Notes 4 G 5 G
Notes 4 G 5 G
UNIT I
EVOLUTION OF WIRELESS NETWORKS
Syllabus
Networks evolution: 2G,3G,4G, evolution of radio access networks, need for 5G. 4G
versus 5G, Next Generation core(NG-core), visualized Evolved Packet core(vEPC).
in capacity over the years offering higher bandwidth and supporting more connections.
Today, wireless networks are not just connecting people, but also connecting
businesses and almost everything in the world. In this chapter, we will look at the
evolution of the wireless networks from 1G to 4G and understand the need for 5G
networks.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 1
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
1G Networks
2G Networks
In 1991, Global System for Mobile Communications (GSM) standard body
published the standards for 2G technology. 2G technology, was launched in 1992 and
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 2
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
had the ability to handle voice calls over digital systems. In addition to voice calls, 2G
also supported Short Messaging Services (SMS).
2G offered wider coverage when compared to 1G network. It enabled users to
send text messages to each other, over a wireless network. GSM network
architecture had 2 distinct layers - the Base Station Subsystem (BSS) and the Network
Switching Subsystem (NSS). The BSS had the base station and the base station
control function. The NSS had the core network elements. The core network elements
in the NSS were responsible for the switching of calls between the mobile and other
landline or mobile network users. In addition, the core network elements in the NSS
supported the management of mobile services including authentication and roaming.
European telecommunication Standards Institute (ETSI) established General Packet
Radio Service (GPRS), an Internet Protocol (IP) based mobile data standard, as an
enhancement to the 2G technology. The new service was called as 2.5G and it offered
56 - 114 Kbps data speed. 2.5G technology, eventually morphed into EDGE
(Enhanced Data Rates for GSM Evolution) and was ideal for email services. 2.5G
technology resulted in the growth of mobile phones such as Blackberry, which offered
mobile email services.
3G Networks
3G cellular services were launched in the year 2003. 3G was much more advanced,
when compared to 2G/2.5G and offered up to 2 Mbps speed, supporting location-
based services and multimedia services. It was ideal for web browsing. Apple, which
was known to be a computer maker, got into the mobile equipment business by
launching iPhone, with the advent of 3G. Android, the open source mobile operating
system became popular with 3G. With 3G, the 3GPP group standardized UMTS.
Universal Mobile Telecommunications System (UMTS) is a third generation Mobile
cellular system for networks based on the GSM standard. Developed and maintained
by the 3GPP (3rd generation Partnership Project).UMTS uses wideband code
division multiple access(W- DMA) radio access technology to offer greater spectral
deficiency and bandwidth to mobile network operators.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 3
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
1. User Equipment (UE): In 2G, the handsets were called as mobile phones or cell
phones, as they were predominantly used for making voice calls. However, in
3G, the handsets can support both voice and data services. Hence, the term User
Equipment or UE is used
to represent the end user device, which could be a mobile phone or a data terminal.
2. Radio Access Network (RAN): The RAN, also known as the UMTS Radio Access
Network, UTRAN, is the equivalent of the previous Base Station Subsystem (BSS) in
GSM. RAN includes the NodeB function and the Radio Network Controller (RNC)
function. The NodeB function provides the air interface. The RNC manages the air
interface for the overall network.
3. Core Network:
The core network is the equivalent of Network Switching Subsystem or NSS in
GSM and provides all the central processing and management for the system. Core
network has both circuit switched and packet switched network elements. 3G
core network architecture consists of the following functions:
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 4
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
Page No: 5
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
another. Gateway MSC (GMSC) is a function that is present either within or outside
of the MSC. A GMSC interfaces with the external networks such as the Public
Switched Telephone Network (PSTN), which is our legacy land line network.
Page No: 6
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
4G Networks
In 2012, 4G services were launched, with speeds of up to 12 Mbps. 4G is an all-IP
(Internet Protocol) network and it resulted in massive changes to the radio network
and the core network architecture.
In 4G network, the radio function is based on the Long Term Evolution (LTE) 3GPP
standards and the core network is based on the Evolved Packet Core (EPC) 3GPP
standards
In order to meet the 4G LTE requirements, functions of the eNodeB not only
included the base station (NodeB) functions to terminate the radio interface but also
the functions of the Radio Network Controller (RNC) to manage radio resources. This
architecture is called Evolved UMTS Terrestrial RAN (E-UTRAN) architecture.
In 3G, the RAN function included the base station (Node B) and the antennas.
In 4G LTE architecture, the base station function is split into two key functions -
Baseband Unit (BBU) and Remote Radio Head (RRH). RRH is connected to BBU
through optical fiber. The BBU function is moved out from the cellsite and hosted
in a centralised location and called as Centralized RAN. The RRH function (i.e., the
antenna function) is deployed closer to the users in a distributed fashion. The RAN
architecture and the distribution of RRHs and BBUs is in FLuenced by several factors
such as quality of service, latency, throughput, user density and load demand. The
following are the key functional nodes/network elements in the LTE architecture:
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 7
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
Page No: 8
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 9
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
filtering of noise and amplification of signals. The Baseband Unit (BBU) provides
switching, traffic management, timing, baseband processing, and radio interfacing
functions. BBU is typically connected to the RRH using a Fiber link.
In the traditional 2.5G/3G networks, both the RRH and BBU functions remained
in the cell site, as part of the Base Transceiver Station (BTS). In the 4G network, BBU
function was moved out of the cell site to a centralized location. BBU function in a 4G
network is hosted in the Central Office and
is called as Centralized RAN. 4G architecture optionally supports the virtualization of
BBUs and when the BBU function is virtualized, it is also called as Cloud RAN or
Virtualized RAN. In a 5G network, virtualization of BBUs almost becomes mandatory
as it helps the service providers to scale the network to support the various use
cases.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 10
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 11
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
Enable new revenue streams for wireless service providers, by supporting new
applications and use-cases
In 2016, several service providers partnered with network equipment vendors to kick
start 5G trials. Starting 2018, 5G services were commercially launched by multiple
service providers across the globe.
1.4 4G versus 5G
4G network infrastructure is based on Long Term Evolution (LTE) architecture.
5G network infrastructure is based on 5G Next Generation Core (5G NG-Core)
architecture. There is a significant difference between both the technologies in terms
of speed, latency, frequency ranges of the spectrum, use cases that are supported,
support for network slicing, RAN architecture, and Core network architecture.
Table 2.1 captures the differences between 4G and 5G technologies.
Criteria 4G 5G
300-400 Mbps (lab) 40- 1000 Mbps (lab) 300-400 Mbps
Speed
100 Mbps (real world) (real world)
Latency 50 ms 1-2ms
Sub 6 GHz (5G macro optimized),
Frequency 2-8 GHz 3-30 GHz (5G E small cells) 30-100
GHz (5G Ultra Dense)
Enhanced Mobile Broadband
Voice over LTE Mobile Augmented Reality/Virtual Reality
Use Cases Broadband Online Video Internet of Things (IOT) Holographic
Online Gorning Calls Fixed Wireless Autonomous
Cars Robotic Surgeries
Network
No Yes
Slicing
Small Cells installed in almost every
Large Towers in
Cell Towers street comer, in addition to mobile
concentrated communities
towers
Service
Connection Oriented Service Oriented
Architecture
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 12
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 13
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
Page No: 14
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
(NSSAIs) con figured or allowed for a given UE. This is a new function introduced in
5G architecture.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 15
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
Network Exposure Function (NEF) and interacting with policy framework for policy
control.
There are two methods in which a Virtualized Evolved Packet Core (EPC) can
be deployed:
1. An all-in-one Virtual EPC (vEPC)
2. Standalone instances of MME, PGW, SGW, HSS and PCRF.
There are some pros and cons for each of these approaches. In an all-in-one
deployment model, it is easy to manage the vEPC instance as one entity. However, it
lacks mechanisms to individually scale one or more services. For example, if the
service provider wants to increase the number of PCRF instances, it can only be
achieved by creating multiple instances of the all-in-one vEPC.
In a deployment with standalone instances of the vEPC components, the
service provider can individually scale the components. For example, if there is a need
to increase the number of PCRF instances, it can be achieved by spinning one or
more instances of the PCRF application. This approach helps in optimizing the
resource utilization on the telco cloud and brings-in agility. However, there will be an
overhead involved in managing the standalone instances on the telco cloud. The
network equipment vendors can help offset this management overhead, by providing
a vEPC specific VNF manager along with the vEPC. Architecturally, the vEPC will
be different from that of a physical EPC. Following are some of the key architectural
differences between a physical EPC and a Virtual EPC:
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 16
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
A Virtual EPC may have one or more VMs for each of the components. For
example, a PCRF service may have multiple micro-services. Each of these
microservices may run on a separate VM or a Container, on the telco cloud.
A subscribers session state information in a physical EPC may be stored in RAM
or transient memory in the hardware. A physical EPC achieves high availability
and reliability by deploying multiple physical instances of the EPC hardware.
However, in a Virtual EPC deployment, the vEPC instance may store the
session state information in a reliable database, for session continuity during
fail-overs.
A physical EPC relies on the underlying hardware for data plane acceleration.
A Virtual EPC relies on software-based data plane acceleration technologies.
PART-A Questions
1. What is the first mobile wireless phone? Which vendor manufactured it?
Motorola DynaTAC 8000x is the first commercial mobile phone that was used for
making analog voice calls. The phone looked almost like a cordless phone handset
and weighed 1.75lb.
2.What are the various use cases supported by different generations of wireless
technology?
Some of the key 5G use cases are:
Enhanced Mobile Broadband (eMBB)
Fixed Wireless Broadband Services
Robotic Surgery
Autonomous Cars
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 17
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
3. How much speed does 4G provide? What are the core architecture of 4G?
In 2012, 4G services were launched, with speeds of up to 12 Mbps. 4G is an
all-IP (Internet Protocol) network and it resulted in massive changes to the radio
network and the core network architecture.
In 4G network,
• The radio function is based on the Long Term Evolution (LTE) 3GPP
standards and
• The core network is based on the Evolved Packet Core (EPC) 3GPP
standards
Page No: 18
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
Enable new revenue streams for wireless service providers, by supporting new
applications and use-cases
Spectrum: 5G supports a wide range of spectrums from low bands below 1 GHz, to
mid bands from 1 GHz to 6 GHz, to high bands 24 / 30 GHz to 300GHz.
• Bandwidth: 5G supports up to 1Gbps throughput, today. However, the
industry aims to support a peak data rate of 10 Gbps.
• Programmability: 5G can be customized to meet the requirements of a
diverse set of use-cases and deployments.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 19
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
9. How has the RAN evolved across the different generations of wireless
networks?
Part-B’
1. Explain the various use-cases supported by different generations of wireless
technology.
