Podcast
Questions and Answers
Which of the following represents a core principle of the 5G system architecture related to network function behavior?
Which of the following represents a core principle of the 5G system architecture related to network function behavior?
- Favoring "stateful" NFs, where the "compute" resource is coupled with the "storage resource".
- Enabling each network function to interact with other network functions directly, minimizing reliance on intermediaries. (correct)
- Prioritizing stateless network functions to decouple access and control plane functionalities.
- Maximizing dependencies between the access network and core network to ensure tight integration.
In 5G Core, a single UE can only connect to a single network slice at any given time, ensuring isolation and exclusive resource allocation.
In 5G Core, a single UE can only connect to a single network slice at any given time, ensuring isolation and exclusive resource allocation.
False (B)
Within the context of the 5G core network architecture, what critical role does the Authentication Server Function (AUSF) play, particularly concerning the provisioning of security information?
Within the context of the 5G core network architecture, what critical role does the Authentication Server Function (AUSF) play, particularly concerning the provisioning of security information?
The AUSF is crucial for performing authentication and providing security information to the AMF. This process ensures only authorized devices can access the network.
The ______ function is responsible for enabling secure exposure of 3GPP network capabilities and events to external entities.
The ______ function is responsible for enabling secure exposure of 3GPP network capabilities and events to external entities.
Link the following 5G Core architectural components with their corresponding functions:
Link the following 5G Core architectural components with their corresponding functions:
Which feature is NOT included on release 15’s new 5G core architecture?
Which feature is NOT included on release 15’s new 5G core architecture?
In 5G Core architecture, the User Plane Function (UPF) is exclusively responsible for mobility management.
In 5G Core architecture, the User Plane Function (UPF) is exclusively responsible for mobility management.
What is the key benefit of CUPS (Control and User Plane Separation) architecture implemented in 5G Core networks?
What is the key benefit of CUPS (Control and User Plane Separation) architecture implemented in 5G Core networks?
The ______ is a function in 5G Core used to select a set of network slice instances that a UE will use.
The ______ is a function in 5G Core used to select a set of network slice instances that a UE will use.
Match each standardized 5QI value with a service example:
Match each standardized 5QI value with a service example:
Which protocol uses traffic steering at UPF to route traffic to proper destination?
Which protocol uses traffic steering at UPF to route traffic to proper destination?
The 3GPP mandates a specific hardware configuration and operating system for implementing 5G Core network functions to ensure standardization.
The 3GPP mandates a specific hardware configuration and operating system for implementing 5G Core network functions to ensure standardization.
Elaborate on the significance and function of the Subscription Concealed Identifier (SUCI) within the context of 5G network security and subscriber privacy.
Elaborate on the significance and function of the Subscription Concealed Identifier (SUCI) within the context of 5G network security and subscriber privacy.
Within the 5G core architecture, the role of ______ is to provide service discovery and selection functionalities, facilitating the registration and deregistration of network function services.
Within the 5G core architecture, the role of ______ is to provide service discovery and selection functionalities, facilitating the registration and deregistration of network function services.
Match each mobility case used in 5GC with its description:
Match each mobility case used in 5GC with its description:
Which of the following best describes the function of 'network slicing' in 5G core networks?
Which of the following best describes the function of 'network slicing' in 5G core networks?
In a 5G network architecture, the UE is required to simultaneously support both 3GPP and non-3GPP access technologies, necessitating a unified access management procedure.
In a 5G network architecture, the UE is required to simultaneously support both 3GPP and non-3GPP access technologies, necessitating a unified access management procedure.
Within the context of 5G Core, elaborate on the role of Policy and Charging Control (PCC) and how it facilitates differentiated Quality of Service (QoS) handling for diverse services.
Within the context of 5G Core, elaborate on the role of Policy and Charging Control (PCC) and how it facilitates differentiated Quality of Service (QoS) handling for diverse services.
The architectural approach wherein network functions expose their capabilities through a ______ is known as Service-Based Architecture (SBA) in 5G core networks.
The architectural approach wherein network functions expose their capabilities through a ______ is known as Service-Based Architecture (SBA) in 5G core networks.
Match each 3GPP 5G standard architecture option based on its characteristics
Match each 3GPP 5G standard architecture option based on its characteristics
Which of the following defines a group of entities as serving the service’s operations in 5GC?
Which of the following defines a group of entities as serving the service’s operations in 5GC?
In the context of the 5G Core network, the Network Slice Selection Assistance Information (NSSAI) is exclusively provided by the User Equipment (UE) and cannot be influenced or modified by the network.
In the context of the 5G Core network, the Network Slice Selection Assistance Information (NSSAI) is exclusively provided by the User Equipment (UE) and cannot be influenced or modified by the network.
Detail the procedure for a Service Request in 5G and its relation to Discovery.
Detail the procedure for a Service Request in 5G and its relation to Discovery.
In 5G architecture, IMS relies on ______, to function.
In 5G architecture, IMS relies on ______, to function.
Please match the PDU Session types with their description:
Please match the PDU Session types with their description:
A logical network serving defined business purpose or customer?
A logical network serving defined business purpose or customer?
The 5G Core stipulates that edge computing deployments must exclusively use operator-owned infrastructure to ensure security and control.
The 5G Core stipulates that edge computing deployments must exclusively use operator-owned infrastructure to ensure security and control.
What is meant by ‘slicing’ the network, and its aim?
What is meant by ‘slicing’ the network, and its aim?
5G core architecture must leverage ______ interactions between control plane network functions.
5G core architecture must leverage ______ interactions between control plane network functions.
Match the 5G terms with their definitions:
Match the 5G terms with their definitions:
“CUPS” is CP/UP separation of [blank]?
“CUPS” is CP/UP separation of [blank]?
In 5G Core, network slicing is primarily intended to enhance the performance of legacy 4G LTE networks by offloading excess traffic.
In 5G Core, network slicing is primarily intended to enhance the performance of legacy 4G LTE networks by offloading excess traffic.
What is Network Exposure Function (NEF)?
What is Network Exposure Function (NEF)?
The 5G Core uses ______ for it's main coding language/protocol.
The 5G Core uses ______ for it's main coding language/protocol.
Match the different 5G Core evolution stages with a brief description
Match the different 5G Core evolution stages with a brief description
Which of the following accurately describes the role and deployment scope of the 5G Core Session Boundary Controller (SBC)?
Which of the following accurately describes the role and deployment scope of the 5G Core Session Boundary Controller (SBC)?
In the context of 5G Quality of Service, Guaranteed Bit Rate (GBR) flows are exclusively utilized for non-real-time data services to ensure optimal resource allocation.
In the context of 5G Quality of Service, Guaranteed Bit Rate (GBR) flows are exclusively utilized for non-real-time data services to ensure optimal resource allocation.
In 5G core, detail what is considered 5G system and what does it consist of?
In 5G core, detail what is considered 5G system and what does it consist of?
In 5GC the AF, or Application Function, helps implement ______ to perform UE location.
In 5GC the AF, or Application Function, helps implement ______ to perform UE location.
In the context of 5G core network slicing, which of the following encapsulates the principle of tailoring network capabilities to specific customer needs, driving the demand for differentiated service offerings?
In the context of 5G core network slicing, which of the following encapsulates the principle of tailoring network capabilities to specific customer needs, driving the demand for differentiated service offerings?
The 5G Core architecture mandates that all network functions (NFs) must be implemented as physical appliances to ensure optimal performance and security.
The 5G Core architecture mandates that all network functions (NFs) must be implemented as physical appliances to ensure optimal performance and security.
In the evolution towards 5G core networks, the transition from monolithic integrated nodes to ______ marks a critical shift towards enhanced resource utilization and operational efficiency.
In the evolution towards 5G core networks, the transition from monolithic integrated nodes to ______ marks a critical shift towards enhanced resource utilization and operational efficiency.
What paradigm shift does 'CUPS' (Control and User Plane Separation) represent in the evolution of mobile core network architecture?
What paradigm shift does 'CUPS' (Control and User Plane Separation) represent in the evolution of mobile core network architecture?
Explain the operational and architectural considerations necessary when migrating a 5G Core network from a non-standalone (NSA) to a standalone (SA) deployment, especially concerning service continuity and subscriber management.
Explain the operational and architectural considerations necessary when migrating a 5G Core network from a non-standalone (NSA) to a standalone (SA) deployment, especially concerning service continuity and subscriber management.
Which of the following is not a primary technical specification that defines the architecture and procedures of the 5G system?
Which of the following is not a primary technical specification that defines the architecture and procedures of the 5G system?
In 5G Core architecture, the Access and Mobility Management Function (AMF) is solely responsible for user authentication and has no role in mobility management once the session is established.
In 5G Core architecture, the Access and Mobility Management Function (AMF) is solely responsible for user authentication and has no role in mobility management once the session is established.
Describe the implications of selecting Session and Service Continuity (SSC) mode 3 for a PDU session on the User Plane Function (UPF) selection and IP address assignment during mobility events in a 5G network.
Describe the implications of selecting Session and Service Continuity (SSC) mode 3 for a PDU session on the User Plane Function (UPF) selection and IP address assignment during mobility events in a 5G network.
Which identifier is primarily used to conceal the Subscription Permanent Identifier (SUPI) over the air interface in 5G networks, enhancing user privacy against IMSI-catcher attacks?
Which identifier is primarily used to conceal the Subscription Permanent Identifier (SUPI) over the air interface in 5G networks, enhancing user privacy against IMSI-catcher attacks?
The 5G Core architecture introduces a ______ where control plane network functions can interact with each other through well-defined interfaces, promoting modularity and scalability.
The 5G Core architecture introduces a ______ where control plane network functions can interact with each other through well-defined interfaces, promoting modularity and scalability.
Match the following 5G Core network functions with their primary roles:
Match the following 5G Core network functions with their primary roles:
The AMF (Access and Mobility Management Function) in 5G core exclusively supports devices with SIM cards, rendering it incapable of managing devices that connect without traditional SIM-based authentication.
The AMF (Access and Mobility Management Function) in 5G core exclusively supports devices with SIM cards, rendering it incapable of managing devices that connect without traditional SIM-based authentication.
What key advancement related to network slicing was achieved in 3GPP Release 17 regarding frequency band utilization?
What key advancement related to network slicing was achieved in 3GPP Release 17 regarding frequency band utilization?
What is the primary role of the Network Exposure Function (NEF) in a 5G core network?
What is the primary role of the Network Exposure Function (NEF) in a 5G core network?
The ______ function in 5G core is critical for enabling service discovery, selection and authorization, providing a centralized repository of available network functions and their capabilities.
The ______ function in 5G core is critical for enabling service discovery, selection and authorization, providing a centralized repository of available network functions and their capabilities.
What mechanism is defined for usage monitoring, application steering, spending limits within the PCC (Policy and Charging Control) framework?
What mechanism is defined for usage monitoring, application steering, spending limits within the PCC (Policy and Charging Control) framework?
The Unified Data Management (UDM) function in 5G Core solely manages user subscription data and has no role in storing or managing policy data.
The Unified Data Management (UDM) function in 5G Core solely manages user subscription data and has no role in storing or managing policy data.
Discuss the technical challenges and solutions associated with enabling seamless interworking between a 5G core network and existing 4G LTE infrastructure, especially concerning session continuity and quality of service.
Discuss the technical challenges and solutions associated with enabling seamless interworking between a 5G core network and existing 4G LTE infrastructure, especially concerning session continuity and quality of service.
In 5G, the User Plane Function (UPF) plays a crucial role. Which of the following functions lies within the UPF's responsibilities?
In 5G, the User Plane Function (UPF) plays a crucial role. Which of the following functions lies within the UPF's responsibilities?
Which of the following is a key aspect of 5G Core architecture enhancing security and trust?
Which of the following is a key aspect of 5G Core architecture enhancing security and trust?
Describe various architectural options to support IMS voice services in 5G and the trade-offs.
Describe various architectural options to support IMS voice services in 5G and the trade-offs.
According to 3GPP specifications for 5G, network slicing mandates that user plane functions for different slices must always be co-located to minimize latency.
According to 3GPP specifications for 5G, network slicing mandates that user plane functions for different slices must always be co-located to minimize latency.
