Overcoming 4g To 5g Migration
Overcoming 4g To 5g Migration
L LC
uR
mM
TC
G
5
eM
BB
KEY BENEFITS Service providers are in a race against competitors, continuing to monetize
Control Insights their current investment in 4G while rapidly transitioning to 5G to ensure
Policy control and intelligent traffic
customer retention and competitive advantage. To enable success, it’s
management over multiple traffic
types tailored for service provider critical to have interoperable solutions with current infrastructure for the
networks.
following areas:
Security
Security controls at multiple • Signaling interworking in the migration from 4G to 5G
points and across multiple layers,
providing end-to-end network • Transitioning to best of suite S/Gi-LAN to N6 service-based interface
protection.
• Implementing cloud-native 5G infrastructure
Visibility
Monitor traffic into and within
the infrastructure, improving This paper aims to help the reader understand the evolution from 4G to 5G,
operational efficiency, easing what it enables, and how to get there.
troubleshooting, and creating
flexible revenue controls.
Background
Migrating to a new mobile technology is far from straightforward and requires strong
collaboration to ensure success. 5G is the turning point of innovation, accelerating
new opportunities with new technologies. The key differentiator with 5G vis a vis its 4G
predecessor is that 5G is designed to leverage 4G LTE technology – the new must work
with the existing technology and networks. This makes the complexity and permutations
boundless. The key to success for service providers is working with reliable partners that
have solved the 4G challenges and continue to solve 5G challenges regardless of where
the service providers are in their digital transformation journey.
5G rollouts are moving full speed ahead but what has not been clearly forged is how 4G will
coexist with 5G technology. Every service provider must construct their very own unique
migration path, leveraging their existing network as they try to monetize their 5G investments.
5G was by no means meant to render any technology obsolete – it was designed with the
exact opposite in mind.
VATION
Y AU INNO
LIT
BI T
A
O
FIT
MA
REASE PRO
TIO
SECU ITY
N
Reduce 5G &
INC
TTM Security
AG
IL
IT
RED TS Y& Y
UCE COS F L E X I B ILI T
Figure 1: Unique journey from
4G to 5G
Increase automation, Adapting for
modularity, and flexibility emerging industry
S I G N A L I N G I N T E R W O R K I N G I N T H E M I G R AT I O N F R O M
4G TO 5G
HTTP/2
Diameter
4G EPC 5G Core
HTTP/2
4G EPC 5G Core
4G Charging 5G Charging
System System
4G Charging 5G Charging
System System
TODAY’S NETWORKS FUTURE NETWORKS
N1 N2 N4
S-GW AS MME CSCF S-GW NRF PCRF AMF
UE UPF DN
Uu N3
N9
gNB
Diameter and SIP Signaling Diameter and HTTP/2 Signaling HTTP/2 Signaling
Interworking Interworking
Pure 4G Diameter ONLY
Translation: N5 → Rx Translation: N5 → Rx
Packet Core Session Binding:
Session Binding: Session Binding:
Diameter Gx/Rx DRA
DRA; Gx/N5 DRA; Gx/N5
Interworking
4G/5G Mix Interworking Interworking
Translation:
Packet Core(s) Translation: Rx → N5 Translation: N5 → Rx
N5 → Rx; Rx → N5
Diameter Gx/Rx, Session Binding: Session Binding:
Session Binding:
HTTP/2 N4 DRA; N4/Rx Gx/N5; ; NRF/SBI
DRA; Gx/N5; N4/Rx
Interworking Interworking
Pure 5G HTTP/2 ONLY
Figure 4: Hybrid core 4G/5G transition Translation: Rx → N5 Translation: Rx → N5
Packet Core Session Binding:
paths use IWF for applications, Session Binding: Session Binding:
HTTP/2 N4 NRF/SCP/SMF
charging, and intercarrier N4/Rx N4/Rx; NRF/SBI
• Optimization of 5G SBA signaling controls to enable better network visibility and boost
network performance by continuously coordinating with other network functions.
Control Plane
NETWORK RESOURCE MANAGEMENT SIGNALING SCP: Service
Communications
Proxy
SUBSCRIBER AND
POLICY MANAGEMENT SUBSCRIBER DATA MANAGEMENT
SESSION MANAGEMENT
User Plane
N3IWF UPF
F5’s Service Communication Proxy (SCP) supports the following use cases:
AMF SMF AUSF UDM NRF PCRF + PCF OCS OCS AAA CHF HSS + UDM
5G 5G 5G 5G
Network
IMS
Network 4g/5g RAN
4G Diameter
5G HTTP/2 Data
Network
• Session binding capabilities to support the interworking with IMS (VoLTE) services
delivered over NR
F5’s Security Edge Protection Proxy (SEPP) will support the following:
• Roaming security: SEPP sits on the edge of the network, protecting the network from
threats originating from roaming partners and IPX providers. SEPP includes message
filtering and policing on inter-PLMN control plane interfaces, as well as topology hiding.
Control Plane
SEPP SEPP
N32
• Network Signaling • Network Signaling
• Mobility Management • Mobility Management
• Subscriber Data Management • Subscriber Data Management
• Network Resource Management • Network Resource Management
• Policy Management • Policy Management
Data Plane
Figure 7: Security Edge Protection
Proxy (SEPP) N6 N6
UE UPF DN UPF UE
Access UPF TCP Video LDNS DPI Subscriber CGNAT Firewall Internet
Network Optimization Optimization Security & DDoS
Services
TCP & Video Application CGNAT IoT Subscriber Gi Firewall DDoS Secure
Optimization Identification Firewall Security Protection DNS Cache
Reporting Services
F5’s N6 LAN solution allows dynamic service chaining based on real-time subscriber and
Figure 9: F5’s consolidated N6
LAN solution
application awareness, along with delivering secure N6 LAN. By deploying a common, shared
set of commercial, off-the-shelf (COTS) hardware to run various functions, a service provider
can reduce hardware costs and deploy multiple services dynamically. This cloud model
means you can deliver services based on real-time network conditions and use network
resources more efficiently. Because you can launch new services without any network
downtime, you also increase service agility. A containerized N6 LAN lets you innovate,
improve subscriber QoE, and lower costs resulting in a 60% TCO.
CONSOLIDATION OF
SERVICES RESULTED IN A
60% SAVINGS ON TOTAL
COST OF OPERATION.
60%
TCO Savings With
• “Zero Copy” memory architecture optimizes
resource consumption
I M P L E M E N T I N G C O N TA I N E R I Z E D 5 G C L O U D - N AT I V E
• Visibility: Network traffic visibility is vital in any mobile network and even more so in a
5G network. Kubernetes inherently does not provide ingress or egress traffic visibility
into the Kubernetes nodes and clusters.
• Security: Security controls need to be applied at multiple points in the network and
across multiple layers. Enabling packet capture and the ability implement security at
container ingress is critical to ensuring that bad traffic stays out of a service provider’s
network. Enabling encryption is also fundamental in a 5G network security offering.
• Control: Policy management and analytics enable network control and are essential in
automating an already complex 5G network.
CONTAINERS
VIRTUALIZATION LAYER-KUBERNETES
Figure 11: Cloud-native
containerization COMPUTE NETWORK STORAGE
• Aspen Mesh
BIG-IP Service Proxy for Kubernetes (SPK) provides critical carrier-grade capabilities to a
Kubernetes environment, enabling extended performance and security for cloud-native 5G
deployments. SPK features include:
Service Proxy
F5 SERVICE
http/2 http/2 Diameter
Diameter - TCP/SCTP
SPK
HTTP/2 - TCP
• Load balancing: Provides load balancing for Layer 4 and Layer 7 (TCP, UDP, SCTP,
HTTP/S, HTTP/2/S, Diameter, GTPcV2. and SIP).
OPTIMIZED TRAFFIC To touch on a few of the value areas above, security services such as distributed denial-
STEERING ENABLES A TCO of-service (DDoS) protection, firewall, and web application firewall (WAF) can be applied
REDUCTION OF 47%. at ingress to prevent malicious traffic from entering the cluster and impacting the 5G
core network functions and customer applications. Additional security is also provided
by SmartNIC, in partnership with Intel, which implements a signaling firewall. This firewall
provides ingress security, preventing compromised traffic from entering the cluster while
providing optimized traffic steering which enables a TCO reduction of 47%. The SmartNIC
can be used to offload and optimize specific network services (such as cryptographic security
functions and packet processing). This alleviates strain on CPU resources and prevents CPU
overload resulting in significant performance improvements.
KUBERNETES CLUSTER
F5 SERVICES
NODE
BIG-IP
Next None
Legitimate
Users
SPK
Malicious
Attackers NODE
Intel
SmartNIC
Intel QAT
SVC
BIG-IP
Next
SPK
Signaling
Revenue
Assurance
Aspen Mesh
F5’s service mesh delivers a configurable and low-latency infrastructure layer designed to
handle a high volume of communication among services using APIs and provides critical
capabilities including:
Service discovery
• Observability
• L7 policy management
F5 IS COMMITTED The service mesh builds on open source Istio and is implemented by providing a proxy
UNDERSTANDING AND instance, called a sidecar, for each service instance. Sidecars handle interservice
CONQUERING THE communications, monitoring, and security-related concerns thus offering an abstraction
CHALLENGES OF 5G layer for individual services (applications). By providing a sidecar data plane at every app
DEPLOYMENT. (CNF container), F5 Aspen Mesh can intercept all ingress and egress container traffic. This
capability enables CNF sidecar traffic capture, including intra-node CNF traffic and pre-
encryption tapping, and also reduces SSL load for brokers. The service proxy easily integrates
AMF SMF
Aspen Aspen
Mesh Mesh
Aspen Mesh
Control Plane
F5’s Cloud-Native Infrastructure solution is essential for all top tier service providers,
providing visibility, control, security, and scale for 5G network deployments. This solution is
pivotal in reducing cost and complexity when deploying and operating a 5G network from the
Core, edge, and far edge.
KUBERNETES CLUSTER
NODE
WEST - EAST
Aspen Aspen
Mesh Mesh
BIG-IP
Next
AMF-P1 AMF-P1
SPK
The transition journey is unique for every service provider and F5 is committed to
understanding and conquering challenges that may arise during the deployment of innovative
5G networks.
©2022 F5, Inc. All rights reserved. F5, and the F5 logo are trademarks of F5, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com.
Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, expressed or implied, claimed by F5, Inc.
300SP | 988234021