2. Explain the key differences between 4G and 3G systems.
3. Discuss the key functions of radio access networks.
4. Differentiate LTE-M and LTE-A
5. Explain the frequency spectrum ranges supported by 5G.
6. Explain the benefits of NFV.
7. Identify the role of NFVI in NFV.
8. Explain the building blocks of virtualized RAN.
9. Explain the significance of Control plane in 5G.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 20
CEC331 4G/5G Communication Networks Unit -1 EVOLUTION OF WIRELESS NETWORKS
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 21
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
UNIT II
5G CONCEPTS AND CHALLENGES
Syllabus
Fundamentals of 5G technologies, overview of 5G core network architecture,5G
new radio and cloud technologies, Radio Access Technologies (RATs), EPC for 5G.
5G brings significant changes to speed, latency and scale. 5G services are expected
to make a huge impact on service providers, businesses, consumers and the society
at large. 5G is not just an evolution from 4G technology - it is revolutionary. The most
visible changes in 5G are on the radio - 3GPP de fined the new radio specification
called 5G New Radio (5G NR) for 5G services. However, 3GPP also has revamped
the core network infrastructure to support the speed, latency and scalability
requirements of 5G, by introducing 5G Next Generation Core (5G NG-Core). The 5G
NG-Core will be the heart of the 5G network and acts as an anchor point for multi-
access technologies. It delivers a seamless service experience across fixed and
wireless access technologies.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 22
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
2.1.1 Characteristics of 5G
There are a few key characteristics of 5G technology, that are notably different from
the previous generation wireless technologies.
Spectrum: 5G supports a wide range of spectrums from low bands below 1
GHz, to mid bands from 1GHz to 6 GHz, to high bands 24 / 30 GHz to 300 GHz
(also, known as millimeter-wave).
Bandwidth: 5G supports up to 1Gbps throughput, today. However, the industry
aims to support a peak data rate of 10 Gbps.
Programmability: 5G can be customized to meet the requirements of a diverse
set of use-cases and deployments (for ex., a high-bandwidth and latency
agnostic mobile broadband use-case to a low bandwidth and latency sensitive
Industrial IOT use- case). This is achieved through capabilities such as network
slicing
Latency: 5G supports 1 2 milliseconds latency, which enables use-cases such
as mobile gaming, augmented reality and virtual reality.
Virtualization: 5G infrastructure is built on virtualized network functions such
as Virtual RAN, Virtual EPC and Virtual IMS. It enables services providers to
dynamically scale the network infrastructure to meet the demands of the
customers.
Connection Density: 5G aims to provide connectivity to nearly 1 million
devices in an area of 1 square kilometre.
2.1.2 5G Use Cases
2G technology was for phone calls and SMS services. 2.5G or EDGE
technology was for email services, 3G technology was for web, 4G technology was for
video and 5G is for use cases that we cannot possibly imagine.
5G technology caters to the needs of multiple industries such as the following:
* Public Safety
* Broadcasting / Media Delivery
* Automotive Industry (Public Transport Systems)
* Aeronautical (Drones)
* Health / Wellbeing
* Utilities
* Education
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 23
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Page No: 24
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 25
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Standalone architecture uses only one radio access technology either 4G or 5G.
The radio cells connect to either a 4G EPC or a 5G Core. Architecturally, deploying
a standalone solution is simple for service providers. However, it involves a lot of costs
as an end-to-end 5G network infrastructure has to be deployed. When a user
equipment switches between 5G and 4G networks, service continuity is achieved
through inter-generation handovers.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 26
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
a 5Genabled smartphone will be able to connect to the network using 5G radio cells
for data-throughput improvements but
will still use 4G radio cells for regular low-throughput data transfers. NSA uses a
capability called dual-connectivity, defined by the 5G NR standards where a given UE
consumes radio resources provided by at least two different network points for
example, 5G gNB and 4G eNB. NSA enables service providers to deploy 5G, without
much of disruption to their existing networks and services. It also helps the service
providers to leverage the investments done in the 4G network.
* Option 4: 5G NR gNB acts as the master node and 4G LTE ng-eNB acts as the
secondary node. Both of these RAN functions, connect to the 5G Core. Option 4 will
be helpful in scenarios where 5G NR coverage is high, for providing mobile broadband
services. 4G is used as a fallback option, in areas where 5G NR coverage is not
available. This deployment option, may not be very relevant in the short term, where
4G coverage is higher than 5G NR coverage.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 27
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
* Option 7: 4G LTE ng-eNodeB acts as the master node and 5G NR acts as the
secondary node. Both of these RAN functions communicate with the 5G NG-Core.
Option 7 builds on top of Option 5. The need for Option 7 is very limited in the short
term, as it bene fits only the mobile broadband use-cases.
Page No: 28
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Page No: 29
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Page No: 30
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Mid band 5G − This is nearly six times faster than the 4G LTE.
Mm Wave High band 5G − This is nearly 10 times faster than 4G networks.
Increased Accessibility − Using a 5G network with cloud computing will close any
bandwidth gap across different regions. It will also enhance the availability of cloud
computing solutions in remote locations.
IoT Connectivity − Blending both technologies will lead to a high−speed network with
low latency. This way, IoT devices, and systems can easily access cloud solutions.
This connectivity will lead to improved business digitization and automated
machines.
Better Work Connectivity − When cloud computing is driven by the 5G technology,
remote working systems are enhanced. There will be no delays or technical
difficulties, giving organizations the ability to work from any location.
Improved Security Systems − Hacking is always a threat to cloud solutions. When
powered by 5G, this will upgrade the system’s security protocol. With 5G, attacks can
be identified easily as hybrid cloud environments are much safer.
Supports Edge Computing − Driving cloud computing solutions using 5G network
systems will enhance edge computing. With edge computing, remote systems are
enhanced while a lesser bandwidth is consumed.
Easy Access to Customers − With cloud technology and 5G, it becomes possible for
machines to communicate easily with each other. This way, communications will be
more reliable as businesses have faster customer access.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 31
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
3. Reliability with Large Data − 5G for cloud computing is important, especially in big
data. Many companies deal with large sets of data all the time. They will prefer to
transfer all of these data on time. This way, large quantities of data can be transferred
easily and in real−time. Enhanced Productivity − Due to the efficiency and
effectiveness of the 5G technology, businesses will be more productive.
Impact of cloud on 5G
5G systems and cloud−hosted solutions are some of the changing technologies
in the IT industry. Using both technologies together will lead to a bigger world full of
opportunities and innovations. There are many benefits of using both technologies
together.
With 5G, cloud computing will be advanced through continuous software
updates. These updates will include application and network releases. The frequency
of technology will need to be aligned with the operation to prevent glitches in
interoperability. The cloud needs more development to become fully compatible with
5G. For the best experience, both technologies can be developed further for more
efficiency.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 32
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Radio Access Technology or (RAT) is the underlying physical connection method for
radio-based communication networks.
Many modern cell phones support multiple RATs in one device, such as
Bluetooth, Wi-Fi and GSM, UMTS, LTE or 5G NR. More recently, RAT has been used
to discuss heterogeneous wireless networks. It is used when the user device is
choosing between the types of RATs used to connect to the Internet. This is typically
similar to access point selection in an IEEE 802.11 (Wi-Fi) based network.
The new technology will use the Open Radio Access Network (O-RAN). This
O-RAN technology provides a more open radio access network architecture than
currently offered by telecommunications companies. It will increase interoperability
between different vendors and create a more efficient network.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 33
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 34
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
● Serving Gateway (S-gateway) - routes data packets through the access network.
● Packet Data Node Gateway (PGW) - acts as the interface between the LTE
network and other packet data networks; manages quality of service (QoS) and
provides deep packet inspection (DPI).
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 35
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
● Policy and Charging Rules Function (PCRF) - supports service data flow
detection, policy enforcement and flow-based charging.
While the EPC and 5G Core perform similar functions, there are some major
differences in that the 5G Core is decomposed into a number of Service-Based
Architecture (SBA) elements and is designed from the ground-up for complete control
and user plane separation. Rather than physical network elements, the 5G Core
comprises pure, virtualized, software-based network functions (or services) and can
therefore be instantiated within Multi-access Edge Computing (MEC) cloud
infrastructures.
This new architecture will give operators the flexibility they need to meet the diverse
network requirements of all the different 5G use cases, going well beyond high speed
fixed wireless or mobile broadband services. And at the heart of the new 5G core
architecture is cloud native software design.
To illustrate just how the 5G core network will be different from today’s EPC, here
are some of the new 5G network functions that you’ll need to need to know about:
● User Plane Function (UPF). Emerging from Control and User Plane
Separation (CUPS) strategies defined within non-standalone 5G New Radio
specifications, the 5G core UPF represents the evolution of the data plane
function of the Packet Gateway (PGW). This separation allows data forwarding
to be deployed and scaled independently so that packet processing and traffic
aggregation can be distributed to the network edge.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 36
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
The core network is the most important domain in the mobile network starting from
2G and 3G while the MSC and SGSN are the main functions there to EPC or Evolved
packet Core, then EPC+ in 4G network and finally 5GC or 5G Core in 5G Network.
However, there are many differences between EPC, EPC+, and 5GC especially
in the features, upgrades and main interfaces as below
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 37
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 38
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
While evolving to 5G NSA mode, Option 3 should always be the best choice.
The picture above depicts the dual connectivity of Option 3. This option enables UE
access simultaneously through LTE or NR, and supports the LTE NSA architecture
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 39
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
based on LTE.
Advantage:
There is no need to deploy 5GC in early period of 5G deployment. By implementing
this network architecture, the control interface of S1 is only provided to LTE eNodeB,
while the user plane interface of S1 can be provided to eNodeB and NR gNodeB at
the same time.
Therefore, the traffic flows in EPC should be classified.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 40
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Advantage:
With the requirement of 5G NR providing continuous coverage, the control plane
always set in 5G NR to fully achieve massive and strong function for users.
The rapid rising of 5GC has become an irresistible tendency. As a prominent mobile
core network provider, IPLOOK always keeps pace with the innovation of core
network. IPLOOK also constantly develops the path to provide converged core
network for our customers. Nowadays, IPLOOK can support seven available options
of 5GC deployment with various configuration according to 3GPP.
Part-A
1. What are the fundamentals of 5G technology?
It supports service-based architecture and service-based interfaces
Buit on network virtualization.
It supports for logically partition by the network slicing
Interact with multiple application by API (Application Programming interfaces)
Support forward /backward compatibility with network
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 41
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Spectrum: 5G supports a wide range of spectrums from low bands below 1 GHz, to
mid bands from 1 GHz to 6 GHz, to high bands 24 / 30 GHz to 300 GHz. This high
band is called as millimeter-wave.
Latency: 5G NR supports lower latencies less than 10 milli seconds.
