欢迎来到报告吧! | 帮助中心 分享价值,成长自我!

报告吧

换一换
首页 报告吧 > 资源分类 > PDF文档下载
 

美国5G市场份额和风险分析简报.pdf

  • 资源ID:97559       资源大小:277.92KB       
  • 资源格式: PDF        下载积分:15金币 【人民币15元】
快捷下载 游客一键下载
会员登录下载
三方登录下载: 微信开放平台登录 QQ登录  
下载资源需要15金币 【人民币15元】
邮箱/手机:
温馨提示:
用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,下载共享资源
 
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,既可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

美国5G市场份额和风险分析简报.pdf

MAJOR COMPONENTS OF 5G NETWORKINGField Programmable Gate Arrays (FPGA) Market Leaders (2017)11. US Intel2. US XilinxSmall Cell ChipsetMarket Leaders (2017)11. US Qualcomm2. US Intel3. CH HiSilicon4. EU NXP Semiconductor5. EU Ericsson6. US CaviumSmall Cell Power AmplifierMarket Leaders (2017)11. US Texas Instruments2. EU NXPSemiconductor3. US Qorvo4. US Broadcom5. US AnadigicsNetwork ProcessorMarket Leaders (2016)11. US Intel2. US Broadcom3. CH HiSilicon4. US Qualcomm5. US Texas InstrumentsServerMarket Leaders (2Q18)11. US Dell2. US HPE3. US IBM4. CH Lenovo5. CH InspurData Converter ChipMarket Leaders (2017)11. US Texas Instruments2. US Analog DevicesEthernet Switch Chips Market Leaders (2015)11. US BroadcomSmall Cell Antenna ArrayMarket Leaders (2017)11. EU Alpha Wireless2. EU Ericsson3. US Galtronics1Lewis, James. 2018. “How Will 5G Shape Innovation and Security: A Primer.” Center for Strategic Analyze; Prioritize; and Manage the most strategic risks to National Critical Functions. These are the functions of government and the private sector so vital to the United States that their disruption, corruption, or dysfunction would have a debilitating impact on security, national economic security, national public health or safety, or any combination thereof. All NRMC products are visible to authorized users at HSIN-CI and Intelink. For more information, contact NRMChq.dhs.gov or visit dhs.gov/cisa/national-risk-management-center.Market data is based on 4G LTE market share. Additionally, the network architecture and corresponding vendors are intended to be high level. Further granularity would result in a broader list of primary vendors, including additional American-based vendors.5G is the next generation of wireless networks, building upon existing 4G Long-Term Evolution (LTE) infrastructure and improving the bandwidth, capacity, and reliability of wireless broadband services. It is intended to meet increasing data and communication requirements, including capacity for tens of billions of connected devices that will make up the Internet of Things (IoT), ultra-low latency required for critical near-real time communications, and faster speeds to support emerging technologies. 5G is expected to bring security improvements and a better user experience, but supply chain, deployment, network security, and competition and choice vulnerabilities may affect the security and resilience of 5G networks.5G Wireless Networks MARKET PENETRATION AND RISK FACTORSSelect Mobile Network Equipment Components Market LeadersCybersecurity and Infrastructure Security AgencyJuly 2019TLP: WHITETLP: WHITE Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction.Points of Vulnerability in the 5G NetworkSUPPLY CHAINISSUE: The 5G supply chain is susceptible to the malicious or inadvertent introduction of vulnerabilities such as malicious software and hardware; counterfeit components; and poor designs, manufacturing processes, and maintenance procedures. IMPACT: 5G hardware, software, and services provided by untrusted entities could increase the risk of network asset compromise and affect data confidentiality, integrity, and availability. Even if U.S. networks are secure, U.S. data that travels overseas through untrusted telecommunications networks is potentially at risk of theft, manipulation, and destruction.DEPLOYMENTISSUE: 5G will utilize more information and communication technology (ICT) components than previous generations of wireless networks, and municipalities, companies, and organizations may build their own local 5G networks, potentially increasing the attack surface for malicious actors.IMPACT: Despite security enhancements compared to previous generations of wireless network equipment and services, 5G networks will need to be properly configured and implemented for those enhancements to be effective. Improperly deployed, configured, or managed 5G equipment and networks may be vulnerable to disruption and manipulationWORK SECURITYISSUE: 5G builds upon previous generations of wireless networks and will initially be integrated with 4G LTE networks that contain some legacy vulnerabilities. Additionally, it is unknown what new vulnerabilities will be discovered in 5G networks.IMPACT: Some legacy vulnerabilities, whether accidental or maliciously inserted by untrusted suppliers, may affect 5G equipment and networks no matter how much additional security is built in.LOSS OF COMPETITION AND CHOICEISSUE: Despite the development of standards designed to encourage interoperability, some companies (including Huawei) build proprietary interfaces into their technologies. This limits customers abilities to use other equipment, either in addition to or in replacement of Huawei technology. IMPACT: Customers who are locked into one technology or service provider may have to choose between continuing to use an untrusted supplier or removing and replacing existing equipment; which may be both expensive and time consuming. Lack of interoperability may also make it difficult for trusted companies to compete, potentially limiting their ability to invest in R&D and eventually driving them out of the market.The core network is the backbone of the U.S. communications infrastructure that routes and transports data and connects the different parts of the access network. Compromised core devices may be used to disrupt data and services on a large scale, and impact customers who are interconnected by the access network.Core NetworkUser EquipmentDevices such as smart phones, computers, and Industrial Control Systems (ICS) generate data that is then transmitted to a base station, small cell, satellite, or Internet Exchange Points (IXP). Compromised devices may collect user data and impact local networks and systems, but are unlikely to impact the larger communications network.Radio Access Network (RAN)RANs connect wireless or satellite subscriber devices to terrestrial telecommunication networks. Compromised systems may intercept or disrupt data flow and phone calls.Industrial IoT HardwareMarket Leaders (2Q18)11. US Cisco2. CH Huawei3. EU Ericsson4. EU TE Connectivity5. US QualcommRAN EquipmentMarket Leaders (1Q18)11. CH Huawei2. EU Ericsson3. EU Nokia4. CH ZTE5. SK SamsungEvolved Packet Core (LTE)Market Leaders (1Q18)11. EU Ericsson2. CH Huawei3. EU Nokia4. US Cisco5. CH ZTESmartphoneMarket Leaders (2Q18)11. SK Samsung2. CH Huawei3. US Apple4. CH Xiaomi5. CH OPPOService Provider Router and Ethernet SwitchMarket Leaders (1Q18)11. US Cisco2. CH Huawei3. EU Nokia4. US JuniperTop two vendors account for over 60% of the market.Top four vendors account for over 90% of the market.Top four vendors account for over 90% of the market.Baseband Unit PoolRadio UnitsCore Network InfrastructureMobile Backhaul/Transport NetworkMobile FronthaulUS: United States CH: Chinese EU: European US: United States CH: Chinese EU: European SK: South KoreaSmall CellMacro Towers

注意事项

本文(美国5G市场份额和风险分析简报.pdf)为本站会员(电脑达人)主动上传,报告吧仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知报告吧(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2017-2022 报告吧 版权所有
经营许可证编号:宁ICP备17002310号 | 增值电信业务经营许可证编号:宁B2-20200018  | 宁公网安备64010602000642号


收起
展开