Ekher Reseau

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

5G Networks: 3GPP Releases 15 and 16

1. 3GPP (3rd Generation Partnership Project) is a collaboration between


telecommunications standards organizations that develops specifications for
mobile communication systems, including 5G networks.
2. 3GPP has released multiple versions of specifications for 5G networks. Releases
15 and 16 are two significant milestones in the development of 5G.
3. Release 15, finalized in 2018, introduced the initial standards for 5G. It defined
the Non-Standalone (NSA) architecture, where 5G networks are supported by
existing 4G infrastructure. Release 15 primarily focused on enhancing mobile
broadband services.
4. Release 16, completed in 2020, expanded the capabilities of 5G networks and
introduced the Standalone (SA) architecture. SA enables independent 5G
networks without relying on existing 4G infrastructure. Release 16 aimed to
address various use cases, including enhanced mobile broadband, massive
machine-type communications (mMTC), and ultra-reliable low-latency
communications (URLLC).
5. The architecture of 5G networks is based on a Service-Based Architecture (SBA),
which is more flexible and modular compared to previous generations. It enables
network slicing, where multiple virtual networks can coexist on a shared physical
infrastructure, catering to different use cases with distinct requirements.
6. Key components of the 5G architecture include the User Equipment (UE), Radio
Access Network (RAN), Core Network (CN), and Network Functions (NFs). The
RAN and CN are connected through the Xn interface, and the CN uses the
Service-Based Interface (SBI) for inter-NF communication.
7. 5G networks use various protocols for different functionalities. The air interface
between the UE and RAN uses the 5G New Radio (NR) protocol. For core network
communication, protocols like IP (Internet Protocol), HTTP/2 (Hypertext Transfer
Protocol version 2), and RESTful APIs (Representational State Transfer) are used.
Control plane signaling relies on protocols like NGAP (Next-Generation
Application Part) and N1AP (NG Radio Access Network Application Part), while
user plane traffic uses protocols such as UPF (User Plane Function) and PFCP
(Packet Forwarding Control Protocol).
8. 5G networks also incorporate technologies like network slicing, which allows the
partitioning of network resources to create isolated virtual networks tailored to
specific use cases. This enables efficient resource allocation and customization of
services based on varying requirements.
9. In addition to enhanced mobile broadband, 5G networks aim to support diverse
applications, including Internet of Things (IoT) devices, autonomous vehicles,
smart cities, augmented reality/virtual reality (AR/VR), and mission-critical
communications.
10. 3GPP continues to work on further enhancements to 5G through subsequent
releases, including Release 17 and beyond. These releases will bring additional
features, optimizations, and capabilities to meet evolving requirements and pave
the way for the future of mobile communication.

a. Service-Based Architecture Network:

1. Service-Based Architecture (SBA) is a key architectural concept in 5G networks. It


provides a flexible and modular framework for designing and deploying network
services.
2. In SBA, network functions are decomposed into individual network functions
(NFs), which can be independently deployed and scaled. Each NF provides a
specific service or functionality within the network.
3. The NFs in SBA interact with each other using well-defined Service-Based
Interfaces (SBIs) based on protocols like HTTP/2 (Hypertext Transfer Protocol
version 2) and RESTful APIs (Representational State Transfer).
4. SBA enables dynamic service composition and orchestration, allowing the
creation of end-to-end network services by combining and chaining multiple NFs.
5. With SBA, network slicing becomes feasible. Network slicing allows the creation
of multiple logical networks (slices) on a shared physical infrastructure, each
tailored to specific use cases with unique requirements.

b. Elements, Functions, and Interactions:

1. User Equipment (UE): The UE refers to the end-user devices such as smartphones,
tablets, or IoT devices that connect to the 5G network.
2. Radio Access Network (RAN): The RAN includes base stations (gNBs in 5G) that
communicate with the UE over the air interface using the 5G New Radio (NR)
protocol. The RAN handles tasks such as radio resource management and
mobility management.
3. Core Network (CN): The CN provides the central infrastructure for 5G networks. It
comprises various network functions that handle tasks such as user
authentication, session management, mobility management, and data routing.
4. Network Functions (NFs): NFs are individual components within the CN that
provide specific functionalities or services. Examples of NFs include the Access
and Mobility Management Function (AMF), Session Management Function (SMF),
User Plane Function (UPF), and Authentication Server Function (AUSF).
5. NF Interactions: NFs communicate with each other using Service-Based Interfaces
(SBIs). They exchange control and data plane information using protocols like
HTTP/2 and RESTful APIs. NF interactions involve signaling messages, data
forwarding, and orchestration of network services.

c. Architecture Implementation Options:

1. Non-Standalone Architecture (NSA): NSA is an initial implementation option


introduced in 3GPP Release 15. It allows 5G networks to be deployed alongside
existing 4G infrastructure. In NSA, the 5G network relies on the control plane of
the 4G Evolved Packet Core (EPC) while introducing the 5G NR for enhanced data
services.
2. Standalone Architecture (SA): SA is a fully independent implementation option
introduced in 3GPP Release 15. SA enables 5G networks to operate without
relying on 4G infrastructure. It introduces a new core network architecture, the 5G
Core (5GC), and utilizes the 5G NR for both control and data plane
communication.

d. Mobility States and Protocols:

1. Mobility States: In 5G networks, user mobility is categorized into different states:


 Idle State: The UE is not actively involved in a data session and periodically
listens for paging messages to receive incoming calls or messages.
 Connected State: The UE is actively involved in a data session and
maintains a connection with the network.
2. Mobility Protocols: 5G networks employ various protocols to handle mobility:
 Access and Mobility Management (AMF): The AMF is responsible for
managing mobility-related procedures and interactions with the UE, such
as initial registration, handover, and paging.
 Session Management Function (SMF): The SMF handles session-related
functions, including establishing and releasing data sessions, managing
Quality of Service (QoS), and supporting mobility.
 User Plane Function (UPF): The UPF manages the user plane data
forwarding during active sessions and supports mobility-related data
forwarding procedures.
 Next-Generation Application Part (NGAP): NGAP is a control plane
protocol used for communication between NFs, specifically between the
AMF and gNB or UPF.
 NG Radio Access Network Application Part (N1AP): N1AP is a control plane
protocol used for communication between NFs, specifically between the
AMF and 4G EPC when operating in NSA mode.
 Packet Forwarding Control Protocol (PFCP): PFCP is a protocol used for
control plane communication between the SMF and UPF for managing
user plane sessions and QoS in a 5G network.
Quiz 1 1. What is the objectives Release15 for the DL peak bitrate?

2. What is the objectives Release15 for the maximum devices number per square km?

3. What is maximum number of carriers aggregated in Release 15?

4. In which Release URLLC is introduced?

5. What CUPS stands for?

6. What SBA stands for?

7. Into which parts the BBU is split in Release 15 ?

Quiz 1:

1. The objective of Release 15 for the DL (Downlink) peak bitrate is to achieve a


peak data rate of 20 Gbps in the downlink.
2. The objective of Release 15 for the maximum devices number per square
kilometer is to support up to 1 million devices per square kilometer.
3. In Release 15, the maximum number of carriers that can be aggregated is 16.
4. URLLC (Ultra-Reliable Low-Latency Communications) is introduced in 3GPP
Release 15.
5. CUPS stands for Control and User Plane Separation. It is an architectural concept
in 5G networks that allows the separation of control plane functions and user
plane functions into separate network elements.
6. SBA stands for Service-Based Architecture. It refers to the architectural framework
in 5G networks that enables modular and flexible deployment of network
services.
7. In Release 15, the Baseband Unit (BBU) is split into two parts: Centralized Unit
(CU) and Distributed Unit (DU). The CU handles control plane functions, while the
DU handles user plane functions. This split architecture enables centralized
control and distributed data processing in the 5G network.
Quiz 2 For each of these entities, indicate which is the corresponding one in LTE-A

1. AF

2. UDM

3. AUSF
4. NEF

5. PCF

6. AMF

7. NRF

8. NSSF

9. UPF

10. SMF

Quiz 2:

Here are the corresponding entities in LTE-A for each of the given entities:

1. AF (Application Function) - No direct equivalent in LTE-A. AF is a 5G entity


responsible for application-based policy and charging control.
2. UDM (Unified Data Management) - No direct equivalent in LTE-A. UDM is a 5G
entity responsible for managing user-related data and authentication.
3. AUSF (Authentication Server Function) - HSS (Home Subscriber Server) in LTE-A.
AUSF in 5G is responsible for authentication and key generation for user access.
4. NEF (Network Exposure Function) - No direct equivalent in LTE-A. NEF is a 5G
entity responsible for exposing network capabilities and services to authorized
third-party applications.
5. PCF (Policy Control Function) - PCRF (Policy and Charging Rules Function) in LTE-
A. PCF in 5G and PCRF in LTE-A are responsible for policy control and QoS
enforcement.
6. AMF (Access and Mobility Management Function) - MME (Mobility Management
Entity) in LTE-A. AMF in 5G and MME in LTE-A are responsible for mobility
management and control plane signaling.
7. NRF (Network Repository Function) - No direct equivalent in LTE-A. NRF is a 5G
entity responsible for service discovery and storing network function information.
8. NSSF (Network Slice Selection Function) - No direct equivalent in LTE-A. NSSF is a
5G entity responsible for selecting the appropriate network slice for a specific
service or user.
9. UPF (User Plane Function) - S-GW (Serving Gateway) and P-GW (PDN Gateway) in
LTE-A. UPF in 5G is responsible for user plane processing and data forwarding.
10. SMF (Session Management Function) - No direct equivalent in LTE-A. SMF is a 5G
entity responsible for session management and control of data sessions.

Quiz 3
1. What is the RRC Inactive state objectives?

2. What is the equivalent of location areas in Release 15?

3. What will be the first implementation of the 5G network?

4. Which entities are common to all the slices?

5. Which entities are specific to each slice?

6. How many states are defined in mobility management?

7. What is the equivalent of RRC INACTIVE in UMTS?

Quiz 3:

1. The objective of the RRC (Radio Resource Control) Inactive state is to conserve
power by keeping the UE (User Equipment) in a low-power mode when it is not
actively communicating with the network. In this state, the UE maintains minimal
radio resources and periodically listens for paging messages to receive incoming
calls or messages.
2. In Release 15, the equivalent of location areas is called Tracking Areas. Tracking
Areas are used to track the location of UEs within the network. A Tracking Area is
a group of cells, and when a UE moves between cells within the same Tracking
Area, there is no need for a location update.
3. The first implementation of the 5G network is commonly referred to as Non-
Standalone (NSA). In NSA, the 5G network is deployed alongside existing 4G
infrastructure. The 5G network uses the control plane of the 4G Evolved Packet
Core (EPC) while introducing the 5G New Radio (NR) for enhanced data services.
4. The entities that are common to all network slices are the Core Network (CN) and
the Network Functions (NFs) that provide core functionalities such as
authentication, session management, and data routing. These common entities
provide the underlying infrastructure and services that are shared across different
slices.
5. The entities that are specific to each network slice are the Network Slice Specific
Functions (NSSFs). NSSFs are responsible for selecting and managing the specific
resources and configurations required for each network slice. They ensure that
the slice-specific requirements, such as latency, throughput, and quality of
service, are met.
6. In mobility management, three states are defined:
 Idle State: The UE is not actively involved in a data session and periodically
listens for paging messages to receive incoming calls or messages.
 Connected State: The UE is actively involved in a data session and
maintains a connection with the network.
 RRC Inactive State: The UE is in a low-power mode, conserving resources,
and not actively communicating with the network. It is a state specific to
5G networks.
7. The equivalent of RRC INACTIVE in UMTS (Universal Mobile Telecommunications
System) is called CELL_PCH (Cell Paging Channel) state. In this state, the UE is in a
low-power mode, periodically listening for paging messages from the network to
receive incoming calls or messages.

• In 4G: 1 bearer = 1 QoS

• In 5G: 1 PDU session = n QoS flows

Quiz 5

1. Which identity protection is introduced in R15?

2. Is data traffic protected implemented in R15?

3. What does hold the SEcurity Anchor Function?

4. What is secondary authentication for?

5. Why security threats increase with 5G?

Quiz 5:

1. The identity protection introduced in Release 15 is called Enhanced Subscriber


Identity Module (eSIM). It provides improved security for user identities and
authentication credentials in 5G networks.
2. Yes, data traffic protection is implemented in Release 15. It includes the use of
stronger encryption algorithms and protocols to ensure the confidentiality and
integrity of user data transmitted over the network.
3. The Security Anchor Function (SEAF) holds the security anchor point in the 5G
network. It is responsible for enforcing security policies, managing security
associations, and providing secure connectivity between the user equipment (UE)
and the network.
4. Secondary authentication is used to provide an additional layer of security and
verification for certain sensitive operations or services. It may be required for
accessing critical network resources, authorizing high-security transactions, or
granting specific privileges within the network.
5. Security threats increase with 5G due to several factors:
 Increased Attack Surface: 5G introduces a more extensive and
interconnected ecosystem with a larger attack surface, including a higher
number of devices, increased connectivity, and more complex network
architectures. This expanded attack surface provides more entry points for
potential attackers.
 Greater Reliance on Software: 5G networks rely heavily on software-
defined networking (SDN) and network function virtualization (NFV),
introducing new vulnerabilities associated with software and virtualized
network functions. Software-based attacks, such as malware and code
vulnerabilities, can exploit these weaknesses.
 Internet of Things (IoT) Security Challenges: 5G enables massive IoT
connectivity, leading to a significant increase in the number of connected
devices. IoT devices often have limited security measures, making them
potential targets for cybercriminals to gain unauthorized access or launch
attacks.
 Increased Complexity: 5G networks are more complex, with multiple
network functions, interfaces, and protocols. This complexity introduces
challenges in securing the network infrastructure, managing security
configurations, and ensuring interoperability among different components.
 Advanced Cyberattack Techniques: As technology evolves, cybercriminals
continually develop new and advanced attack techniques. With 5G,
attackers may exploit vulnerabilities in the network, such as side-channel
attacks, distributed denial-of-service (DDoS) attacks, or sophisticated
malware, to disrupt services or gain unauthorized access.

To address these security challenges, continuous monitoring, robust security measures,


and collaboration among industry stakeholders are essential to ensure the integrity and
security of 5G networks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy