100% found this document useful (1 vote)
194 views83 pages

5G Radio Network Key Technologies and Deploymen...

Uploaded by

Ahmad Javed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
194 views83 pages

5G Radio Network Key Technologies and Deploymen...

Uploaded by

Ahmad Javed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 83

5G Radio Network Key Technologies and Evolution

Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Deployment

 On December 20, 2017, the first 5G NR standard was officially released at the 8th
plenary meeting of 3GPP RAN in Lisbon, Portugal. This specification defines the
first phase of 5G standards, that is, NSA (non-independent deployment) 5G NR
technical specifications.
 The first release of 3GPP Release 15 will be completed in June 2018, focusing on
the eMBB scenario. The Non-Standalone (NSA) will be completed in December
2017, and the standalone (SA) will be completed in June 2018. The NSA is mainly
used for early deployment and focuses on the eMBB scenario. SA is the target
architecture of 5G. The second release will be completed in December, 2019,
meeting the requirements of all scenarios defined by the ITU.
 R15 includes main features such as new waveform, new coding, new frame
structure, and uplink and downlink decoupling. R16 includes features such as new
multiple access, uRLLC, and mMTC.According to the public information in the
industry, 5G terminal chips will be launched in 2019, and smartphones will be
launched in 2019. Large-scale commercial use is estimated in 2020.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment

 Spectrum resource is very precious and are key factors that affect the air interface
rate. To improve the air interface rate of 5G, spectrum resources must be
abundant. The 5G spectrum is divided into two parts: FR1 and FR2. The specific
frequency range is as follows:

Index Frequency Range


FR1 450 MHz – 6000 MHz
FR2 24250 MHz – 52600 MHz

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 The 5G supports FDD and TDD, and the SDL and SUL frequency bands are
introduced to support 5G uplink and downlink decoupling.
 Currently, the major band for 5G deployment is C-band, which includes n77, n78
and n79.
 SUL (Supplement UL) and SDL ( Supplement DL) are designed for uplink &
downlink decoupling function, which will be introduced later.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 The maximum bandwidth of the 5G network is limited by the following factors:


 Maximum bandwidth of the current frequency band
 SCS configuration (The maximum bandwidth is FR1 273RB, FR2 264 RB.)

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 5G supports full spectrum access. The new C band, mmWave and the existing
spectrum Sub3GHz can be used for 5G.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 With large bandwidth and massive MIMO, C band can greatly increase the cell
capacity by 25 times of the 1.8GHz cell capacity . In addition, it can provide good
downlink coverage, it can still reach 403Mbps consecutive throughput with 500m
cell radius. Therefore, C-band can provide good downlink coverage and user
experience.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 According to the onsite test results, there is a huge gap between uplink and
downlink, 51 times for coverage and 88 times for capacity.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 Mm-wave is mainly used in the capacity supplement layer. Application scenarios


include indoor and outdoor hotspots and wireless home broadband. The
simulation results of in hotspot area show that the peak rate of single user
reaches 7Gbps and the average rate reaches 3.2Gbps. Therefore, mmWave can be
used in the capacity supplement layer of hotspot area.
 As the mm-wave band is high and penetration loss is high, the penetration loss of
the metal wall or cement wall is high, and the loss of penetrating glass doors and
windows or wooden doors is low. Therefore, mm-wave can improve coverage and
user rate with high EIRP.
 For a coagulant wall (28cm), a metal wall (5cm), mm wave basically does not
apply because penetration loss reaches up to 65dB.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment

 To further improve frequency efficiency, based on 4G technologies, the 5G air


interface has introduced new technologies, including multiple access technology,
high order modulation scheme, coding schemes, and multi-antenna technologies

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 The F-OFDM feature can better control the leakage of transmit signals outside the
system bandwidth, reduce the guard band in the NR system bandwidth, and
enable more spectrum to become the downlink transmission bandwidth. On the
gNodeB receive side, the F-OFDM feature can better control the impact of out-of-
band interference on the NR system, reduce the guard interval in the NR system
bandwidth, and enable more spectrum to become the uplink transmission
bandwidth.
 The 3GPP R15 specification supports higher spectrum utilization. The spectral
efficiency is defined as the ratio of transmission bandwidth to channel bandwidth.
The F-OFDM feature is used to support the maximum spectrum utilization agreed
by the specification.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 The 5G air interface inherits the 4G OFDMA technology and uses the CP-OFDM
waveform in the downlink. The processing process is similar to that of LTE.
 The uplink supports the single carrier DTF-S-OFDM waveform and CP-OFDM
waveform. The DTF-S-OFDM and CP-OFDM waveforms are adaptively adjusted
based on the radio environment.
 DFT-s-OFDM: Similar as SC-FDMA in LTE, adopts single carrier
technology, reduce PAPR
 CP-OFDM: Adopt multiple carriers technology, support MIMO to get
higher throughput
 In addition, to meet a large connection requirement in a future mMTC scenario,
5G will also introduce a non-orthogonal multiple access end, thereby further
improving a quantity of access users. Because the current specification has not
frozen this block, we will not introduce too much.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 The 3GPP TS 38.211 R15 specification introduces the flexible numerology, which
defines the different subcarrier bandwidth. The bandwidth of different subcarriers
corresponds to the frame structure of the time domain.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 Slot is an important concept in the 5G air interface because the 5G scheduling TTI
is based on the slot. Compared with the LTE, the 5G can achieve a lower
scheduling delay. We can consider the slot as a subframe in 4G. The downlink slot
is the downlink subframe in 4G, the uplink slot is the uplink subframe in 4G, and
the flexible slot is the special subframe of 4G.
 OFDM symbols in a slot can be classified as 'downlink' (denoted 'D'), 'flexible'
(denoted 'X'), or 'uplink' (denoted 'U')

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 The 3GPP specification does not clearly define the self-contained slot type. The
preceding two cases are defined by the industry in terms of self-contained slot.
The self-contained slot is designed to shorten the RTT delay of uplink and
downlink data transmission. In practice, the following problems may occur:
 The GP between the uplink and downlink is short, which requires very
high process capability on UE side
 GP overhead is large

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 FQAM is a combination of frequency shift keying (FSK) and quadrature amplitude


modulation (QAM). Based on QAM, FQAM adds frequency modulation
information. Therefore, the modulation efficiency can be further improved.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment

 Compared with traditional antennas, Massive MIMO increases the number of


arrays and uses narrow beams with higher concentration to replace the previous
wide beams. In addition, Massive MIMO adjusts the beam weights, in this way,
higher enablement gain can be achieved.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 Compare with LTE beamforming, NR massive MIMO introduces broadcast


beamforming technology to enhance broadcast channel coverage.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 The horizontal and vertical bema width can be adjusted to meet the different
application scenario.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 Frequency band/TRX number/Whether there is an enough space for installation

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment

 Different from 4G networks, 5G radio networks and core networks can be


independently evolved and networked. That is, 4G and 5G base stations can be
connected to 4G and 5G core networks respectively. In addition, the dual-
connection technology is used, 4G and 5G converged networks can be quickly
implemented. In independent networking and non-independent networking, the
dual-connection technology can be used to fully utilize the existing resources and
achieve smooth evolution.
 5G networking structure can be classified into standalone networking and non-
standalone networking. Standalone networking should meet the following
conditions:
 5G core network and 5G base station should be existed
 5G core network and 5G base station is connected through control plane

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 The EPC is incompatible with the NR protocol. Therefore, the EPC cannot be
connected to the gNB through the signaling plane. However, the NGC is
compatible with 4G access, therefore, NGC can either connect to gNB or eNB
through control plane.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 At the early stage of 5G, we recommend the Option3 series architecture for
networking, which can reuse the existing LTE network coverage advantages and
provide signaling plane connections to solve the 4G and 5G interoperability
problems caused by discontinuous coverage at the early stage of 5G deployment.
Based on the characters of the three solutions, the Option3X solution is preferred
in the early stage of NSA networking.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 In a dual-connection scenario, the UE is connected to the eNB and the gNB at the
same time. One is a master node and the other is a slave node . The determination
of the master or slave node depends on the anchor of the control plane, the base
station that has a control plane with the core network is the master node.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 NSA dual-connection establishment is similar to carrier aggregation in LTE.


 Step 1: The UE performs initial access on the eNodeB side, and the
eNodeB delivers 5G measurement configuration based on the UE
capability.
 Step 2: The UE performs the 5G measurement. When the corresponding
event is met, the UE reports the MR.
 Step 3: The eNodeB initiates an NR cell addition procedure to the gNB
based on the information about the 5 G cell in the MR. If no X2 interface
is available, the eNodeB needs to establish an X2 interface first.
 Step 4: The gNB performs resource admission decision. If the admission
is successful, the gNB sends the configuration information of the
secondary cell to the eNodeB. The eNodeB delivers the configuration
through the RRC message to complete the SCell configuration.
 Step 5: In the Option3x architecture, the user plane needs to be switched,
and the S1-U bearer is switched from the eNB to the gNB.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 As NFV is deployed for NGC, so the previous NE is called NF (Network Function),


the major NFs are following:
 AMF:Core Access and Mobility Management Function
 AUSF:Authentication Server Function
 UPF:User plane Function
 DN:Data network
 SDSF: Structured Data Storage Network Function
 UDSF: Unstructured Data Storage network function
 SMF:Session Management Function
 PCF:Policy Control function
 UDM:Unified Data Management
 AF: Application Function

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 The protocol stack of the 5G NR air interface control plane inherits the structure of
the 4G network, and the protocol layer functions are similar to those of the 4G
network.
 The main functions of the control plane are as follows:
 The functions of the RLC and MAC layers are the same as those of the
user plane
 Encryption and integrity protection are implemented at the PDCP layer
 The RRC layer implements broadcast, paging, RRC connection
management, resource control, mobility management, and UE
measurement report control

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 X2 is an interface between the eNB and the eNB or between the eNB and the gNB.
The control plane is between CUs, but the user plane is established between the
CU and the CU, and is used for data transfer during handover. It is also established
between the CU and DU for data distribution in DC scenarios.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 After 4:1 compression, the value is 100Gbps

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 After 4:1 compression, the value is 100Gbps

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 3GPP Release 15 introduces the supplementary uplink (SUL), which is carried on a


sub-3 GHz band. SUL effectively utilizes idle sub-3 GHz band resources, improves
the uplink coverage of C-band, and enables the provisioning of 5G services in a
wider area. SUL also improves the service experience of cell edge users (CEUs). For
details on the SUL, see section 6.9 in 3GPP TS 38.300 (V15.0.0). In this feature, SUL
carriers are on the sub-3 GHz band, and non-SUL carriers are on C-band.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

 During the early stages of New Radio (NR) deployment, only high-band spectrum
was available for NR. LTE low-band spectrum could not be refarmed for NR
deployment. NR networks deployed on the high-band spectrum have limited
uplink coverage. LTE FDD and NR Uplink Spectrum Sharing allows LTE and NR to
share LTE uplink low-band spectrum when the uplink load of LTE networks is low.
When this function is enabled, UL and DL Decoupling can be used to establish
supplementary uplink (SUL) cells on the LTE low-band spectrum for NR networks.
Low-band spectrum sharing improves NR uplink coverage.

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission
5G Radio Network Key Technologies and Evolution
Deployment

Confidential Information of Huawei. No Spreading Without


Permission

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy