5G Core Network Archtecture - NEF Exposure Function Tesi
5G Core Network Archtecture - NEF Exposure Function Tesi
Supervisors
Carla Fabiana Chiasserini
Paolo Belloni
Candidate
Eusem Abazi
The fifth generation wireless network (5G) has already begun its journey but making
it a reality comes with several challenges along the way. A huge amount of work is
underway from telecom operators for designing new technologies that are going to
replace the current one (4G). With the arrival of 5G technology, also a wide range
of use cases and business models will be enabled. Therefore, telecom networks need
to support much greater throughput, lower latency and provide higher flexibility
and scalability.
To achieve the 5G target goals, the concept of Network Function Virtualization
(NFV) is introduced. NFV gives the opportunity to mobile operators to modernize
their networks by creating a programmable platform, capable of being automated
and exposed for operators to extract more value. To make real NFV, operators are
using programmable servers in cloud able to run applications locally. One of those
applications running on cloud is Network Exposure Function (NEF), a 5G Core
Network Function. This thesis work is concentrated on this core network function,
presenting its capabilities and features as a future function of new core networks
on 5G technology.
This thesis work is developed in TeVA lab (Milano) a joint lab between Vodafone
and Nokia. It presents a detailed way of Network Exposure Function feature based
on the standardization and the NEF developed on lab environment. The main scope
of the thesis is to work on lab environment for research and development purposes,
setup and showcase NEF for 5G Vodafone Core Network and also enabling a number
of 5G use cases for NEF.
The last part of the thesis is concentrated on the development of a new applica-
tion able to exploit NEF exposure capabilities and test NEF features at the same
time. This application can be used for testing purposes on the lab but at the same
time is a good idea for marketing.
Contents
List of Figures 5
Introduction 9
1 Mobile Networks 11
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.2 Historical Background . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.3 LTE and VoLTE technologies . . . . . . . . . . . . . . . . . . . . . 13
1.3.1 LTE Technology . . . . . . . . . . . . . . . . . . . . . . . . 13
1.3.2 LTE Network Architecture . . . . . . . . . . . . . . . . . . . 14
1.3.3 The Evolved Packet Core (EPC) (The Core Network) . . . . 14
1.3.4 VoLTE Technology . . . . . . . . . . . . . . . . . . . . . . . 16
1.3.5 VoLTE Architecture . . . . . . . . . . . . . . . . . . . . . . 16
1.3.6 LTE and NFV . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.4 5G Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.4.1 Why we need 5G? . . . . . . . . . . . . . . . . . . . . . . . . 18
1.4.2 5G Standard Development . . . . . . . . . . . . . . . . . . . 19
1.4.3 5G Core Network Architecture . . . . . . . . . . . . . . . . . 20
1.4.4 Service Based Architecture . . . . . . . . . . . . . . . . . . . 20
1.4.5 Network Functions NFs . . . . . . . . . . . . . . . . . . . . . 21
2 Teva Lab 23
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.2 TeVA envirnomnet and target goals . . . . . . . . . . . . . . . . . . 23
2.2.1 DMZ zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.2.2 NEF USE Cases . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.2.3 Callight Use Case . . . . . . . . . . . . . . . . . . . . . . . . 25
2.2.4 Call Direction(CD) API . . . . . . . . . . . . . . . . . . . . 26
2.2.5 Container Managment System . . . . . . . . . . . . . . . . . 26
2.3 Virtualized NEF . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.3.1 A Telecom Application . . . . . . . . . . . . . . . . . . . . . 27
2.3.2 Microservices . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2
2.3.3 NFV Specifications . . . . . . . . . . . . . . . . . . . . . . . 28
2.3.4 NFV in Teva Lab . . . . . . . . . . . . . . . . . . . . . . . . 28
2.3.5 What is a hypervisor (VMware (ESXi) ? . . . . . . . . . . . 29
2.3.6 KVM hypervisors . . . . . . . . . . . . . . . . . . . . . . . . 29
2.3.7 Orchestrating Containers . . . . . . . . . . . . . . . . . . . . 30
2.3.8 VNF Manager and Orchestration . . . . . . . . . . . . . . . 30
2.3.9 Kubernets for Orchestration in Teva . . . . . . . . . . . . . 30
2.3.10 Container Technoloy . . . . . . . . . . . . . . . . . . . . . . 31
2.3.11 Docker Container . . . . . . . . . . . . . . . . . . . . . . . . 32
Conclusions 63
Bibliography 65
4
List of Figures
6
List of Acronyms
Abbreviation Acronym
8
Introduction
This thesis work aims to focus on the world of 5G technology and in particular
to 5G core network functions, network exposure fucntion. In this thesis I have
reported in a detailed way the what we actually know about this new 5G core net-
work function.
This thesis was developed in Teva Lab Milano, a lab that serves for development
and implementation of new mobile technologies during an Internship of 8 months.
The main goal of the internship was to make teaching and research in relevance
with the needs of modern bussines and also to give me opportunity me as a stu-
dent to put my knowledge gained at Politecnico di Torino to practical use. From
the other hand, the company had the benfit of having new ideas for enabling new
bussines models from the reports and application developed that I have submitted
to the company.
Baisically the main topic treated on this thesis are the introduction to mobile net-
works technologies and more particulary on VoLTE and 5G technologies, 5G Core
Network Functions with the main function treated in this thesis that is network
exposure function and the concpet of network function virualiation is introduced
as well.
Serveral papers and standartisations has been used in order to have a more de-
tailed overview of network exposure function. Among the chapter NEF features
and specifications are being introduced along with benefits of having NEF in mo-
bile operators network.
It is worth to mention the capability that NEF has been presenting during this
thesis work in order to expose Vodafones assets like (voice, subscrier data etc) to
third party application servrs and also the ability of NEF interaction with other
network functions into the core networkis highlighted as hell.
The last part of the thesis talk about the development of my new application
server able to interact and exhange assets with Vodafone Core Network and vice
versa thanks to NEF. The application is called VodafoneOfferApp and is used for
testing reason in Teva lab enviroment. VoA was an example of showing the NEF
functionalites and features. A specific description of this app is done in the last
chapter.
9
10
Chapter 1
Mobile Networks
1.1 Introduction
Global mobile data traffic is growing rapidly. Mobile networks are carrying more
and more amount of traffic. We now have a mobile data traffic explosion on our
hands, which can end up expanding growth into the next decade. The Cisco visual
networking index [16], reports some of the global data traffic projections and growth
trends.
Mobile data traffic has grown 17-fold over past 5 years. Mobile networks carried
686 petabytes per month in 2012. Global mobile data traffic reached 11.5 Exabyte
per month at the end of 2017, up from 6.7 Exabyte per month at the end of 2016.
(One Exabyte is equal to one billion gigabytes) [16].
Apart from traffic growth, the increasing number of connected devices imposes
another challenge on the future mobile networks. In the future society, everything
and everyone will be interconnected.
The 5G networks will enable growth in many industries and applications like for
example connected cars, robots and tactile applications. It also should meet the
requirements of three groups of use cases [17]:
The demand for mobile networks is continuously increasing, driven by the need
to deliver ultra-high definition video. However, even after this massive explosion
of traffic, cellular networks have not backed away from accepting the challenge and
presenting new innovations.
• High throughput: LTE guarantees high throughput due to the fact that
high data rates can be achieved in Uplink and Downlink as well.
• FDD and TDD: On the same platform are used both Time Division Duplex
and Frequency Division Duplex schema.
• Better End-user experience: The reduction of latency to 10 ms gives to
user a better experience. Also, the optimization of signaling for connection
establishment, mobility procedures and air interface are other factors that
indicate the improvement of user experience.
• Simple Architecture: The running cost of products is lower due to the
simple architecture.
• Seamless Connection: LTE is perfectly consistent and coherent to existing
networks such as CDMA, WCDMA and GSM.
• PDN: The PDN includes IP networks connected to the 4G LTE, such as for
advanced communication services, content delivery networks and the Internet.
• HSS: The HSS contains the UEs information, including QoS profiles, identi-
fication, authorization and provisioned services.
15
1 – Mobile Networks
• IMS Core Network: The IMS Core Network within the VoLTE architecture
provides the service layer for providing Multimedia Telephony.
The VoLTE logical architecture, including roaming and interconnect, is shown
in Figure below:
LTE NFV architecture virtualizes LTE core network functions (NF) over the cloud
by moving them from the specific hardwares. The EPC network functions, vir-
tualized on cloud handle control-plane and data-plane through separate protocols
and network interfaces. For scalability and flexibility purposes, those functions are
hosted on separate virtual machines (VMs).
LTE network operators want that the appropriate EPC VNFs are selected to
serve their subscribers according to device geographical area (known as tracking
area in LTE), and type of radio network (macro/micro base station) it uses. To
achieve this, network operators configure a number of EPC VNFs and create a pool
of these VNFs. The best available VNFs closer to the device and not heavily loaded
are selected to serve the subscriber device during its registration procedure with
LTE network.
This VNFs selection can be achieved either through stateful load balancer or through
LTE standardized procedure. In the first approach, stateful load balancer sends a
query to VNF pool database and gets the IP addresses of MME, SGW and PGW
VNFs to serve the subscriber. This is a standard cloud based approach implemented
in today public clouds [6].
17
1 – Mobile Networks
1.4 5G Technology
The fifth generation networks 5G is at the moment under development and it is
supposed to hit the market by 2020. Compared to the 4G LTE technology, 5G aims
to reach high speed, lower power and low latency.
• Internet of Things will require networks that must handle billions more de-
vices.
• With a growing number of mobiles and increased data traffic both mobiles
and networks need to increase energy efficiency.
• The mobile communication technology can enable new use cases (e.g. for
ultra-low latency or high reliability cases) and new applications for the indus-
try, opening up new revenue streams also for operators.
The upper part of the figure (5GC Control Plane), has a bus and service based
interface exhibited by individual function. This creates a so called Service Based
20
1.4 – 5G Technology
Architecture (SBA), in which, one CP network function (e.g. SMF) allows any
other authorized NFs to access its services. According to the figure, the NFs within
5GC Control Plane, shall only use service based interfaces for their interactions [18].
• User plane function (UPF) supports: packet routing and forwarding, packet
inspection, QoS handling, acts as external PDU session point of interconnect
to Data Network (DN), and is an anchor point for intra and inter-RAT mo-
bility. (UPF has part of the SGW and PGW functionality from EPC world)
22
Chapter 2
Teva Lab
2.1 Introduction
Teva is the lab environment where this thesis porject is being developed. It is a
joint test between Vodafone and Nokia and is mainly devoted for experimental re-
search and development purposes.
Teva supports voice calls over 2G, 3G, 4G and VoLTE technologies as per implemen-
tation design, preparing in this way the environment for 5G network deployment.
23
2 – Teva Lab
DMZ zone is a physical and or logical subnetwork that contains and exposes the
Vodafones external services to an untrusted network, usually to a larger network
such as the Internet. The purpose of a DMZ is to add an additional layer of security
to Vodafones network: external world can access only what is exposed in the DMZ,
while the rest of the Vodafones network is "firewalled" [19].
To put it more concretely, external world of the Vodafones network in the picture
is the place where fb, google calendar, lifx are located. The external word (internet)
does not see any API but just Vodafone Servers capabilities retrieving information
or exchanging information.
Also, to be mention is the fact that everything that is happing on the virtual
machines is hidden from the google calendar, fb or lifx (external word).
To summarize, for security reasons the purpose of this DMZ zone is to move out
from the Vodafones private cloud, the cloud of virtual machines. DMZ cloud, still
can run on Vodafones network but not on the IMS network or cloud, but somewhere
else separately.
• Analytics
• Monitoring
• Transformation / Inspection
• Call logging
• In the Callight web app, User A can associate MSISDN numbers with certain
RGB colors.
• Nokia TAS sends a Call Event Notification to Callight application server and
it sends a notification to the Lifx Smart Light with the same color data User
A was specifying to User Bs number.
25
2 – Teva Lab
• Why use it?: especially useful when mashing up data from other sources so
as to change the calling pattern/experience
• Examples: Block all calls to child during school time and play a message to
the caller.
Play user my last Twitter post while I answer the call.
Mashup connected car data to change the calling pattern while driving
network element NEF. In principal NCMS is a delivery for NOKIA that deals with
any other microservices.
This container system is composed by different nodes which practically are just
virtual machines. As shown on the picture above we have the Deployment Node and
the Control Node as part of O&M network. The deployment node is the machine
responsible for creating and installing all the other nodes on the system while for
controlling operations we have the Control Node. The nodes that are part of O&M
control the Internal Network that is made by Worker nodes and Edge Nodes. The
worker node is the real processing machine where the application runs while the
Edge node is more front-end, load balancer node and is the only machine that has
external interface.
2.3.2 Microservices
:Solve the challenges of monolithic systems by being as modular as possible. In
the simplest form, they help build an application as a suite of small services, each
running in its own process and are independently deployable. These services may
be written in different programming languages and may use different data storage
techniques. While this results in the development of systems that are scalable and
flexible, it needs a dynamic makeover. Microservices are often connecta via APIs,
and can leverage many of the same tools and solutions that have grown in the
RESTful and web service ecosystem [20].
• NFV Infrastructure (NFVI), including the physical resources and how these
can be virtualised. NFVI supports the execution of the VNFs.
consists of a loadable kernel module, kvm.ko, that provides the core virtualization
infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko. [21]
Using KVM, one can run multiple virtual machines running unmodified Linux or
Windows images. Each virtual machine has private virtualized hardware: a network
card, disk, graphics adapter, etc. [21]
Thanks to hypervisor and openstack technology we can create several virtual
machines into a single physical machine. On top of these virtual machines we can
run several containers, each of them containing a specific network function appli-
cation (TAS, NEF, HSS etc).
application. It manages only the container state, in case the application dies restarts
the container for example. In case the application state is needed to be considered
than that should be handled inside the application. Kubernetes also allows to
set affinity and anti- affinity rules, which mean that it is possible to define that
containers to be or not to be placed onto one container host. Kubernetes also
includes support for Rocket containers.
is important from the portability point of view, which means that the container
can be lightweight(share the OS machine kernel and therefore do not require an OS
per application) to contain only application.
As we can observe from the 1 Docker added a command line interface to con-
tainer creation, a REST API and most importantly an image repository to store
modified or preinstalled container images [10].
These images conceptually are very similar to VM images as they store a snap-
shot of the installed application but the main difference is that when a user modifies
this image and wants to store the modified image, then only the modification is
stored and not the entire modified image. This is important from that perspective
that an image modification can be used quickly not just on the place of modification
but pushing it to a central repository is much easier because the total size of the
content. committed to repository is much smaller than committing the full modi-
fied image. . A Docker container holds everything that is needed for an application
in order to run. [10].
32
Chapter 3
The SCEF plays the role of the mediator between the third party and the 3GPP
InP facilitating the following operations [11]:
• QoS provision and SLA monitoring, allowing third parties to request and set
service priorities in a dynamic manner
• Provision of user context information, e.g., real-time user location, user con-
nection properties, average data rate, etc., and network status changes to
third parties
So, what do the SCEF (for transporting small amounts of data in the Control
Plane signalling messages) and the NEF (to guarantee security at the network
border) have in common? Other than the fact they have the term «Exposure» in
their names? Well, a lot in fact. The 4G SCEF not only enables Non-IP Data
Delivery (NIDD), it also has functions for border security, while the 5G NEF will
enable so-called Small Data Delivery on top of its security border functionalities.
34
3.3 – NEF Restful Architecture
Conclusion? Even though SCEF descriptions in the 4G standards and those of the
NEF in 5G documents do not seem extremely alike, the NEF in effect is a newer
and better SCEF [23].
The APIs offered to 3rd parties, also known as «northbound APIs» are only
applicable to a single interface of the 5G system, whilst the NEF is one of man
Network functions within the completely redesigned 5G Core Network. 5G service
exposure by NEF as decided on 3GPP specifications should be based on RESTfu-
lAPIs as shown in the figure below [12]:
Figure 3.2: RESTful APIs for the 5G Service Based Architecure [12].
The Application Function (AF) may interact with the 3GPP Core Network via
the NEF in order to access network capabilities.
35
3 – Network Exposure Function
• The NEF shall securely expose network capabilities and events provided by
3GPP NFs to AF.
• The NEF shall provide a means for the AF to securely provide information to
3GPP network and may authenticate, authorize and assist in throttling the
AF.
• The NEF shall be able to translate the information received from the AF to
the one sent to internal 3GPP NFs, and vice versa.
• The NEF shall support to expose information (collected from other 3GPP
NFs) to the AF.
• The NEF may support a PFD Function which allows the AF to provision
PFD(s) and may store and retrieve PFD(s) in the UDR. The NEF further
provisions PFD(s) to the SMF.
38
3.6 – NEF on Lab Environment
• Service mashup for creating end-to-end offering by combining any of the net-
work assets into your application.
The API framework is realized through a plug-in concept that makes it pos-
sible to create complex API-based services. You can add additional APIs over
time, according to the needs. For those operators with multi-vendor cores, Net-
work Exposure Function can expose APIs from other vendors network functions,
by enabling the use of 3rd party plugins.
39
3 – Network Exposure Function
– Edge computing
– IoT management
– On-demand end-to-end (RAN and Core) slice management.
– Call Management/TAS, and other APIs, e.g. Digital Assistant.
– API composition and orchestration
As can be shown on the fig. below NEF has some important elements. It is
worth mentioning the API Gateway and the API portal [8].
40
3.6 – NEF on Lab Environment
As the entrance of NEF all request would go through api gateway to specific
service.
The main policies like dynamic routing, SLA enforcment, transformation, threat
proteaction etc. and also the access control part can be seen briefly on the figure.
All the feature of the API portal are shown briefly on the picture below.
OA&M: API diagnostics and usage analytics for Call Management and Roam-
ing/Device Info APIs.
43
44
Chapter 4
4.1 Introduction
Network Exposure Function is based on 5G specifications released by 3GPP stan-
dardization, part of 5G Core network function and aims to securely exposes op-
erators assets to application developers. NEF is completely conceptualized and
developed in lab environment to expose Vodafones 5G API towards 3rd-party ap-
plications and also to enable new service for testing and research purposes.
In order to fully exploit and test NEF exposure capabilities, a new use case is
enabled on TeVA lab. It is about the development of a new application (server) that
is called Vodafone Offer Application (VoA). All the subscribers of this application
will e able to get new services thanks to the ability of NEF to expose Vodafones
assets to VoApp. 5G API like CallDirection, Roaming and Device information are
exposed by NEF, giving in this way the opportunity to VoA to retrieve information
about incoming calls, roaming and devices info about a specific customer.
VOA is an application that is created for all Vodafones customers that will be
able to get discounts on different products on Vodafone Shops and on different
touristic points on the country where they are roaming.
Every customer that has chosen Vodafone as its mobile operator has the right to
download this application and subscribe on it by simply inserting his phone number
(msisdn). When the application takes the phone number as an input by the user,
it is able to send http/https post requests to two different interfaces (APIs) based
45
4 – Deployment Stage (VoA)
All the requests are towards the HSS (Home Subscriber Server) server that is
the function which keeps user profile data like roaming information, device infor-
mation etc. Note that all the requests pass through the NEF (Network Exposure
Function). All requests that come from different applications towards HSS or other
servers (ex. TAS) are forwarded only by NEF which is the only network function of
the Vodafone Cloud that has communication with the external trusted applications.
46
4.3 – NEF Use Cases
The first use case of the application is done by using the HTTP protocol for com-
munication between the client (VOA app) and in this case the NEF. Fig.2 shows
the schematic view of the use case:
In this test the customer that has subscribed on the application has the follow-
ing phone number (msisdn): 393488310996. This user is roaming in Germany and
is using a phone model Nokia 8.
On the figure below we have the trace of all steps of communications between
VOA app and NEF. The trace is obtained by capturing traffic on the NEF interface
using WireShark.
1. VOA sends an http post request towards NEF (path: /graphql) for getting
roaming information. This request is shown on the figure below:
47
4 – Deployment Stage (VoA)
2. NEF replies with a response (HTTP/1.1 200 OK) about the roaming request.
The response is shown on the figure below:
48
4.3 – NEF Use Cases
3. VOA sends the second http post request towards the NEF (path: /graphql)
for getting information about the device of the customer. This request in
shown on the figure below:
4. NEF replies with a response (HTTP/1.1 200 OK) about the device informa-
tion request. The response can is shown on the figure below:
49
4 – Deployment Stage (VoA)
As can be seen the phone model that the customer is using is Nokia 8 (TA-
1004).
5. The output that the user see on his application is shown on the figure below:
As can be seen below, based on the information that the application received
from the NEF (HSS), it is able to process this information and to come with
some offers from the customer.
First offers are referring based on the location that customer is declaring. Note
that the offers about the touristic places, museums/restaurants etc are refer
to them which have already an agreement with Vodafone to offer discounts
for the customer that have already installed VOA application.
50
4.3 – NEF Use Cases
51
4 – Deployment Stage (VoA)
Note that only NEF and applications communicate in HTTPS. Internally in the
cloud, NEF communicate HTTP with other functions.
1. The first test is made without installing the certificate when using the appli-
cation. Herein below on figure 8 there is a trace captured with Wireshark in
order to see what happens:
2. The second test is done with the certificate already installed on the host device
of the application. Once the connection is established both the Application
and NEF use the agreed algorithm and keys to securely send messages to each
other. The TLS connection is set up by a handshake on three main phases:
52
4.3 – NEF Use Cases
(a) Hello: VOA sends ClientHello message which contains all the infor-
mation the NEF needs to connect via SSL. The NEF responds with a
ServerHello, which contains similar information required by the app, in-
cluding a decision based on the app preference about cipher suit and
SSL version.
(c) Key Exchange: The encryption of the data is done using a single key
algorithm. The application generates a random key and encrypts it dur-
ing the Hello phase, and the NEFs public key (found on SSL certificate).
Then this encrypted key is send to the NEF, where is decrypted using
the NEFs private key and in this way the handshake part is completed.
On the figure below are showed from the Wireshark capture all the steps that
are described above for the certificate exchange. NOTE that TLS and SSL
are the same thing. TLS is more popular acronym used nowadays.
53
4 – Deployment Stage (VoA)
Above are highlighted the certificate exchange between the application and
NEF for both requests (roaming and device info) made by the application.
Also, more detailed info about the client key exchange for the certificate is
highlighted.
3. At this point HTTP requests and response can now be sent between NEF
and the application by forming a plaintext message and then encrypting and
sending it. Only the application can decrypt the message that comes from
NEF. As can be seen clearly even from the Wireshark trace, we cannot see
anymore the request and the response from NEF (it is encrypted) and vice
versa. In this way we can avoid Man In the Middle Attackers that tries to
read and modify any requests that they may intercept. On the figure 10 below
we can observe it clearly:
54
4.3 – NEF Use Cases
The API request towards SDL and the response that comes from SDL are not
encrypted. The encryption of the data is made by NEF before forwarding them to
56
4.3 – NEF Use Cases
In the figure below there is a trace capture with Wireshark on the interface of
HSS in order to see the internal communication between NEF and HSS.
call events. Through Call Direction API third-parties applications can subscribe
dynamically to call events. (Called Number, Answer, No Answer, Busy, Not Reach-
able and Disconnected).
The role of TAS is to notify the AS about such events and to suspend the call
processing, allowing in this way the AS to perform any needed operation before
taking the decision about the call.
• In case of call direction subscription, TAS allows only one address registration
at a time.
• The criteria can contain as many call events as subscriber application would
like to have.
• The order of call event notifications may be the same as the order of event
subscriptions (subscription order is kept with best effort).
• TAS supports both calling and called party address in the call direction sub-
scription.
If an event happened with the calling party, and notification was sent about
it to application server, then TAS supports the following actions from third party
VoA server [8]:
• Route
• Continue
• EndCall
59
4 – Deployment Stage (VoA)
After the VoA has done the subscription, it receives an url that contains the
subscription ID. When the event satisfies the specified criteria occurs, the TAS no-
tifies VoA server by using POST to the specified endpoint.
On the figure below is shown the server part code inside the application. It is
the passive part of code. It acts like a serve and it waits for an HTTP post request
by TAS server that in this case acts like a client in order to take commands in order
to make the decision about the call.
61
4 – Deployment Stage (VoA)
Below is demonstrated the part of the code when VoA response with a decision
to TAS, on which action must be performed. In this case, to the call is given OK
to continue and the call will be routed.
• "Routes" means specific API path, this can be used ot select a specific API
62
Conclusions
New NEF versions that approaches more the 3GPP standartds/Vodafone Network
are going to be released and new use cases that implies NEF are on the way.
64
Bibliography
[1] ETSI, 5G: Procedures for the 5G System , 3GPP TS 23.502 version 15.2.0
Release, 06.
[2] A. T. S. Mohammad Javed, “Transformation of mobile communication network
from 1g to 4g and 5g,” 04.
[3] Tutorialspoint, https://www.tutorialspoint.com/lte.
[4] “Voice over lte: The new mobile voice,” ALCATEL-LUCENT WHITE PA-
PER.
[5] GSMA, VoLTE Service Descriptio and Implementation Guidlines, 2014.
[6] M. T. Raza and S. Lu, “vepc-sec: Securing lte network functions virtualization
on public cloud,” 2018.
[7] Etsi, https://www.etsi.org/technologies/5g.
[8] Nokia, “Nokia networks documentations,”
[9] ETSI, Network Function Virtualisation, Architectural Framework, 2010.
[10] K. F. Csaba Rotter, “Using linux containers in telecom
applications.,”
[11] V. S. Konstantinos Samdanis, Xavier Costa-Perez, “From network sharing to
multi-tenancy: The 5g network slice broker,”
[12] G. Mayer, “Restful apis for the 5g services based architecture,” 05.
[13] ETSI, 5G Systems: Network Exposure Function Northbound APIs, 3GPP TS
29.522 version 15.0.0 Release, 07.
[14] ETSI, 5G: System Architecture for the 5G System , 3GPP TS 23.501 version
15.2.0 Release, 06.
[15] Nokia, https://www.nokia.com/networks/products/network-exposure-function/.
[16] C. V. N. Index, “Forecast and trends, 2017-2022 white paper,” 2017.
[17] Arcep, “5g: Issues & challenges,” 03.
[18] Grandmetric, https://www.grandmetric.com/2018/03/02/5g-core-network-functions/.
[19] wikipedia, https://www.wikipedia.org.
[20] smartbear, https://smartbear.com/solutions/microservices/.
[21] KVM, https://linux-kvm/page/.
[22] Infoworld, https://www.infoworld.com/article/3268073/what-is-kubernetes-your-nex
[23] ip solutions, https://apistraining.com/news/5g-nef/.
65