Beamforming: 5G NR supports a large number of multiple input multiple output
(MIMO) antennas, which would allow it to work in a high interference environment
through a technique called “beamforming”. It enables 5G radios to provide both
coverage and capacity.
Interworking with 4G: Coexistence with LTE (by supporting LTE NR), by bringing
an overlay network, in cases where 5G coverage is not available.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 42
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Page No: 43
CEC331 4G/5G Communication Networks Unit -2 5G CONCEPTS AND CHALLENGES
Part-B
1. What are the fundamentals, characteristics and use cases of 5G technologies?
2.Briefly explain the concept of Radio Access Technology (RAT) in 5G networks
3. Explain the 5G cloud technology and its impact of cloud on 5G.
4. Explain in detail about EPC for 5G.
5. With neat sketch explain the 5G System Architecture
6. How does core network evolve to 5GC from EPC?
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 44
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
UNIT III
NETWORK ARCHITECTURE AND THE PROCESSES
Syllabus
5G architecture and core, network slicing, multi access edge computing(MEC),
visualization of 5G components, end-to-end system architecture, service
continuity, relation to EPC, and edge computing. 5G protocols: 5G NAS,NGAP,
GTP-U, IPSec and GRE.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 45
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
millimeter wave, since wavelengths range from 1-10 mm. Frequencies between 24
GHz and 100 GHz have been allocated to 5G in multiple regions worldwide.
In addition to the millimeter wave, underutilized UHF frequencies between 300
MHz and 3 GHz and C-band frequencies between 3.7 and 3.98 GHz have also
been repurposed for 5G.
The diversity of frequencies employed can be tailored to the unique application.
Higher frequencies are characterized by higher bandwidth and shorter range.
Millimeter wave frequencies are ideal for densely populated areas, but
ineffective for long distance communication.
Within the various frequency bands dedicated to 5G, each carrier has begun to
carve out their own individual portions of the 5G spectrum.
3.1.4 MEC
Multi-Access Edge Computing (MEC) is an important element of 5G architecture.
MEC is an offshoot of cloud computing that brings applications from centralized data
centers to the network edge, closer to end users and their devices. This essentially
creates a shortcut in content delivery between the user and host, bypassing the
long-distance network path that once separated them. This technology is not
exclusive to 5G but is certainly integral to its efficiency.
Characteristics of MEC include the low latency, high bandwidth, and real time
access to RAN information that distinguish 5G architecture from its
predecessors.
5G networks based on the 3GPP 5G specifications are an ideal environment
for MEC deployment. These specifications define the enablers for edge
computing, allowing MEC and 5G to collaboratively route traffic.
Distribution of computing power enables the high volume of connected
devices inherent to 5G deployment and the Internet of Things (IoT), in addition
to the latency and bandwidth benefits.
Convergence of RAN and core networks will require operators to leverage new
approaches to network testing and validation.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 46
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
3.1.7 eCPRI
Network dis-aggregation with the functional split also brings other cost benefits,
particularly with the introduction of new interfaces such as eCPRI. RF interfaces are
not cost effective when testing large numbers of 5G carriers as the RF costs rapidly
multiply. The original CPRI interface developed for 4G was vendor specific in many
instances, which made it problematic for operators. eCPRI interfaces provide a more
efficient solution as fewer interfaces can be used to test multiple 5G carriers. eCPRI
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 47
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
has been designated as a standard interface for 5G O-RAN fronthaul elements such
as the DU.
3.2.2 Beamforming
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 48
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
processing algorithms are used to determine the most efficient transmission path to
each user. Individual packets can be sent in multiple directions then choreographed
to reach the end user in a predetermined sequence.
With 5G data transmission occupying the millimeter wave, free space
propagation loss, proportional to the smaller antenna size, and diffraction loss,
inherent to higher frequencies and lack of wall penetration, are much greater. On the
other hand, the smaller antenna size also enables much larger arrays to occupy the
same physical space. With each of these smaller antennas potentially adjusting or
reassigning beam direction several times per millisecond, massive beamforming to
support the challenges of 5G bandwidth becomes more feasible. With a larger antenna
density in the same physical space, narrower beams can be achieved with massive
MIMO, providing high throughput and more effective user tracking.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 49
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 50
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 51
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
5G security practices build upon past mobile technology generations, yet the
“trust model” has expanded with more players involved in the service delivery
process.
The IoT and user propagation create an exponentially higher number of
endpoints with many of these traffic inputs no longer supervised by human
hands.
Improved 5G security features detailed by the 3GPP standards include unified
authentication to decouple authentication from access points, and public key
based encryption schemes to reduce the risk of metadata exploits.
Continual monitoring and assessment of security effectiveness are essential
as 5G critical performance nodes become increasingly virtualized.
Best practices include end-to-end 5G network security monitoring
encompassing the system architecture, devices, and apps.
Undoubtedly, 5G is delivering the exponential speed enhancement users have come
to expect with each new generation of mobile networks, but speed is just the
beginning. The changes to industries ranging from personal transportation to
manufacturing and farming are so significant that many have dubbed 5G the
next Industrial Revolution. At the heart of this paradigm shift is the multi-faceted 5G
architecture, with MEC, NFV massive MIMO and a cloud-aligned, service-based core
architecture working in concert to deliver the new wave of services. 5G test solutions
designed to accommodate this architectural seed change will be the true enablers of
the forthcoming 5G transition.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 52
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
subscriber types with diverse and sometimes contradictory requirements, and varying
application usage can be supported. So, instead of using a single monolithic network
serving multiple purposes, technology advancements such as Virtualization and SDN
allows us to build logical networks on top of a common and shared infrastructure
layer. These logical networks are then called Network Slices. he meaning of the term
Network Slice vary in the industry, but in general a Network Slice is a logical network
serving a defined business purpose or customer, consisting of all required network
resources configured together.
A Network Slice is realizing a complete network for any type of access and is an
enabler for providing services. The used physical or virtual infrastructure resources
may be dedicated to the Network Slice or shared with other Network Slices.
As the network slicing concept allows multiple logical networks to be created,
they can then be accommodated to realize a wanted network characteristic and
provide specific network capabilities to address a specific customer need. The
customer here is not directly the end-user, but a business entity that has requested
specific services from the network operator, e.g., an enterprise, another service
provider or the network operator itself. The Network Slices are orchestrated and
managed by management functions. The concept of network slicing and one definition
is summarized in Fig. 11.1.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 53
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 54
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
complete network slicing concept. However, of course, the existing means can also
be used within a Network Slice, to achieve a limited separation between resources.
An automated management process is important to realize the expectations from the
operators customers and to enable the possibly large number of Network Slices in an
operator s network. As to allow any type of Network Slices to be established and used
it was agreed to develop a generic framework for the Network Slice selection.
3.4 MULTI ACCESS EDGE COMPUTING(MEC)
Multi-Access Edge Computing (MEC) is an integral part of the 5G ecosystem.
MEC helps service providers to bring application oriented capabilities closer to the
users and support several latency sensitive use cases from the edge. The MEC
system brings networking and computing capabilities at the edge of the network to
optimize the performance for ultra-low latency and high bandwidth services. The initial
use cases of MEC were very specific to mobile networks and hence it was called as
Mobile Edge Computing (MEC). However, later on, the industry acknowledged the
general applicability of MEC for both wireless and wired networks and hence renamed
it to Multi-Access Edge Computing.
3.4.1 Need for MEC
Compute infrastructure for application services were existent in some form,
even in 4G and 3G networks. For example, video transcoding, WAN optimization,
Content Delivery Network (CDN) and transparent caching services were running
previously in the service providers core network in purpose built network equipment.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 55
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
However, with the growth in the number of mobile devices connecting to the network
and the explosion of data consumption, it is impossible to offer such application
services from a centralized location, without impacting the user experience. Hence, a
mobile edge computing infrastructure was conceptualized.
Some of the key drivers for MEC in 5G Network are:
Growth in the number of mobile devices connecting to the network (with IOT, it
is expected to explode even further)
Growth in the volume of data generated by the Over the Top (OTT) applications
such as social media, video streaming and online gaming.
Need for distributing the infrastructure where the application services are
hosted in a service provider network, to improve the application performance
and the user experience
Need for running application services in multiple locations to increase the
reliability of the services
Need for virtualizing the application services and eliminate the dependencies
with purpose-built hardware to simplify the management and orchestration of
multivendor functions
Dramatically reduce the network latency to support new use cases such as
Autonomous Cars, Virtual Reality, Augmented Reality and Robotic Surgeries
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 56
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 57
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
or server in the network. Thus, DNS records can be used to redirect traffic to a specific
application running on the MEC host.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 58
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
and media delivery services (for ex., Net Flix streaming). Normally, you
achieve this by de fining forwarding policies
In-line mode - MEC is deployed transparently, in an in-line mode. The
session connection is maintained with the original server, while all the
traffic traverses and goes through the application running in the MEC.
Examples of in-line MEC applications are transparent content caching
and security applications.
Tap mode - In Tap mode, data exchanged in a session is selectively
duplicated and forwarded to the tap MEC application. Some examples of
tap mode applications are virtual network probes, monitoring and security
applications.
Independent mode - MEC application and services run independently,
but still the MEC application is registered in the MEC platform and will
receive other MEC services, such as DNS and radio network information
(for ex., radio bearer statistics). Steering the traffic to the MEC is achieved
by con figuring local DNS or MEC host data plane.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 59
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 60
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 61
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 62
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
By deploying an MEC system within the Enterprise, service providers can let
the Enterprise host some of its corporate applications locally, without having to
compromise on the security requirements. When the corporate users move out of the
Enterprise coverage zone, they will also lose access to the applications hosted on the
MEC system, unless they access those applications through a VPN connection.
Enterprises such as healthcare providers, government institutions and industries can
get bene fitted by the locally deployed MEC. Applications that require ultra-low
latencies such as live streaming broadcasts and robotic surgeries can be hosted in
the MEC system.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 63
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 64
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
The Service Domain for Verticals includes all architectural innovations that
help to include the business-related considerations to the offered services (among
others, e-health, robotics, or enhanced video streaming services). Here, the key role
is played by two innovations which have been considered in the recent 5G PPP
projects, namely: the service layer and the concept of NetApps. The service layer
provides a common interface towards the management and the operation of the
network, enabling the interaction between the service intelligence and the underlying
network. The concept of NetApps comprises all 5Gnetwork empowered applications
that build a network service, through the usage of network slices. Slices are then
used to provide such network services, and encompass different network functions
(including core and access functions), possibly orchestrated over different clouds.
The different functions are operated in the Network Domain, arranged in different
slices according to the KPIs that they have to provide.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 65
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
The architecture shall natively support the quest for network automation that
is achieved through control loops and the usage of artificial intelligence algorithms
(the interested reader is referred to the AI/ML Whitepaper for more details).
Specifically, we identified two main loops: the first loop enabled by the service layer
that is leveraged by the service provider through the NetApps to steer the behaviour
of the network and the second loop that happens within the network domain, with
specific modules such as the network data analytics function (NWDAF) or the
Management Data Analytics Function (MDAF) designed for this purpose.
A list of network components and technologies supporting the cluster
architecture evolution is identified and split through several domains ,to support the
vertical’s use cases:
• Applications and use case experimentations, deploying and instantiation
of various services, including MEC servers, various APIs to signal
deployment on the edge, orchestrators for network slicing deployment
and various KPIs monitoring.
• Physical 5G infrastructure, hardware/PNFs and compute resources.
• Virtualized infrastructures, SDNs, VIM and platform monitoring tools
• Network slices and services resources orchestrators, inventories and
services catalogues, multi-site orchestrators and inventories, mobility
management and profiling, VNFs life cycle management
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 66
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 67
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Many of the 5G deployments announced in 2019 were deployed using the Non-
Standalone 3x Option with the legacy 4G’s Evolved Packet Core (EPC) as the mobile
core network to terminate 4G’s eNodeBs and 5G’s gNBs (i.e., Next Generation 5G
Radios). This kind of setup offers 1Gbps to 5Gbps downlink speed for the early 3GPP’s
5G enhanced Mobile Broadband (eMMB) service. The practical outdoor 5G downlink
speed for a UE (e.g., User Equipment such as a 5G Smartphone) is expected to be in
the range of 300Mbps vs. 10Mbps in 4G LTE now.
Note that when carriers advertise that their 5G networks have 10Gbps or more
throughput, they are referring to the peak data rate including control and management
traffic shared by 100s of UEs within a cell site.
3GPP Releases 16 and 17 will be standardized in late 2020 and 2021
respectively to support new 3GPP’s 5G services such as the:
Enhanced Mobile Broadband (eMMB) supporting 10Gbps or more downlink
speed shared by UEs in a cell sector
Ultra Reliable and Low Latency Communication (URLLC) supporting down
to 1ms network latency for advanced network applications such as real-time
robotic and autonomous driving
Massive Machine Type Communications (mMTC) supporting millions of
millions of wireless IoT and other devices simultaneously etc…
Vehicle to Anything Communication (C-V2X) allowing high-speed moving
vehicles to communicate with any servers and moving vehicles
We will start seeing these kinds of advanced 5G services to be offered by carriers from
early 2021.
This is a multi-part articles focusing on 5GC such as its architectural design, QoS
Flows and enforcement, and PDU (Packet Data Unit) session establishment and
modification for UEs to exchange mobile traffic with Data Networks such as the Internet
via gNB and 5GC etc… 5GC Wireshark traces will be used whenever applicable to
explain these topics.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 68
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
There are a lot of interesting architectural design and changes in the 5GC when
compare with the 4G’s Evolved Packet Core (EPC) such as:
Control and User Plane Separation to allow Control and User Plane systems to
scale up and down independently. This has been adopted by the 3GPP
Release 14 in 2017 and has been the principle of many new network
architecture initiatives such as the Software Defined Network (SDN)
Separation of Compute and Data to enable stateless Network Functions (NFs)
in the Control Plane for scalability and resilience. In 5GC’s control plane, all
NFs such as the UDM, SMF, PCF etc… do not keep their data inside their VMs
or Containers. Instead, all their data are stored “remotely” at the UDR (Unified
Data Repository) and the UDSF (Unstructured Data Storage Function) for
structured and unstructured 3GPP NF data storage respectively for stateless
NF operations. In other words, if a NF fails, the backup NF (stateless) can be
started up to retrieve the state and the data from the UDR and/or the UDSF to
continue the operations
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 69
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 70
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 71
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 72
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
SSC Mode 1 & 2 can work for PDU Type as IP and Ethernet whereas SSC
Mode 3 can be only work with PDU session type as IP
SSC Mode 1: With SSC mode 1, the 5G network preserves the connectivity
service provided to the UE. For the PDU session
Type as IPv4 or IPv6 or IPv4v6 type, the IP address is preserved. In this case the
User Plane function (UPF) acting as the PDU session anchor is maintained
(remains same) till the point UE release the PDU session.
SSC Mode 2: With SSC mode 2, the 5G network may release the connectivity
provided to the UE, i.e. the PDU Session can be released. If the PDU Session is
being used to transfer IP packets, then the allocated IP address is also released.
An usecase for this is a network may release connectivity if there is a requirement
for load balancing at the anchor UPF. Here, the PDU Session may be moved onto
a different anchor UPF by releasing the existing PDU Session and subsequently
establishing a new PDU Session. It works on break and make framework i.e. PDU
session will be release from first serving UPF and then a new PDU session is
established at new UPF.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 73
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
SSC Mode 3: With SSC mode 3, the network preserves the connectivity provided
to the UE but there may be some impact during certain procedures. For example,
the IP address allocated to the UE will be updated if the Anchor UPF changes but
the change procedure will ensure that connectivity is preserved, i.e. connectivity
towards the new Anchor UPF is established before releasing the connection to
the old Anchor UPF. The 3GPP release 15 only supports Mode 3 for IP
based PDU Sessions.
3.8.3 Working of Session and Service Continuity Mode
How does Session and Service Continuity Mode Selection Works?
The SSC mode selection policy is used to determine the type of session and
service continuity mode associated with an application or group of applications for
the UE. A MNO may provision the policy rules for UE to determine the type of mode
associated with an application or a group of applications. There can be a default
policy that matches all applications on UE.
When a UE initiates a PDU session it determines the which SSC mode it has to
use for a particular application by checking SSC mode selection policy and included
it within PDU session establishment request as “SSC mode” IE. In 5G Core, the
SMF can receive the list of supported SSC modes and the default SSC
mode per DNN per S-NSSAI as part of the subscription information from the UDM.
The SMF select the SSC mode by checking against subscriber data and
local SMF configuration and allowed SSC mode.
Based on selection results, the SMF can either accepts or modifies or rejects
based on UE subscription or local configuration. If UE does not provide SSC, then
SMF selects default SSC depending on the data network in subscription or local
configuration.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 74
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 75
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 76
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
EPC+
o Reference Point Interfaces, Sx interfaces including Sxa, Sxb, and Sxc
depending on CUPS.
o Proprietary protocol like Diameter,S1AP,eGTP-C,eGTP-U for each
interface.
o Possibility of deploying DECOR.
o Some Nodes/NFs should be upgraded prior to 5G NSA Deployment.
5GC (5G Core)
o Service-based interfaces for CP function group (Nsmf, Namf..etc) using
HTTP/2 based REST APIs.
o Reference point interfaces for UP NFs and their interconnections ( e.g.
N1, N2, N4, and N9) using proprietary interfaces such as EPC.
The core is the heart of a mobile network: Evolved Packet Core powers 4G LTE
networks, the 5G Core powers standalone 5G networks.
The Evolved Packet Core (EPC) converged voice and data by replacing circuit
switching with packet switching. That shed a foundational concept in
telecommunications: that point-to-point communications required an open circuit. The
convergence of voice and data as manageable digital information transformed mobile
communications. And 4G LTE has been a driver of global enterprise and consumer
telecom demand ever since.
The EPC was introduced by 3GPP in Release 8. The EPC comprises four core
elements. The core includes the Serving Gateway (SGW), the PDN Gateway (PGW),
the Mobility Management Entity (MME) and the Home Subscriber Server (HSS).
User equipment (UE) connects to the EPC through eNodeB base stations. The
SGW manages User Plane (UP) data, while the MME handles Control Plane (CP)
functions. The HSS manages User Equipment (UE) authentication. The PGW
connects the EPC to external IP networks.
“It was decided to have a ‘flat architecture’. The idea is to handle the payload
(the data traffic) efficiently from performance and costs perspective. Few network
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 77
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
nodes are involved in the handling of the traffic and protocol conversion is avoided,”
said the 3GPP.
5G Non-Standalone Architecture (NSA) pairs a 5G Radio Access Network (RAN) to
the EPC. Core network functions remain in the EPC.
5G’s Enhanced Mobile Broadband (eMBB) is the first practical exposure
enterprise and consumers have to 5G in most regions. And it’s the tip of the spear of
a new generation of 5G services. Those services only work with the transition to a
cloud-native core.
“This approach allowed new 5G services to be introduced quickly while maximizing
the reuse of existing 4G networks. However, this is also the reason why it’s impossible
to unlock 5G’s full potential using these networks to support the vast majority of critical
internet of things (IoT) and industrial automation use cases,” said Ericsson.
3.9.1 The transition to cloud-native
Enhanced broadband speeds and better reliability are hallmarks of 5G. But the
real meat of the new standard lies in other innovations. Ultra-reliable low latency
communications (URLLC), for example. Much greater UE density than ever before,
enabling massive machine-type communication (mMTC) and the Internet of Things.
Mobile edge computing (MEC) and network slicing, of course. Only the cloud-native
5G core makes and more this possible.
5G NSA gives carriers better operational flexibility to transition to 5G, and it’s
already attracting consumers in droves. 4G global network coverage continues to
expand in 2021, but 5G on a sharp rise, according to GSMA.
EPC will continue to serve as an engine for mobile telecommunications far into
the future. It’s the heart of 4G LTE networks. But the next transition for core network
functions comes with the standalone (SA) 5G Core (5GC). 3GPP Release 15 defined
the 5GC. The 5GC employs a cloud-native Service-Based Architecture (SBA).
Control and User Plane Separation (CUPS) which began in EPC continues in 5GC.
NFs communicate with each other via a Service-Based Interface (SBI). Each NF is
containerized and operates independently, and exposes its functionality to other NFs
through a SBI.
“The major difference with 5G Core (5GC) compared to EPC is that 5GC’s
control plane (CP) functions interact in a Service-Based Architecture (SBA),” said
Ericsson.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 78
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
The 5GC CP separates Access and Mobility Functions (AMF) and Session
Management Functions (SMF).
“Other changes include a separate Authentication Server (AUSF) and several
new functions, such as the Network Slice Selection Function (NSSF) and the Network
Exposure Function (NEF),” said Ericsson.
3.9.2 Cloud-native core
The cloud-native core of 5G enables more granular distribution of NFs. In a cloud-
native core, NFs operate as combinations of microservices, with some microservices
reused for multiple NFs. Microservices are Cloud Native Functions (CNFs), operating
in runtime environments called containers. CNFs can replace and work
alongside Virtual Network Functions (VNFs) in the same cloud.