What fundamental change is enabled by the introduction of the NRF within a 5G core network?
What fundamental change is enabled by the introduction of the NRF within a 5G core network?
A successful implementation of the 5G core hinges upon a robust ______ framework, providing comprehensive insights into network performance, security threats, and user behaviour.
A successful implementation of the 5G core hinges upon a robust ______ framework, providing comprehensive insights into network performance, security threats, and user behaviour.
Instructions: Match these network specifications with their descriptions:
Instructions: Match these network specifications with their descriptions:
5G core slicing guarantees Quality of Service
5G core slicing guarantees Quality of Service
Which identifier is used to ensure subscriber privacy?
Which identifier is used to ensure subscriber privacy?
In the context of edge network computing, which potential role could be assumed by a network operator?
In the context of edge network computing, which potential role could be assumed by a network operator?
Which of the is a driver of CUPS (Control & User Plane Separation)
Which of the is a driver of CUPS (Control & User Plane Separation)
When did 5GC SBA base architecture get it's release?
When did 5GC SBA base architecture get it's release?
A given PDU session can utilize more than one slice.
A given PDU session can utilize more than one slice.
There main 3GPP specs, which of the following is not one of them.
There main 3GPP specs, which of the following is not one of them.
Match what these all offer to the user:
Match what these all offer to the user:
What is UDICOM (Rel-16)?
What is UDICOM (Rel-16)?
For slicing to work, the RAN (radio access network) cannot be shared accross slices.
For slicing to work, the RAN (radio access network) cannot be shared accross slices.
When 5G Core is built upon EPS, what two options does it support when adding NR.
When 5G Core is built upon EPS, what two options does it support when adding NR.
What is the point at which we 'make before break' and hold a PDU, according to Service and Continuity (SSC) Mode 3
What is the point at which we 'make before break' and hold a PDU, according to Service and Continuity (SSC) Mode 3
Which statement correctly characterizes 5G System architecture's approach to Network Functions (NFs)?
Which statement correctly characterizes 5G System architecture's approach to Network Functions (NFs)?
In 5G core network evolution, the "virtualized deployment" phase is characterized by software-defined infrastructure and automated life-cycle management.
In 5G core network evolution, the "virtualized deployment" phase is characterized by software-defined infrastructure and automated life-cycle management.
What is the crucial role of the Session Management Function (SMF) in conjunction with the User Plane Function (UPF) regarding Quality of Service (QoS) within a 5G network?
What is the crucial role of the Session Management Function (SMF) in conjunction with the User Plane Function (UPF) regarding Quality of Service (QoS) within a 5G network?
In 5G, the ______ is the logical network entity primarily tasked with ensuring that a User Equipment (UE) is admitted to a network slice based on predefined criteria.
In 5G, the ______ is the logical network entity primarily tasked with ensuring that a User Equipment (UE) is admitted to a network slice based on predefined criteria.
Which parameter pair is used by the Access and Mobility Management Function (AMF) to select a Session Management Function (SMF) for a new PDU session in 5G?
Which parameter pair is used by the Access and Mobility Management Function (AMF) to select a Session Management Function (SMF) for a new PDU session in 5G?
In the context of 5G Core, the User Data Repository (UDR) is responsible for storing subscription data specifically for policy decisions, while the Unified Data Management (UDM) stores subscription data for authentication purposes.
In the context of 5G Core, the User Data Repository (UDR) is responsible for storing subscription data specifically for policy decisions, while the Unified Data Management (UDM) stores subscription data for authentication purposes.
What critical enhancement in 5G Core architecture, related to User Plane latency, is facilitated by the CUPS architecture?
What critical enhancement in 5G Core architecture, related to User Plane latency, is facilitated by the CUPS architecture?
The 5G architecture uses 3GPP TS ______ to specify procedures and flows to capture interactions between the user equipment and network functions.
The 5G architecture uses 3GPP TS ______ to specify procedures and flows to capture interactions between the user equipment and network functions.
Within a 5G core network, what is the primary function of the 'Network Exposure Function' (NEF)?
Within a 5G core network, what is the primary function of the 'Network Exposure Function' (NEF)?
In 5G Core, network slicing is primarily a RAN (Radio Access Network) concept with minimal impact on Core Network architecture.
In 5G Core, network slicing is primarily a RAN (Radio Access Network) concept with minimal impact on Core Network architecture.
In Network Slicing, what three dimensions are part of the strategy?
In Network Slicing, what three dimensions are part of the strategy?
Radio Access Network slicing allows for the ______ of network resources, enabling mobile network operators to offer customized services tailored to varying use case requirements.
Radio Access Network slicing allows for the ______ of network resources, enabling mobile network operators to offer customized services tailored to varying use case requirements.
Match the following 5G Core architectural enhancements with their respective descriptions:
Match the following 5G Core architectural enhancements with their respective descriptions:
What is a primary driver behind the move towards cloud-native and automated operations in 5G core networks?
What is a primary driver behind the move towards cloud-native and automated operations in 5G core networks?
In 5G Core architecture, the Access and Mobility Management Function (AMF) is solely responsible for managing mobility within the core network, while session management (SMF) handles all aspects of radio resource allocation.
In 5G Core architecture, the Access and Mobility Management Function (AMF) is solely responsible for managing mobility within the core network, while session management (SMF) handles all aspects of radio resource allocation.
In terms Subscriber Data Management, what identifier relates to privacy in 5G?
In terms Subscriber Data Management, what identifier relates to privacy in 5G?
In 5G Core, a ______ is a scalar used as reference to specific QoS forwarding behavior.
In 5G Core, a ______ is a scalar used as reference to specific QoS forwarding behavior.
Which functional component of the 5G core architecture is responsible for supporting the policy control on LTE/NR?
Which functional component of the 5G core architecture is responsible for supporting the policy control on LTE/NR?
The UE Route Preference (URSP) is static, and does not modify traffic based on the route.
The UE Route Preference (URSP) is static, and does not modify traffic based on the route.
During network slice selection, what element exchanges info with AMF and RAN to build up information about supported Network Slices per TA (Tracking Area)?
During network slice selection, what element exchanges info with AMF and RAN to build up information about supported Network Slices per TA (Tracking Area)?
Flashcards
Network Slicing
Network Slicing
Enables tailored services with a large span of requirements and customer segments.
Network Slice
Network Slice
A definition. A logical network serving a business purpose or customer, consisting of all required network resources. Created, changed and removed by management functions.
Use-case-specific Networks
Use-case-specific Networks
Logical network offerings delivered using network slices.
Edge Computing
Edge Computing
Signup and view all the flashcards
3GPP
3GPP
Signup and view all the flashcards
Service Based Architecture(SBA)
Service Based Architecture(SBA)
Signup and view all the flashcards
System Architecture for 5G System
System Architecture for 5G System
Signup and view all the flashcards
Procedures for 5G System
Procedures for 5G System
Signup and view all the flashcards
Policy and Charging Control Framework
Policy and Charging Control Framework
Signup and view all the flashcards
5G System (5GS)
5G System (5GS)
Signup and view all the flashcards
5G Access Network (AN)
5G Access Network (AN)
Signup and view all the flashcards
5G Core Network (5GC)
5G Core Network (5GC)
Signup and view all the flashcards
Network Function (NF)
Network Function (NF)
Signup and view all the flashcards
NF Service
NF Service
Signup and view all the flashcards
Services and operations
Services and operations
Signup and view all the flashcards
Access and Mobility Management Function (AMF)
Access and Mobility Management Function (AMF)
Signup and view all the flashcards
5G Globally Unique Temporary Identity (5G-GUTI)
5G Globally Unique Temporary Identity (5G-GUTI)
Signup and view all the flashcards
Session Management Function (SMF)
Session Management Function (SMF)
Signup and view all the flashcards
User Plane Function (UPF)
User Plane Function (UPF)
Signup and view all the flashcards
PDU Connectivity Service
PDU Connectivity Service
Signup and view all the flashcards
PDU Session
PDU Session
Signup and view all the flashcards
5G QoS Indicator
5G QoS Indicator
Signup and view all the flashcards
PDU Session Anchor
PDU Session Anchor
Signup and view all the flashcards
Policy Control Function (PCF)
Policy Control Function (PCF)
Signup and view all the flashcards
NWDAF
NWDAF
Signup and view all the flashcards
Network Exposure Function (NEF)
Network Exposure Function (NEF)
Signup and view all the flashcards
Network Repository Function (NRF)
Network Repository Function (NRF)
Signup and view all the flashcards
Network Slice Selection Function (NSSF)
Network Slice Selection Function (NSSF)
Signup and view all the flashcards
Single Registration
Single Registration
Signup and view all the flashcards
Non-3GPP Interworking Function (N3IWF)
Non-3GPP Interworking Function (N3IWF)
Signup and view all the flashcards
Study Notes
5G Core Concepts
- A learning product contains simplifications and should not be considered a system specification.
- Ericsson has no liability for errors or damages from its use as a technical reference.
- The documentation should not replace the technical documentation delivered with a system.
- Copying, reproducing, disclosing, or distributing the content without express written consent from Ericsson Learning Services is prohibited.
- Screen recording sessions remotely delivering the learning product is forbidden.
Course Objectives
- Explore use cases, standardization, and network evolution for 5G Core.
- Outline the basic conceptual network architecture and tech for 5G Core
- Describe communication services support in 5G Core for interoperability
- Go over the basic concepts for 5G core orchestration and management.
Chapters
- The course includes: Introduction, 5G Core, Communication Services, Orchestration & Management, and Acronyms & Abbreviations.
Chapter Objectives
- Describe use cases enabled by 5G Core.
- Analyze the 3GPP 5G Core standardization timeline.
- Review the 5G EPC architecture.
- List the 5G Core deployment options studied by 3GPP.
- Explore possible migration paths for 3GPP 5G architecture options.
5G and Mobile Broadband
- 5G offers a range of opportunities and use cases beyond mobile broadband.
- Includes broadband experience everywhere, anytime; media everywhere; smart vehicles, transport & infrastructure; critical control of remote devices; human-IoT interaction.
Cellular IoT Segments
- One network serves different industries and use cases thru multiple slices
- Massive IoT includes smart metering and asset management, uses low cost, low energy devices producing small data volumes in massive numbers, and uses NB-IoT/Cat-M1 (LTE) in 5G EPC.
- Broadband IoT includes wearables and UAV/ Drones, large data volumes, high throughput, low latency, and uses LTE/NR in 5G EPC/5GC
- Critical IoT includes automotive C-ITS and traffic safety & control, offering ultra-reliability, ultra low latency, very high availability, and uses NR in 5G EPC/5GC.
- Industrial Automation IoT includes smart grid automation and collaborative robotics, uses industrial protocols, time sensitive networks, precise indoor positioning, and NR in 5G Core.
Network Slicing
- Allows a large span of requirements and customer segments.
- Tailors customer offerings and addresses new needs, premiums pricing, flexibility and agility, improved TTM, reduced TTC, reduced risk, is isolated, and offers tenant separation.
- Massive IoT supports asset management, smart grid and smart metering.
- Broadband IoT supports drones/ video surveillance, automotive C-ITS and fleet management.
- Critical IoT supports remote surgery, private networks and traffic safety.
- Industrial IoT supports smart phones, non-SIM devices, VR/AR, 4K/8K UHD, home BB services and broadcasting
- Enhanced Mobile Broadband (eMBB) and Fixed Wireless Access (FWA)
Network Slice Definition
- It serves a defined business purpose or customer logically.
- All network resources are configured together, created, changed, and removed by management functions.
- A logical network is managed by a provider offering mobile and fixed access.
- Resources can be physical or virtual, dedicated, or shared, and can integrate services from other providers.
- Functions may include management with possible exposure of customer control.
Network Slicing Uses
- Logical network offerings through network slices serve customers with use-case specific solutions.
- Logical MBB net, Logical Enterprise Net, and Logical Industry Net are all types of Network Services.
- Network Slices use resources for access, transport, and cloud capabilities to deliver network functions.
- AI manages the slicing as part of Network management.
