Wireless Networks MARKET PENETRATION AND RISK FAC

10、TORSSelect Mobile Network Equipment Components Market LeadersCybersecurity and Infrastructure Security AgencyJuly 2019TLP:WHITETLP:WHITESubject to standard copyright rules,TLP:WHITE information may be distributed without restriction.Points of Vulnerability in the 5G NetworkSUPPLY CHAINISSUE:The 5G s

11、upply chain is susceptible to the malicious or inadvertent introduction of vulnerabilities such as malicious software and hardware;counterfeit components;and poor designs,manufacturing processes,and maintenance procedures.IMPACT:5G hardware,software,and services provided by untrusted entities could

12、increase the risk of network asset compromise and affect data confidentiality,integrity,and availability.Even if U.S.networks are secure,U.S.data that travels overseas through untrusted telecommunications networks is potentially at risk of theft,manipulation,and destruction.DEPLOYMENTISSUE:5G will u

13、tilize more information and communication technology(ICT)components than previous generations of wireless networks,and municipalities,companies,and organizations may build their own local 5G networks,potentially increasing the attack surface for malicious actors.IMPACT:Despite security enhancements

14、compared to previous generations of wireless network equipment and services,5G networks will need to be properly configured and implemented for those enhancements to be effective.Improperly deployed,configured,or managed 5G equipment and networks may be vulnerable to disruption and manipulation.NETW

15、ORK SECURITYISSUE:5G builds upon previous generations of wireless networks and will initially be integrated with 4G LTE networks that contain some legacy vulnerabilities.Additionally,it is unknown what new vulnerabilities will be discovered in 5G networks.IMPACT:Some legacy vulnerabilities,whether a

16、ccidental or maliciously inserted by untrusted suppliers,may affect 5G equipment and networks no matter how much additional security is built in.LOSS OF COMPETITION AND CHOICEISSUE:Despite the development of standards designed to encourage interoperability,some companies(including Huawei)build propr

17、ietary interfaces into their technologies.This limits customers abilities to use other equipment,either in addition to or in replacement of Huawei technology.IMPACT:Customers who are locked into one technology or service provider may have to choose between continuing to use an untrusted supplier or

18、removing and replacing existing equipment;which may be both expensive and time consuming.Lack of interoperability may also make it difficult for trusted companies to compete,potentially limiting their ability to invest in R&D and eventually driving them out of the market.The core network is the back

19、bone of the U.S.communications infrastructure that routes and transports data and connects the different parts of the access network.Compromised core devices may be used to disrupt data and services on a large scale,and impact customers who are interconnected by the access network.Core NetworkUser E

20、quipmentDevices such as smart phones,computers,and Industrial Control Systems(ICS)generate data that is then transmitted to a base station,small cell,satellite,or Internet Exchange Points(IXP).Compromised devices may collect user data and impact local networks and systems,but are unlikely to impact

21、the larger communications network.Radio Access Network(RAN)RANs connect wireless or satellite subscriber devices to terrestrial telecommunication networks.Compromised systems may intercept or disrupt data flow and phone calls.Industrial IoT HardwareMarket Leaders(2Q18)11.US Cisco2.CH Huawei3.EU Eric

22、sson4.EU TE Connectivity5.US QualcommRAN EquipmentMarket Leaders(1Q18)11.CH Huawei2.EU Ericsson3.EU Nokia4.CH ZTE5.SK SamsungEvolved Packet Core(LTE)Market Leaders(1Q18)11.EU Ericsson2.CH Huawei3.EU Nokia4.US Cisco5.CH ZTESmartphoneMarket Leaders(2Q18)11.SK Samsung2.CH Huawei3.US Apple4.CH Xiaomi5.C

23、H OPPOService Provider Router and Ethernet SwitchMarket Leaders(1Q18)11.US Cisco2.CH Huawei3.EU Nokia4.US JuniperTop two vendors account for over 60%of the market.Top four vendors account for over 90%of the market.Top four vendors account for over 90%of the market.Baseband Unit PoolRadio UnitsCore Network InfrastructureMobile Backhaul/Transport NetworkMobile FronthaulUS:United States CH:Chinese EU:European US:United States CH:Chinese EU:European SK:South KoreaSmall CellMacro Towers扫码关注:金融干货精选获取更多干货资料

copyright@ 2008-2023 wnwk.com网站版权所有

经营许可证编号:浙ICP备2024059924号-2