Operating a 5GC telco cloud requires carriers to adopt a DevOps approach to
managing cloud-native core network operation. DevOps is a process of continuous
integration, development, deployment, testing, and monitoring central to cloud
computing. The DevOps lifecycle is a continuous state of flow. Each process is fluid,
happening continuously as part of an iterative, constant and repeating system.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 79
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Figure 3: Control Plane protocol stack between the UE, the 5G-AN, the AMF
and the SMF
NAS-SM: it supports the handling of Session Management between the UE and the
SMF. It supports user plane PDU Session Establishment, modification and release. It
is transferred via the AMF, and transparent to the AMF. It is defined in ‘Non-Access-
Stratum (NAS) protocol for 5G System (5GS); Stage 3’ (TS 24.501).
NAS-MM: it supports registration management functionality, connection management
functionality and user plane connection activation and deactivation. It is also
responsible of ciphering and integrity protection of NAS signalling. 5G NAS protocol is
defined in TS 24.501.
5G-AN Protocol layer: This set of protocols/layers depends on the 5G-AN. In the
case of NG-RAN, the radio protocol between the UE and the NG-RAN node (eNodeB
or gNodeB) is specified in the E-UTRA & E-UTRAN; ‘Overall description; Stage 2’ (TS
36.300) and the NR ‘Overall description; Stage-2’ in TS 38.300. In the case of non-
3GPP access, see clause 8.2.4.
NG Application Protocol (NG-AP): Application Layer Protocol between the 5G-AN
node and the AMF. NG-AP is defined in TS 38.413.
Stream Control Transmission Protocol (SCTP): This protocol guarantees delivery
of signalling messages between AMF and 5G-AN node (N2).
Note that there is also a direct communication between 5G-AN and SMF, called
N2 SM information: this is the subset of NG-AP information (not shown on the figure)
that the AMF transparently relays between the 5G-AN and the SMF, and is included
in the NG-AP messages and the N11 related messages.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 80
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Figure 4: User Plane Protocol Stack between the UE, the 5G-AN and the UPF
PDU layer: This layer corresponds to the PDU carried between the UE and the
DN over the PDU Session. When the PDU Session Type is IPv4 or IPv6 or
IPv4v6, it corresponds to IPv4 packets or IPv6 packets or both of them; When
the PDU Session Type is Ethernet, it corresponds to Ethernet frames; etc.
GPRS Tunnelling Protocol for the user plane (GTP U): This protocol
supports tunnelling user data over N3 (i.e. between the 5G-AN node and the
UPF) and N9 (i.e. between different UPFs of the 5GC) in the backbone network,
details see TS 29.281. GTP shall encapsulate all end user PDUs. It provides
encapsulation on a per PDU Session level. This layer carries also the marking
associated with a QoS Flow defined in clause 5.7. This protocol is also used on
N4 interface as defined in TS 29.244.
5G-AN protocol stack: This set of protocols/layers depends on the AN. When
the 5G-AN is a 3GPP NG-RAN, these protocols/layers are defined in TS 38.401.
The radio protocol between the UE and the 5G-AN node (eNodeB or gNodeB)
is specified in TS 36.300 and TS 38.300. L2 is also called the "Data Link Layer"
and the L1 is the "Physical Layer".
UDP/IP: These are the backbone network protocols.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 81
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
NAS is defined in contrast to the Access Stratum which is responsible for carrying
information over the wireless portion of the network. A further description of NAS is
that it is a protocol for messages passed between the User Equipment, also known as
mobiles, and Core Nodes (e.g. Mobile Switching Center, Serving GPRS Support
Node, or Mobility Management Entity) that is passed transparently through the radio
network. Examples of NAS messages include Update or Attach messages,
Authentication Messages, Service Requests and so forth. Once the User Equipment
(UE) establishes a radio connection, the UE uses the radio connection to
communicate with the core nodes to coordinate service. The distinction is that the
Access Stratum is for dialogue explicitly between the mobile equipment and the radio
network and the NAS is for dialogue between the mobile equipment and core network
nodes.
For LTE, the Technical Specification for NAS is 3GPP TS 24.301. For NR, the
Technical Specification for NAS is TS 24.501.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 82
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
The protocol name NGAP is derived from the interface name NG with the
addition of Application Protocol
NGAP supports all mechanisms requires to manage the procedures
between gNB and AMF
NGAP also supports transparent transport for NAS procedures that are
executed between the UE and the AMF
NGAP does not have any version negotiation, it support forward and
backwards compatibility of the protocol by a mechanism where all current and
future messages, and IEs or groups of related IEs, include ID
and criticality fields that are coded in a standard format that will not be changed
in the future
NGAP is applicable both to 3GPP access and non-3GPP accesses integrated
with 5GC
NGAP relies on a reliable transport mechanism and is designed to run on top
of SCTP
The key difference between NGAP and S1AP is that S1AP was designed only
for 3GPP access (E-UTRAN) and not non-3GPP accesses
NGAP is applicable to any access and defined in 3GPP TS
38.413 specification. Support for specific parameters related to non-3GPP
accesses have been added to the protocol when needed
N2 interface between gNB and AMF performs management functions, for
example NG Setup, Reset, Error Indication, and Load Balancing
NGAP supports Initial UE Context Setup functionality for establishment of an
initial UE context at gNB
NGAP Provides the UE capability information to the AMF during UE capability
exchange
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 83
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
It also support PDU Session Setup, modification, and release for user
plane resources
Paging over NGAP, providing the functionality to page UE within 5GC
NGAP allows Trace of active UEs.
UE location reporting and positioning protocol support.
NGAP supports Warning message transmission for emergency services
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 84
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
The transport bearer is identified by the GTP-U TEID and the IP address (source
TEID, destination TEID, source IP address, destination IP address).
GTP is a fundamental workhorse of mobile user plane packet data.
GSM, UMTS, LTE & NR all have one protocol in common – GTP – The GPRS
Tunneling Protocol.
So why do every generation of mobile data networks from GSM/GPRS in 2000, to 5G
NR Standalone in 2020, rely on this one protocol for transporting user data
Why GTP?
GTP – the GPRS Tunnelling Protocol, is the protocol which encapsulates and
tunnels IP packets from the internet / packet data network, to and from the User.
Why encapsulate the packets? What if the Base Station had access to the
internet and routed the traffic to the users?
If we were to do that, we would have to have large pools of IP addresses
available at each Base Station and when a user connected they’d be assigned
an IP Address and traffic for these users would be routed to the Base Station
which would forward it onto the user.
This would work well until a user moves from one Base Station to another, when
they’d have to get a new IP Address allocated.
TCP/IP was never designed to be mobile, as an IP address only exists in a
single location.
Breaking out traffic directly from a base station would have other issues, such
as no easy way to enforce QoS or traffic policies, meter usage, etc.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 85
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
2. GTP Packets
When looking at a GTP packet of user data at first glance it seems not much is
involved.
Like in most tunneling / encapsulation protocols we have the original network / protocol
stack of IPv4 and UDP, and a payload of a GTP packet.
The packet itself is pretty simple, with flags denoting a items such as the version
number, the message type (T-PDU), the length of the GTP packet and the payload
(used for delineating the end of the payload), a sequence number an a Tunnel
Endpoint Identifier (TEID).
From a mobility standpoint, a feature of GTP is that it takes IP packets and puts
them into a stream with out-of-band signalling, this means we can change the
parameters of our GTP stream easily without touching the encapsulated IP Packet.
When a UE moves from one base station to another, all that has to happen is
the destination the GTP packets are sent to is changed from the old base station to
the new base station. This is signalled using GTP-C in GPRS/UMTS, GTPv2-C in LTE
and HTTP in 5G-SA.
Traffic to and from the UE are similar to above, the only difference would be the first
IPv4 address would be different, but the IPv4 address in the GTP tunnel would be the
same.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 86
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
The operation of IPsec is based upon negotiated connections between peer devices.
These connections are called Security Associations.
A Security Association (SA) is a one-way connection that provides security
services between IPsec peers. For example, SAs determine the security protocols and
the keys. An SA is uniquely identified by a combination of:
A random number called the Security Parameter Index (SPI)
An IP destination address
A security protocol header, either AH (Authentication Header) or ESP (IPsec
Encapsulating Security Payload)
You can choose IPsec in tunnel mode to implement site-to-site VPN. A site-to-
site VPN is used to connect two sites together, for example a branch office to a head
office, by providing a communication channel over the Internet. This saves a company
having to pay for expensive leased lines. Employees gain full access to all company
resources as if they were physically in the office connected to the corporate LAN.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 87
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
As an open standard as a part of the IP suite, IPsec uses the following protocols to
perform various functions.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 88
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 89
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 90
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 91
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
The transport mode is usually used when another tunneling protocol (such as GRE,
L2TP) is used to first encapsulate the IP data packet, then IPsec is used to protect
the GRE/L2TP tunnel packets.
5.3. How IPsec works
There are two phases to build an IPsec tunnel as IKE phase 1 and IKE phase 2.
5.3.1 IKE Phase 1
In IKE phase 1, first the IPsec peers are authenticated thus protecting the identities
of the peers. Then the Internet Key Exchange (IKE) Security Associations (SA)
policy is negotiated among the peers. This results in both the parties to have a
shared secret matching key that helps in the IKE phase two. Also, in this phase,
there is setting up of a secure tunnel through which the exchange of information for
phase two will occur.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 92
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
exchange is for the verification of the other side’s identity. All three of these
exchanges are bi-directional.
2)Aggressive Mode
There are fewer exchanges in this mode. All the required information is squeezed
making it faster to use. The only trouble is that information is shared before there is a
secure channel making this mode vulnerable.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 93
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 94
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
Each mode provides strong protection, but using a slightly different solution.
IPSec is broken into multiple protocols.
Internet Key Exchange (IKE) protocol
Authentication Header (AH) protocol
Encapsulating Security Payload (ESP) protocol
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 95
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
What is GRE?
Generic Routing Encapsulation, or GRE, is a protocol for encapsulating data packets
that use one routing protocol inside the packets of another protocol. "Encapsulating"
means wrapping one data packet within another data packet, like putting a box inside
another box. GRE is one way to set up a direct point-to-point connection across a
network, for the purpose of simplifying connections between separate networks. It
works with a variety of network layer protocols.
In this analogy, the type of terrain is like the network that supports certain routing
protocols, and the vehicles are like data packets. GRE is a way to load one type of
packet within another type of packet so that the first packet can cross a network it
could not normally cross, just as one type of vehicle (the car) is loaded onto another
type of vehicle (the ferry) to cross terrain that it otherwise could not.
For instance, suppose a company needs to set up a connection between the local
area networks (LANs) in their two different offices. Both LANs use the latest version
of the Internet Protocol, IPv6. But in order to get from one office network to another,
traffic must pass through a network managed by a third party — which is somewhat
outdated and only supports the older IPv4 protocol.
With GRE, the company could send traffic through this network by encapsulating IPv6
packets within IPv4 packets. Referring back to the analogy, the IPv6 packets are the
car, the IPv4 packets are the ferry, and the third-party network is the water.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 96
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
But imagine that a tunnel was created through the mountain. Now, the car can
drive straight from Point A to Point B, which is much faster, and which it could not do
without the tunnel.
But GRE creates a virtual "tunnel" through the "mountain" network in order to allow
the data packets to pass through. Just as a tunnel creates a way for cars to go straight
through land, GRE (and other tunneling protocols) creates a way for data packets to
go through a network that does not support them.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 97
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
packet comes from and what group of packets it belongs to. Each network protocol
attaches a header to each packet.
GRE adds two headers to each packet: the GRE header, which is 4 bytes long, and
an IP header, which is 20 bytes long. The GRE header indicates the protocol type
used by the encapsulated packet. The IP header encapsulates the original packet's
header and payload. This means that a GRE packet usually has two IP headers: one
for the original packet, and one added by the GRE protocol. Only the routers at each
end of the GRE tunnel will reference the original, non-GRE IP header.
How does the use of GRE impact MTU and MSS requirements?
MTU and MSS are measurements that limit how large data packets traveling
over a network can be, just like a weight limit for automobiles crossing a bridge. MTU
measures the total size of a packet, including headers; MSS measures the payload
only. Packets that exceed MTU are fragmented, or broken up into smaller pieces, so
that they can fit through the network.
Like any protocol, using GRE adds a few bytes to the size of data packets. This
must be factored into the MSS and MTU settings for packets. If the MTU is 1,500 bytes
and the MSS is 1,460 bytes (to account for the size of the necessary IP and TCP
headers), the addition of GRE 24-byte headers will cause the packets to exceed the
MTU:
1,460 bytes [payload] + 20 bytes [TCP header] + 20 bytes [IP header] + 24 bytes [GRE
header + IP header] = 1,524 bytes
This can be avoided by reducing the MSS to accommodate the GRE headers.
If the MSS is set to 1,436 instead of 1,460, the GRE headers will be accounted for and
the packets will not exceed the MTU of 1,500:
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 98
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
1,436 bytes [payload] + 20 bytes [TCP header] + 20 bytes [IP header] + 24 bytes [GRE
header + IP header] = 1,500 bytes
While fragmentation is avoided, the result is that payloads are slightly smaller,
meaning it will take extra packets to deliver data. For instance, if the goal is to deliver
150,000 bytes of content (or about 150 kB), and if the MTU is set to 1,500 and no
other layer 3 protocols are used, compare how many packets are necessary when
GRE is used versus when it is not used:
Part-A
1. What are the benefits of MEC? (Any Four)
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Page No: 99
CEC331 4G / 5G COMMUNICATION NETWORKS UNIT-III Network Architecture and the Processes
7. In 5G networks, what does GTP stand for? What is the need for GTP?
GTP is used in LTE networks to carry user data – from GSM/GPRS, UMTS/3G,
4G/LTE and 5G:
GPRS Tunnelling Protocol User Plane (GTP-U): The GTP-U protocol is used over S1-
U, X2, S4, S5 and S8 interfaces of the Evolved Packet System (EPS). GTP-U Tunnels
are used to carry encapsulated T-PDUs and signalling messages between a given
pair of GTP-U Tunnel Endpoints. The Tunnel Endpoint ID (TEID) which is present in
the GTP header indicates which tunnel a particular T-PDU belongs to.
The transport bearer is identified by the GTP-U TEID and the IP address (source
TEID, destination TEID, source IP address, destination IP address).
GTP is a fundamental workhorse of mobile user plane packet data.
Why GTP?
GTP – the GPRS Tunnelling Protocol, is the protocol which encapsulates and
tunnels IP packets from the internet / packet data network, to and from the User.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Within the various frequency bands dedicated to 5G, each carrier has begun to
carve out their own individual portions of the 5G spectrum.
10. Why encapsulates the packets? What if the Base Station had access to the
internet and routed the traffic to the users?
If we were to do that, we would have to have large pools of IP addresses
available at each Base Station and when a user connected they’d be assigned
an IP Address and traffic for these users would be routed to the Base Station
which would forward it onto the user.
This would work well until a user moves from one Base Station to another, when
they’d have to get a new IP Address allocated.
TCP/IP was never designed to be mobile, as an IP address only exists in a
single location.
Breaking out traffic directly from a base station would have other issues, such
as no easy way to enforce QoS or traffic policies, meter usage, etc
Part-B
1. Explore the 5G architecture and core in detail, discussing its intricacies.
2. Elaborate on the concept of network slicing in 5G networks.
3. Analyze the concept of Multi-Access Edge Computing (MEC) and provide an
explanation?
3. Describe the visualization of 5G components, emphasizing their interconnections
and functions?
4. Articulate the end-to-end system architecture concept of 5G networks, emphasizing
its key components and their interactions?
5. Elucidate the concepts of session and service continuity in 5G networks,
emphasizing their significance and operational mechanisms?
6. Clarify the relationship between Evolved Packet Core (EPC) and edge computing,
highlighting their interconnected roles and functionalities?
7.Explain in details about 5G protocols: 5G NAS,
8. Elucidate the 5G protocols, with a specific focus on 5G NGAP, highlighting its
functionalities and its integral role within the broader 5G network architecture?
9. Explain the GTP-U protocol in 5G, detailing its functionalities and its significance
within the broader 5G network architecture?
8. Explain the IPSec protocol in 5G, delineating its functionalities and emphasizing its
importance within the broader 5G network architecture?
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
10. Discuss about the GRE protocol in 5G, detailing its functionalities and emphasizing
its role within the broader 5G network architecture?
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
UNIT IV
DYNAMIC SPECTRUM MANAGEMENT AND MM-WAVES
Syllabus
Mobility management, Command and control, spectrum sharing and spectrum
trading, cognitive radio based on 5G, millimeter waves.
The mobile station attempts to find a suitable cell by passing through the list in
descending order of received signal strength, the first BCCH channel, which satisfies
a set of requirements it has selected.
The requirements that a cell must satisfy before a mobile station can receive service
from it are −
It should be a cell of the selected PLMN. The mobile station checks whether the
cell is part of the selected PLMN.
It should not be "barred". The PLMN operator may decide not to allow mobile
stations to access certain cells. These cells may, for example only be used for
handover traffic. Barred cell information is broadcast on the BCCH to instruct
mobile stations not to access these cells.
The radio path loss between the mobile station and the selected BTS must be
above a threshold set by the PLMN operator.
If no suitable cell is found then the MS enters a "limited service" state in which
it can only make emergency calls.
As an active mobile station (MS) moves in the coverage area of a public land mobile
network (PLMN), it reports its movements so that it can be located as needed, using
the update procedure locations. When a mobile services switching center (MSC) in
the network needs to establish a call to a mobile station operating in its flow area,
following things occur −
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
A page message its broadcast which contains the identification code of the MS.
Not every Base Station Controller (BSC) in the network is requested to transmit
the page message. The broadcast is limited to a cluster of radio cells that
together form a location area. The last reported position of the MS identifies the
location area to be used for the broadcast.
The MS monitors the page message transmitted by the radio cell in which it is
located and, on detecting its own identification code, responds by transmitting
a page response message to the Base Transceiver Station (BTS).
Communication is then established between the MSC and the MS via BTS that
received the page response message.
3. Location Update
If location never updates the implementation for location update, cost becomes zero.
But we have to page every cell for locating the MS and this procedure will not be cost
effective.
Location updates are taking place as per the requirements of the network, may
be time or movement or distance based. This procedure involves high cost, but we
have to page single cell or few cells only for locating the MS and this procedure will
be cost effective.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Radio spectrum is a prime factor in driving the growth of mobile services. The success
of 5G network is based on the unconstrained availability of spectrum. About 1200 MHz
of spectrum in the frequency bands below 5 GHz has been identified for IMT services
during World Administrative Radio Conference (WARC)-92, World Radio
communication Conference (WRC)-2000 and WRC-2007. These frequency bands are
450–470 MHz, 698–960 MHz, 1710–2025 MHz, 2110–2200 MHz, 2300–2400 MHz,
2500–2690 MHz, and 3400–3600 MHz.
The identified spectrum is noncontiguous and scattered in different frequency
bands from 450 MHz to 3.4 GHz. However, the actual allocation is ranging between
the frequency band 700 MHz and 2.6 GHz. The irony is that these identified frequency
bands have already been allocated to legacy services long back. Therefore, no vacant
spectrum is available especially below 6 GHz at present for mobile communications.
The options available to enhance the spectrum availability for 5G communications are
spectrum re-farming, spectrum sharing and use of cognitive radio technology.
Moreover, this identified 1200 MHz noncontiguous spectrum could not hold the
pressure of high mobile data growth, demand for convergence of different varieties of
services and speed as envisaged in 5G network.
Assigning a new radio spectrum is crucial to meet the expected demands for
future 5G networks. This is possible by exploiting higher microwave frequencies,
referred as millimeter (mm-wave) bands. Therefore, mm-frequency band is the
obvious and the most preferred band for 5G network. The 5G network envisages as a
combination of several micro, pico and femto cells embedded within a macro cell.
According to physical law, coverage decreases with increasing frequency. The mm-
waves can be divided into different categories, the first one ranging between 20 and
40 GHz frequency bands for micro sites and the other one is around 60 GHz frequency
band for pico and femto cell sites. With the increase in the number of wireless devices,
the number of wireless connections and high data rate networks rises. This leads to
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
the two important factors spectrum demand and spectrum congestion, turning out to
be the two critical challenges for the forthcoming wireless communication world.
Simultaneously the user’s requirements such as high multimedia data rate
transmission based on the bandwidth demanding applications will make the future
wireless networks to suffer from the spectrum scarcity.
• This method does not make spectrum to be utilized efficiently in rural areas as the
spectrum utilization is heavy in the urban regions and underutilized in the rural areas.
It is sad to see the spectrum underutilized and not accessible to all. It is difficult for
some nations to provide 4G services itself. There is a need for taking serious steps in
handling spectrum issues by implementing sophisticated technologies for the
development of nation. In these cases the techniques like spectrum trading would
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
The CR technology also brings new security and pricing challenges which are
shown in the Figure 4.2.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
New security threats appear with the dynamic spectrum access concept, as well
as the CR’s authentication needs.
The pricing is very much influenced by the used channel allocation scheme.
Additionally, CRs must be designed with strong capabilities to negotiate the
available channels’ price.
Spectrum handover The phenomenon of frequency changing dynamically is
said to be spectrum handover. A secondary user changes its frequency on
appearance of a primary user or due to transmission degradation. This
necessitates designing a handover scheme
Environment adaptation Different changes like topological changes, noise or
interference power may occur while sensing the information. In order to adapt
to these changes and to maintain the constant performance new adaptation
techniques have to be implemented which is an important point of concern .