Network Evolution
- Networks have moved from Integrated nodes with dedicated HW/SW and static capacity with element management; to Virtualized deployment with COTS server HW and manual life-cycle management with VNF management; to Cloud deployment with software defined infrastructure and orchestrated applications and network services; to finally 5G Core.
Edge Computing
- Edge computing distributes computing and storage resources closer to where they're needed.
- Three definitions depending on the location, including device edge, operator edge, and extended public edge.
- Device Edge involves computing and storage resources at an enterprise or consumer premise, and can be integrated with private networks and SD-WAN, offering connectivity, edge infrastructure, platform, and solution provision.
- Operator edge involves computing and storage resources within an operator's premises, between national and local access sites, integrated with the telco cloud, and also offers connectivity, edge infrastructure, platform, and solution provision.
- Extended public edge involves computing and storage resources spread out from central cloud sites placed outside operator premises, owned by HCPs and CDN/OT/IT players, and offer connectivity for operators.
Ericsson 5G Platform
- Parts include, Ericsson Digital BSS, Ericsson Management & Orchestration, Ericsson Radio System(RAN), Ericsson Cloud Core.
- Services include RAN Evolution, Ubiquitous 5G Transport, Dual-mode 5G Cloud Core
- RAN consists of new Radios, 5G High Layer vRAN
- Cloud components includes dynamic transport for 5G
5G Standardization Timeline
- 3GPP releases started with Rel-15 in 2018, and scheduled to Rel-18 in December 2023
- 3GPP SA and CT worked on Rel-15 in 2018, Rel-16 in 2020 and Rel-17 in 2022
- 3GPP RAN worked on Rel-15 in 2018, Rel-16 in 2020 and Rel-17 in 2022
5G Architecture
- SBA: flexible and extensible interactions of cloud-native designs enabling cost-efficient operations.
- Improved service capabilities thru enhanced Network Slicing, Unified authentication model, Local service area control
- Includes Edge Computing for lower latency and enhanced QOS
5G Releases
- Rel 16/17 focuses on new market segments such as Industrial-IoT, Massive IoT, Automotive, Fixed Mobile Convergence
- Both offer 5GC base and arch enhancements
5G Core Arch Rel-16
- It offers; I-SMF/I-UPF for inter-region support, Enhanced SBA with NF Set support, and UDM-HSS interworking.
5G Core Arch Rel-17
- It offers; Extended Edge, Enhanced Network Slicing and Enhanced Analytics for Data collection
5G Systems Specifications
- System Architecture for 5G System (TS 23.501), overall system reference model
- Procedures for 5G System (TS 23.502), processes and workflows to capture interaction between the network functions access
- Policy and Charging Control Framework for the 5G System (TS 23.503), policy and charging architecture
GSMA
- Defines the User-to-Network interface for VoNR (Voice over New Radio), MMTel telephony and its services.
3GPP 5G Standard Architecture Options
- 5G EPC with Interworking and Mobility to LTE for MBB, Voice and SMS
- 5GC for NR Interworking, Mobility to 2
EPC in 5G NSA
- Anchored to network over LTE/EPC control plane and provides wide area coverage
- Can add NR as a capacity boost with access restriction, NR volume usage reporting and 5G data rate support.
Slice Selection
- Decides DCN based on internal or external information before sending Authentication and then eNB selects first MME and reroutes NAS
CUPS ( “CP/UP Separation of SGW, PGW and TDF)
- Drivers: Distributed UP, centralized CP and low UP latency with low cost for UP, enables sites in range of 1000's of km.
Enhancements in 5G EPC
- Enhanced to support 5th gen and 5G rates, subscription process and policy control.
Moving to 5G
- There are two distinct and different core architectures called 5G EPC and 5G Core Network(5GC).
- 5G Core supports additional options than 5G EPC.
- The reason for two architectures is to accelerate services and deliver future-looking solution meetings
Migration from LTE
- 5G can be supported by providing multiple architectures, EPC, 5G, and then Dual Mode
Transformation to Cloud
- Can use virtualized environments that leverage VMs, DevOps and can also use Cloud Native.
Chapter Summary (Introduction)
- After completing it, the users should be able to describe all enhancements that a 5G core can give
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.