Keysight, F5 and AMD demonstrate 5G Terabit scale traffic
Keysight Technologies has announced that its software-based cloud native traffic generator CyPerf was used to demonstrate the 5G performance capability of the F5 BIG-IP® Next Edge Firewall cloud-native network function (CNF), powered by the 3rd Generation AMD EPYC™ processors at Mobile World Congress Las Vegas.
For years, 5G performance predictions have ranged from delivering 10X to 100X greater performance than what was possible with 4G. Many service providers are in the process of building new networks based on cloud-native microservices capable of handling 5G data traffic at scale. This requires reliable and repeatable ways to verify system provisioning and new configurations within a cloud-native, high data throughput and low latency data management environment.
“We were confident that this proof-of-concept configuration would be powerful, with the automation and efficiency of running the new Edge Firewall CNF on AMD EPYC CPUs with 64 cores. However, the transactions per second (TPS) outcome was even better than initially predicted. Cloud-native test traffic from CyPerf provided a reliable, repeatable means to validate whether newly configured and provisioned systems can handle the tremendous throughput, TPS, and low latency requirements of modern 5G deployments,” said Ryan Howard, Principal Solution Engineer, Business Development, F5.
The next wave of mobile applications has far greater bandwidth, latency and security demands on the network infrastructure, and it is crucial to validate the virtualized 5G infrastructure at cloud scale to ensure a reliable subscriber quality of experience. For the demonstrations, Keysight’s CyPerf will emulate millions of mobile users browsing their phones, cumulatively generating millions of application transactions and Terabit scale traffic.
“Meeting the data challenges of the 5G era is only one part of the battle. Providing scalable, performant and most importantly, secure systems is critical to advancing the growth of 5G,” said Nick Hancock, Director, Telco Compute, AMD. “With AMD EPYC processors, our 5G-focused customers like F5 and Keysight can get exceptional performance out of their 5G systems and products while also getting access to a layered security approach that can help reduce business risk for their customers.”
“With a proven method to generate and process cloud-based traffic, service providers can now confidently roll out 5G services at scale,” said Ram Periakaruppan, Vice President and General Manager of Keysight’s Network Solutions group.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.