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
4.5.2 CR based on 5G
As already stated earlier CR technology would be a major modality to build the
integrated 5G network. The various functionalities for 5G that could be met with CR
usage are as follows :
• Advanced PHY and MAC technologies.
• Implementation of novel and flexible protocols.
• Capacity to support homogenous and heterogeneous systems.
• Adaptation to different changes like environment changes, dynamic frequency
changes, etc.
Correlation between WISDOM and CR in reference to 5G could be given as: “5G
brings the convergence concept through WISDOM and CR represents the
technological tool to implement it.” The 5G technology eliminates the radio terminals
that are specific to particular wireless technologies and proposes a universal terminal
which must include all of the predecessor features in a single device. This terminal
convergence is supported by the users’ needs and demands and is strongly found in
CR terminal .
In mm-waves allow larger bandwidth and offer high data transfer and low latency
rate that are suitable for high speed reliable Internet services. The small wavelength
facilitates small size antenna and other part of radio hardware, which reduces costs
and also easy to install. The transmitter’s antenna would be like a lamppost, which
could be installed on building, street lamppost, etc. .
High directionality attained in this band can be used to increase spatial
multiplexing. The size of antenna required for a mm-waves radio can be one-tenth or
less of an equivalent lower frequency radio which is an advantage to the manufactures
to build smaller and lighter systems. Beam width is the measure of how a transmitted
beam spreads out as it gets farther from its point of origin. But due to limited availability
of radio frequency (RF) bands the fifth generation wireless communication systems
will move to ultra-high capacity mm-wave bands.
High frequency makes mm-wave band more attractive for wireless
communication system and these frequencies are used in terrestrial and satellite
communications. Wireless products that use millimeter waves already exist for fixed,
LOS transmissions But the absorption rate of the mm-wave electromagnetic signal
poses great challenges for their utilization in the non-LOS and mobile connections. On
the other hand, high directionality achieved in this band can be used to increase spatial
multiplexing.
Wireless backhaul will be another key enabler of 5G-mm-wave small cells .
Within the mm frequencies, the frequency band of 60 GHz has attracted the
researchers to work with, as the large amounts of bandwidth are unallocated in this
band, bandwidths that are required for communication systems at the intended data
rates of 100 Mbps and above.
Also, another advantage of 60-GHz band is due to a physical property of the
propagation channel at this frequency that provides a natural way for reduction of
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
frequency reuse factor, which tends to compact cell size . It is a general property of
the mm-wave propagation that the behaviour of the propagation rays is well
characterized by the geometric optics. That is, the waves do not penetrate the walls
or other obstacles and wave reflection is the main mechanism leading to a multipath.
In mm-waves have the potential to support broad-band service access which is
especially relevant because of the advent of Broadband Integrated Service Digital
Network (BISDN).
With the development of personal wireless communication systems, two things
are appearing to be significant:
• Exploiting high frequency bands, such as mm-waves to provide
broadband for high rate data transmission.
• To integrate multi-tasks in one system which greatly extend the
application of wireless device.
The utility of mm-waves for the micro cells that form the WISDOM based GIMCV
are well positioned to be served by these mm-waves. It has been elaborated in these
following points:
• It is relatively easy to get licenses for big blocks of mm-wave spectrum,
which would allow carriers to deploy large backhaul pipes over 1 Gbps in size.
While a single small cell may not need that much capacity, the complexity of
heterogeneous networks will require daisy-chaining many small cells together,
each cell passing its load down the line.
• Small cell backhaul makes the best use high frequency characteristics
of mm-waves. The higher the frequency the shorter distance a wave propagates
unless it gets a serious power boost. But the heterogeneous network by
definition will be composed of densely packed cells in urban environments,
meaning no mm-waves will have to travel far between hops.
The traditional uses of the mm-waves include radio navigation, space research,
radio astronomy, earth exploration satellite, radar, military weapons and other
applications. The backbone/backhaul networks (point to point network) for existing
telecom network to connect base station to main switching centre (MSC), Local
Multipoint Distribution System (LMDS), indoor WLAN, high capacity dense networks
are also present in the mm-waves.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
The typical microwave backhaul bands are at 6.0 GHz, 11.0 GHz, 18.0 GHz,
23.0 GHz, and 38.0 GHz frequency bands. The light use of mm-waves could be
attributed to high attenuation and low penetration. At such high frequency, waves are
more prone to rain and other atmospheric attenuation. The wavelength is in the order
of millimeters, and rain drops are also of the same size. Rains absorb high frequency
waves and make it difficult for propagation.
However, the experimental results show that in heavy rain condition, attenuation
is 1.4 dB and 1.6 dB for 200 meters distance at 28 GHz and 38 GHz, respectively .
The rain attenuations at 60 GHz for a rainfall rate of 50 mm/h, is approximately 18
dB/km . A proper link design with slightly high transmit power may take care of rain
attenuation. Slight change in the position would affect the signal strength at the
receiving end, due to which mm-waves are deeply affected by scattering, reflection
and refraction. The root mean square (RMS) delay spread for mm-waves is of the
order of few nano seconds, and it is high for are non-LOS (NLOS) links than (LOS)
links .
Similarly, path loss exponent for NLOS links is higher than LOS links. Due to
higher path loss and RMS delay spread, it is assumed that mm-waves are not suitable
for (NLOS) links. However, these difficulties could be managed by using carrier
aggregation, high order MIMO, steerable antenna, beam-forming techniques.
Recently, extensive measurements to understand the propagation
characteristics for defining the radio channel have been carried out at 28 GHz in the
dense urban areas of New York City and at 38 GHz cellular propagations
measurements were conducted in Austin, Texas, at the University of Texas main
campus. The measurements were conducted to know the details about angle of arrival
(AoA), angle of departure (AoD), RMS delay spread, path loss, and building
penetration and reflelction characteristics for the design of future mm-wave cellular
systems. The propagation feasibility studies at 28 GHz and 38 GHz showed that
propagation is feasible up to 200 meters of distance in both the conditions, i.e., (LOS)
and (NLOS) with transmit power of the order of 40–50 dBm in a difficult urban
environment. This is size of micro cell in the urban areas.
The frequency bands around 60 GHz is best suited for pico and femto cell due
to high data carrying capacity and small reuse distance due to strong oxygen
absorption at the rate of 15 dB/Km. The usage in frequency bands around 60 GHz is
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
highly sparse, which provides freedom to allocate a large bandwidth to every channel.
Moreover, equipment can be made very compact due to the very small antenna size.
Much research work has been done for indoor channel characteriszation at 60
GHz band but a very few work has been done for outdoor characteriszation. In
reference measurements were carried out for narrowband CW for received power
against separation distance in different environments mainly airport field, urban street
and city tunnel.
4.6.1 The measurement Setup
A channel sounder based on correlation has been used for the measurement
for centre frequency of 59.0 GHz with a bandwidth of 200 MHz. A 90◦-horn antenna
was used at transmitting end and a biconical horn with an elevation beamwidth of 20◦
was used at receiver in all the measurements.
The measurement was carried out for path loss exponent and RMS delay
spread. The result found that path loss exponent was between 2 and 2.5 for outdoor
environment and RMS delay spread was lower than 20 ns. Result also included that
multipath phenomenon was bad at parking garage due to large dimensions and
smooth surface as compared to city streets and road tunnel, where multipath
phenomenon was not much significant.
In measurements were carried out at 55 GHz in city streets of London (UK)
with moderate traffic density using a fixed transmitter and a mobile receiver, with link
distances not greater than 400 m. The transmitter installed at 10 m above the ground
level and receiver was mobile mounted over the roof of a car. The test signal was
narrowband FM signal generated through Gunn oscillator and fed to a 25-dBi horn
antenna.
The result found that path loss exponent was 3.6 for a T-R separation of 400 m
with LOS path and path loss exponent was 10.4 for same Tx-Rx separation in NLOS
condition. In order to understand the radio channel propagation characteristics,
extensive propagation measurements in urban environment hasve been carried out
long back at the campus of Delft University of Technology, Netherlands . The
measurements for frequency fading over 100 MHz bandwidth centered around 59.9
GHz were done almost exclusively in the time-domain by using network analyzsers
and channel sounders. The block diagram of the measurement system used in
reference for the frequency-domain characteriszation of the radio-channel is shown
in Figure 4.3.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
The two main components are signal generator towards transmitter side and
spectrum analyser at receiver side. A flat omnidirectional antenna (2 dBi, 120◦) was
used at transmitter side and omnidirectional (120◦) and patch directional antenna
(pencil beam, 19.5 dBi, 15◦) were used at receiver side. Measurements with both were
done in order to see the difference in performance, because omnidirectional antenna
allows for more reflected components to enter the receiver. The measurements were
conducted for statistics of the ‘k’ factor of Rice distribution and the path loss coefficient
for the pico cell of the order of 50 m radius at three different locations including outdoor
and indoor. The measurements were done in possible locations for the mobile
multimedia communication.
The measurements were taken in the corridor area (indoor) of the University for
the Rice factor k and received power versus distance with TX–RX separation of 12–
15 m are shown in Figures 4.4 and 4.5 below. The measurements were taken in the
parking area (outdoor) of the University for received power versus distance on
logarithmic scale with TX–RX separation of 12–15 m is shown in Figure 4.6.
The measurement results show that propagation is feasible upto 10–15 m in the
indoor and outdoor urban environment, which is normal size of pico cell.
The Radiocommunication Sector of International Telecom Union (ITU) is
responsible for management of radio spectrum at international level. As per ITU-R
frequency allocation plan , the frequency band 10–40 GHz has been earmarked for
satellite based services in all the three regions along with Fixed and mobile services.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Local Multipoint Distribution System (LMDS), WLAN, Satellite services and High
capacity dense network etc. are main services present in mm-waves. Several point to
point fixed microwaves links are also working in this band. These links are basically
for backbone/backhaul network for GSM and other services. A good amount of vacant
spectrum is available at mm-waves which could be utiliszed for 5G communications
services. 5G services may transmit high power approximately 40–50 dBW. Therefore,
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
coexistence study needs to be carried out with existing LMDS and satellite services,
that would be working in neighbouring spectrum bands.
Part-A
3 Justify the necessity of spectrum trading, examining its key factors and
implications in the context of telecommunications.
Command and control method does not make spectrum to be utilized efficiently in rural
areas as the spectrum utilization is heavy in the urban regions and underutilized in the
rural areas. It is sad to see the spectrum underutilized and not accessible to all. It is
difficult for some nations to provide 4G services itself. There is a need for taking
serious steps in handling spectrum issues by implementing sophisticated technologies
for the development of nation. In these cases the techniques like spectrum trading
would be a successful solution. This will only lead to the development of 5G
communications in these types of countries.
4. Outline the Collective Use of Spectrum (CUS) significance in the field of
wireless communications
The Collective Use of Spectrum (CUS) allows spectrum to be used by more than one
user simultaneously without requiring a license. Some of the examples that come
under spectrum sharing are frequency reuse concept in the existing telecom networks
FDMA, TDMA. Another important challenge is the sharing of spectrum among the
heterogeneous networks.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
(f) Small wavelength makes possible use of large antenna arrays for adaptive beam
forming.
(g) Small size of antenna at mm-waves facilitates easy integration on chip and
installation at suitable locations.
Part-B
1. Discuss in detail about the principles of mobility management in 5G communication.
2. Elaborate on the concept of command and control in 5G wireless communication.
3. Elucidate the concepts of spectrum sharing and spectrum trading in the field of
telecommunications?
4. Discuss the concept of cognitive radio within the context of 5G, examining its
principles and assessing its role and impact on advanced communication systems.
5. Explain both the concept of millimeter waves and assessing their applications within
the domain of wireless communication?
6. Discuss the measurement setup of mm waves and examining their characteristics
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
UNIT V
SECURITY IN 5G NETWORKS
Syllabus
Security features in 5G networks, network domain security, user domain security, flow
based QoS framework, mitigating the threats in 5G.
Introduction
A 5G cybersecurity toolbox/solution offers improved network security through
international mobile subscriber identity (IMSI) encryption. Additionally, all traffic data
sent over the 5G network is encrypted, integrated, protected, and follows a mutual
authentication policy to ensure maximum data protection.
Like most IP networked devices, 5G is vulnerable to MITM (Man-in-the-Middle)
attacks. These attacks use IMSI catchers and malicious core networks. They pose as
devices from authorized mobile network operators and collect sensitive information.
Mobile operators need to adopt a hybrid cloud-based approach where sensitive
data is stored locally and less sensitive data stored in the cloud. This provides
operators with more access and control over the data, and they can decide where and
whom to share it with.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
access security generally has access specific components that is, the detailed
solutions, algorithms, etc. differ between access technologies. With 5GS, a large
degree of harmonization has been done across access technologies, e.g. to use
common access authentication.
The system now allows authentication over NAS to be used over both 3GPP
and Non3GPP access technologies.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
before being able to access the terminal or before being able to use the SIM card in
the terminal.
5.2.5 Application domain security
Application domain security is the security features used by applications such
as HTTP (for web access) or IMS. Application domain security is generally end-to-end
between the application in the terminal and the peer entity providing the service. This
contrasts with the previous security features listed that provide hop-by-hop security
that is, they apply to a single link in the system only. If each link (and node) in the
chain that requires security is protected, the whole end-to-end chain can be
considered secure.
Since application-level security traverses on top of the User Plane transport
provided by 5GS, and as such is transparent to 5GS.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
configure whether the use or provision of a service will depend on whether a security
feature is in operation.
5.3.1 Introduction
Most of the text in this chapter has so far concerned network access security,
i.e. the security features that support a UE access to the 5GS. It is important to
consider security aspects also of network-internal interfaces, both within a PLMN and
between PLMNs in roaming cases. This has however not always been the case. When
2G (GSM/GERAN) was developed, no solution was specified for how to protect traffic
in the core network. This was perceived not to be a problem, since the GSM networks
typically were controlled by a small number of large institutions and were trusted
entities. Furthermore, the original GSM networks were only running circuit-switched
traffic. These networks used protocols and interfaces specific for circuit-switched voice
traffic and typically only accessible to large telecom operators. With the introduction of
GPRS as well as IP transport in general, the signaling and User Plane transport in
3GPP networks started to run over networks and protocols that are more open and
accessible to others than the major institutions in the telecom community. This brought
a need to provide enhanced protection also to traffic running over core network
interfaces. For example, the core network interfaces may traverse third-party IP
transport networks, or the interfaces may cross operator boundaries as in roaming
cases.
3GPP has therefore developed specifications for how IP-based traffic is to be
secured also in the core network and between one core network and another (core)
network. On the other hand, it should be noted that even today, if the core network
interfaces run over trusted networks, for example a physically protected transport
network owned by the operator, there would be little need for this additional protection.
Below we will discuss both the general Network Domain Security (NDS) solution that
was specified already for 3G and 4G and is re-used with 5GS, but also look at new
5GS solutions that have been developed specifically for the Service Based interfaces
(i.e. the interfaces that use HTTP/2). In this area the interfaces between domains are
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
of special importance, the roaming interface (N32) between PLMNs as well as the
interfaces between 5GS and 3rd parties used for Network Exposure.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
message. Instead, application layer security needs to be used for protection between
the SEPPs. Application layer security means that the message is protected inside the
HTTP/2 body which allows some Information Elements in the message to be
encrypted while other Information Elements are sent in clear text. The Information
Elements that an IPX provider have reasons to inspect would be sent in clear text
while other Information Elements, that should not be revealed to intermediate entities,
are encrypted. Using Application layer security also allows an intermediate entity to
modify the message.
The SEPPs use JSON Web Encryption (JWE, specified in RFC 7516) for
protecting messages on the N32 interface, and the IPX providers use JSON Web
Signatures (JWS, specified in RFC 7515 (RFC 7515)) for signing their modifications
needed for their mediation services. It should be noted that even if TLS is not used to
protect NF-to-NF messages carried between two SEPPs in this case, the two SEPPs
still establish a TLS connection in order negotiate the security configuration
parameters for the Application Layer Security.
If there are no IPX entities between the SEPPs, TLS is used to protect the NF-
to-NF messages carried over the two SEPPs. In this case there is no need to look
inside the messages or to modify any part of the message carried between the SEPPs.
places Security Gateways (SEGs) to protect the control-plane traffic that passes in
and out of the domain.
All NDS/IP traffic from network entities of one security domain is routed via an
SEG before exiting that domain toward another security domain. The traffic between
the SEGs is protected using IPsec, or to be more precise, using IPsec Encapsulated
Security Payload (ESP) in tunnel mode. The Internet Key Exchange (IKE) protocol
version 2, IKEv2, is used between the SEGs to set up the IPsec security associations.
An example scenario is illustrated in Fig. 5.4(adapted from 3GPP TS 33.210).
context is the secure access to the USIM. Access to the USIM will be blocked until the
USIM has authenticated the user. Authentication is in this case based on a shared
secret (the PIN code) that is stored inside the USIM. When the user enters the PIN
code on the terminal, it is passed on to the USIM. If the user provided the right PIN
code, the USIM allows access from the terminal/ user, for example to perform the
AKA-based access authentication.
5.5 Flow Based Qos Framework
The QFI is carried in an (GTP-U) encapsulation header on N3 (and N9) i.e.
without any changes to the end-to-end packet header. Data packets marked with the
same QFI receives the same traffic forwarding treatment (e.g. scheduling, admission
threshold). The QoS Flows can be GBR QoS Flows i.e. that require guaranteed flow
bit rate, or QoS Flows that do not require guaranteed flow bit rate (Non-GBR QoS
Flows). Fig. 5.5 illustrates the classification process and the differentiated packet
forwarding provided by the NG-RAN of data packets in DL (i.e. packets arriving at UPF
which pass through toward the UE) and data packets in UL (i.e. packets generated by
the UE e.g. in application layer which are sent to the network). The data packets are
shown to be IP packets, but same principles can be applied for Ethernet frames.
In DL, the data packets are compared in UPF towards Packet Detection Rules
(PDR), see Chapters 6 and 10, installed by the SMF, as to classify the data packets
(e.g. against IP 5-tuple filters in the PDR). Each PDR is then associated with one or
more QoS Enforcement Rule(s) (QER) that contains information for how to enforce
e.g. bitrates. The QER also contains the QFI value to be added to the GTP-U header
(N3 encapsulation header).
In this example, the data packets of five IP flows are classified into three QoS
Flows and then sent toward the 5G-AN (in this case NG-RAN) via the NG-U Tunnel
(i.e. N3 tunnel). The NG-RAN, based on the QFI marking and the corresponding per
QFI QoS Profile received e.g. during the establishment of the PDU Session, decides
how to map the QoS Flows to DRBs. The Service Data Adaptation Protocol (SDAP),
specified in 3GPP TS 37.324, is used to enable multiplexing if more than one QoS
Flow is sent on a DRB, i.e. if the NG-RAN decides to setup a DRB per QFI then the
SDAP layer is not needed. Unless Reflective QoS is used. If so the SDAP is used, see
3GPP TS 38.300. For QFI 5, the NG-RAN decides to use a dedicated DRB, but QFI2
and QFI3 are multiplexed on the same DRB. When there is SDAP configured then an
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
SDAP header is added on top of PDCP, i.e. there is some overhead added to the data
packets, and the SDAP is used for the QoS Flow to DRB mapping. The QoS Flow to
DRB mapping can also be defined using RRC reconfiguration in which case a list of
QFI values can be mapped toward a DRB. The NG-RAN then sends the data packets
using the DRBs toward the UE. The UE SDAP layer keeps any QFI to DRB mapping
rules, and the data packets are forwarded internally toward the application layer
socket interfaces in the UE without any 3GPP specific extensions e.g. as IP packets.
In UL, the UE application layer generates data packets which first are compared with
the set of installed packet filters from the Packet Filter Sets in the UE. The Packet
only QoS Flow there is no need to include any SDAP header, while QoS Flows 2 and
3 are sent on DRB2 with SDAP header indicating the QFI of the data packet. The NG-
RAN uses the available information as to decide how to mark the N3 header of each
data packet and forwards the data packet to the UPF. The UPF resolves the data
packets into IP flows, and the UPF also performs any bitrate policing and other logic
as directed by the various N4 rules provided by the SMF e.g. counting.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Functions (VNFs), service providers have to turn-on DNS level security features to
block bad domains and bad talkers from accessing the network.
Network operations teams must deploy security software that blocks
compromised VNFs, prevents VM hopping and blocks container image packages with
vulnerabilities. In addition, Virtualized Infrastructure components must be continuously
monitored for added protection.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham
Mobile operators need to adopt a hybrid cloud-based approach where sensitive data
is stored locally and less sensitive data stored in the cloud. This provides operators
with more access and control over the data, and they can decide where and whom to
share it with.
Part-B
1. Summarize the security features in 5G networks.
2. Discuss about network domain security in 5G networks.
3. Discuss in detail about flow based Qos framework in 5G networks.
4. Write brief overview about network domain security in 5G networks.
5. Enumerate the ways to mitigate the threats in 5G.
Department of Electronics and Communication Engineering | NPR College of Engineering and Technology, Natham