Professional Documents
Culture Documents
Mastering 5G Network Design, Implementation, and Operations
Mastering 5G Network Design, Implementation, and Operations
Ananya Simlai
Oğuzhan Kara
BIRMINGHAM—MUMBAI
Mastering 5G Network Design, Implementation,
and Operations
Copyright © 2023 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted
in any form or by any means, without the prior written permission of the publisher, except in the case
of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information
presented. However, the information contained in this book is sold without warranty, either express
or implied. Neither the authors, nor Packt Publishing or its dealers and distributors, will be held liable
for any damages caused or alleged to have been caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and
products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot
guarantee the accuracy of this information.
ISBN 978-1-83898-010-8
www.packtpub.com
I wish to thank all my professional colleagues, friends, and family, who are the inspiration for my continuous
learning and development. I am thankful to Internet of Things Solutions World Congress (IOTSWC),
where I regularly interact with a wide range of industry experts, working on emerging technologies.
Finally, many thanks to my co-authors and the editorial team at Packt, who made this book possible.
To Saesha, the joy of my life. To Rajeev, my loving husband and my rock. To Uma and Gautam, my
parents, my roots. Thank you all for inspiring me, believing in me, and making me who I am.
Ananya Simlai
I’m extremely grateful to my wife, Elif, who supported me throughout this journey. Also, I would like to
extend my sincere thanks to Ananya and Shyam. This is a book we have all been immensely proud to write.
Oğuzhan Kara
Contributors
Ananya Simlai is a solutions architect with a primary focus on wireless 4G/5G mobility networks,
cloud native, and NFVI. She is a trusted advisor for service providers, helping them address their
technological challenges and thereby enabling them to smoothly transition across technologies such as
4G and 5G. She has been a speaker on 5G in international forums and also interacts with CTO teams
to help design their 5G story. She has published multiple papers on 5G and holds granted patents. She
has been instrumental in designing, implementing, and successfully rolling out one of the largest 5G
mobile networks in the globe. She is currently working as an architect at Google and has previously
worked at VMware, Cisco, Altiostar Networks, and Starent Networks.
I want to thank the people who have been close to me and supported me, especially my parents and
my husband.
Oğuzhan Kara is a microelectronics engineer with 14 years of experience with mobile technologies,
including 5G NR, VoLTE, LTE-A, O-RAN, IoT (Cat-M-NB-IoT), AI, and autonomous systems. He
is an expert in technical strategy development, performance management, optimization, and feature
trials and implementation. He has worked with vendors such as Ericsson, Nokia, and Huawei. He
founded Qrispy Limited, a telecommunications and technology consultancy firm, in 2021 in London,
and has provided various services to Qualcomm, Three UK, Vodafone UK, Entel, Blue Sky Network,
and Celfinet. He previously worked for PHI Networks (Israel), AT&T (the US), and Yota (Russia).
About the reviewers
Karthik Chandrasekaran has 19+ years of experience working in the telecom industry, with 10 years
spent on IP Multimedia Subsystem (IMS), Voice over LTE (VoLTE), and most recently, 5G SA and
Voice over NR (VoNR). He has worked on multiple launches with T-Mobile USA. He has a wide
range of experience within the telecom domain, including IMS, SMS, charging, and end-to-end voice
launches in packet-switched telecom networks. He has worked across multiple companies within the
telecom domain, such as TCS, Sasken, Nokia Siemens Networks, Mavenir, and T-Mobile. With his
experience of working on the first VoNR launch in North America with T-Mobile, he has a unique
set of knowledge to help review voice aspects of packet-switched networks.
Payam Alavizadeh has worked in the mobile communication industry for more than 20 years, with 16
years specifically dedicated to RF engineering. He has performed network investigation with the latest
methods for improving network quality. He is CEO and Founder of the Semantic Communication
Ltd and works with Canadian mobile operators in British Columbia Canada as a 5G RF engineering
consultant focusing on improving mobile network quality. His research interests include QoS ,QoE,
XR, and the next generation of mobile networks. He was selected as the IEEE DAY 2019 Winnipeg,
Canada Section Ambassador at the University of Manitoba. He was evaluated by the IEEE Admission
and Advanced Committee and was promoted to the grade of IEEE Senior Member (SMIEEE) on
Nov 2020.
I’d like to thank my wife, Mana Moosavi, who always supports me when I am reviewing chapters.
Thanks to everyone on the Packt Publishing team who helped me so much. Special thanks to Rahul
Nair, Neil D’mello, and Mohd Riyan Khan, the ever-patient publishing managers, and Aryaa Joshi for
coordinating this project.
I’d like to thank the authors; working in this field would not be possible without your support.
Gallery Quotes
“5G is a gift to the world and arguably the most important communications technology ever developed.
It delivers wireless broadband speeds to every corner of the planet to bridge the digital divide, while
providing the extra capacity needed to support the digital transformation of every industry. The book
you’re holding in your hands is an indispensable guide for anyone looking to design, build, and deploy
a 5G infrastructure to bring this connectivity miracle to life.”
- Rob Tiffany,
“This book is written by leading technology experts, providing a great view of how 5G technologies
will essentially drive the next generation of innovation spanning across all industries on accelerated
compute platforms at hypersonic scale and speed.”
“Any network technology is only as good as its design, deployment, and management. That is even
more true in complex and high-performance technology like 5G. In this book, Shyam Varan Nath,
Ananya Simlai, and Oğuzhan Kara address these topics in a simple, easy-to-understand, and practical
way such that everybody, from novices to experts, can master 5G.”
“As Voltaire said circa the 18th century, With great power comes great responsibility, and this is very
much the case as new powerful and transformative emerging technologies such as the fifth-generation
Mobile Broadband Standard for wireless networks, AKA 5G, enter our professional lives. Yet again, we
are finding ourselves faced with the heady responsibility of making business and technology decisions
that can have great impact, from individual lives through to entire organizations and society as a whole.
It is with this very challenge in mind that we become acutely aware of the critical need to source the
best possible resources with which to inform ourselves of the key issues, the inner workings of, and
the facts surrounding technologies such as 5G, its capabilities, its strengths, its weaknesses, design and
implementation considerations, and direct or indirect impacts it can bring about or enable.
viii Gallery Quotes
This book is just such a resource, one which will indeed hold you in good stead, as well as those around
you, who will no doubt be affected by decisions you may soon need to make. I highly recommend
you not only read this book but also take notes, share your learnings, and put what you glean from
it into action.”
“Any complex system that a machine or society utilizes should include security principles at the
beginning of the design life cycle, not as an afterthought. Such a system should then entail what I call
Security, Privacy, and Safety (SPS) aspects within; and now, let’s not forget to include best practices
from reliability and resilience aspects as well. This book will uncover many nuggets of truth for any
practitioner in this space for 5G technologies and use cases. It’s up to you to apply such principles.”
Founder of allthingsquantum.com
Table of Contents
Prefacexvii
Part 1: Introduction to 5G
1
Introduction to 5G 3
5G concepts and drivers 3 NG-RAN architecture 7
Key drivers 3 5G RAN deployment options 9
5G (IMT-2020) performance synopsis 5 NR and NG-RAN features 11
5G standardization 6 Summary16
5G NR and NG-RAN 7
2
End-to-End Architecture Components, Concepts, Security,
and Transport 19
A typical 5G network 19 The PCF 28
High-level components 21 The NEF 29
The NRF 30
The access network 21
The UDM 32
The packet core network 22
The AUSF 32
The transport network 22
The N3IWF 32
Data center design 23
The AF 32
5G network concepts 24 The UDR 33
The AMF 25 The SMSF 34
The SMF 27 The NSSF 34
The UPF 27 The SEPP 35
x Table of Contents
3
Building Blocks – Cloud Native Infrastructure 49
The evolution of telecom infrastructure49 REST in 5G 58
Cloud-native infrastructure and AMF services 59
applications51 SMF services 61
Service-based architecture 52 UDM services 63
UDR services 66
What is REST? 54
AUSF services 67
Client/server – a REST principle applicable to
PCF services 67
5G54
NEF services 69
Cacheable – a REST principle applicable to 5G 55
NRF services 70
Stateless – a REST principle applicable to 5G
NFs56 AF services 71
A layered system – a REST principle Network Slice Selection Function (NSSF)
applicable to 5G NFs 56 services71
A uniform interface – a REST principle Summary72
applicable to 5G NFs 57
4
5G Air Interface and Physical Layer Procedures – Part 1 73
General physical layer procedures 73 Waveform, numerology, and frame
The NR physical layer at a glance 74 structure80
Confinement of the spectrum with improved Waveform80
spectral efficiency 75 NR numerology 81
NR channel structure 75 Frame structure 86
The downlink reference and synchronization Resource grid 88
signals76 Duplexing scheme 90
Uplink reference and synchronization signals 77 Slot Format Indication 91
NR cell definition 78
NR cell measurement signals 79
Summary93
Table of Contents xi
5
5G Air Interface and Physical Layer Procedures – Part 2 95
Initial access and beam management 95 initial access procedure 101
Initial access procedure 96 SS block 101
Beam-sweeping and initial access 97 PSS and SSS 107
Other remaining system information 98 PBCH definition 108
Message 1, 2, 3, and 4 transmissions 99 Random access preamble – the PRACH 110
Beam management 100
Summary113
Physical channels and signals for the
6
5G Air Interface and Physical Layer Procedures – Part 3 115
Downlink physical channels and The PUCCH 125
signals115 Channel coding schemes 128
The PDCCH 116
Transport channel coding chains 128
The PDSCH 117
Data retransmissions 130
PDSCH eMBB and URLLC multiplexing 119
CSI-RS and CSI reports 120 BWPs131
The TRS 121 Defining a BWP 132
PTRS122 BWP operations 132
BWP use cases 134
Uplink physical channels and signals 123
The PUSCH 123 Summary136
7
Packet Core Procedures 137
PDU session establishment in 5G 137 IMS 5G PDU session establishment 151
PDU session establishment with 4G/ VoNR call flow 163
N26/IWF146 Wi-Fi attach 168
4G (E-UTRAN) initial attach 147 Summary173
xii Table of Contents
8
Voice over New Radio (VoNR) 175
VoNR concepts and drivers 175 High-level call procedure activities 181
IMS network deployments growth 175 SIP signaling exchange 181
5G system service requirements 176 QoS flow establishment 183
Ultra-high-definition audio 176 QoS flow tear down 184
10
5G Non-Standalone Networks 209
Introduction to NSA networks 209 5G NSA – option 3 call flows 218
Types of NSA networks 210 Advantages and shortcomings 225
A deep dive into NSA networks 213 Summary225
The architecture of the option 3 NSA network 214
11
5G Standalone Networks 227
Benefits and use cases of a 5G SA Designing a macro network 247
network227 Designing a non-public (private) network 249
5G SA network design fundamentals 228 5G network resilience and failure
Essential precursors 229 design252
5G SA network components and end-to-end Network performance analysis 253
call flow 233
Summary256
12
5G Infrastructure Design 257
Understanding NFV 257 Managing O-RAN infrastructure 269
The role of SDN 259 Using hybrid cloud 272
Understanding MEC C-RAN 261 The emergence of the telecom cloud 273
Carrier aggregation 264 Summary275
Understanding O-RAN 265
13
5G Network Slicing 277
Understanding network slicing 277 Network slicing challenges 283
Network slicing simplified 278 Overcoming the network-slicing challenges 283
xiv Table of Contents
Security considerations for network slicing 285 Architecture and flow diagram 289
14
5G and Autonomous Vehicles 297
A background on CAVs and their ADAS309
concepts297 V2X and 5G 310
Levels of automation 301 Network slicing and V2X 311
The 5G Automotive Association (5GAA) 303 5G V2X 313
The high-level architecture of AVs 304 V2X technology 314
Architecture for cooperative and intelligent The V2X standards 314
transportation305 Platooning316
The role of cloud providers 307 Cloud computing for V2X 317
15
5G Fixed Mobile Convergence 319
Introduction to FMC in 5G 319 FMC’s architecture 329
Session Initiation Protocol 321 FMC security considerations 332
Real-Time Transport Protocol 322 SIP security 332
IP Multimedia Subsystem 322 UMA security 334
Unlicensed Mobile Access 323 Fixed Mobile Convergence (FMC) security 335
The Fixed-Mobile Convergence Alliance 325
The Broadband Forum 325
Summary337
16
5G and Satellite Communications 339
Introduction to satellite Satellite communication in 5G 346
communications339 The role of regulatory bodies 346
The Global Positioning System 344 Challenges to satellite communication 350
Table of Contents xv
17
Automation, Orchestration, and Testing 367
Automation infrastructure in 5G 368 Implementation of network slicing 378
Introduction to network orchestration375 Integration planning in a
Auto scale-in and scale-out 376 multivendor environment 378
Automatic failure recovery 377 Monetization via AI and ML 380
Congestion control by configuration
Summary381
management377
Further reading 381
Appendix383
Interview on 5G with Rob Tiffany, Health System 385
founder and CEO of Sustainable Interview on 5G with Aayush
Logix383 Bhatnagar, senior vice president of
Interview on 5G with Sunil Dadlani, Reliance Jio 388
global CIO and CISO of Atlantic Interview on 5G with ChatGPT 390
Index393
Chapter 9, 5G Deployment Options, delves into the details of two main architectures, Non-Standalone
(NSA) and Standalone (SA), that the mobile network operators and communication service providers
can choose when transitioning from 4G to 5G technology.
Chapter 10, 5G Non-Standalone Networks, explains in detail the design and implementation of a 5G
non-standalone network.
Chapter 11, 5G Standalone Networks, explains in detail the design and implementation of a 5G
standalone network.
Chapter 12, 5G Infrastructure Design, focuses on network function virtualization and radio access networks.
Chapter 13, 5G Network Slicing, explains the purpose and the architecture of network slicing.
Chapter 14, 5G and Autonomous Vehicles, explains how 5G technologies are used with connected and
autonomous vehicles.
Chapter 15, 5G Fixed Mobile Convergence, describes how the convergence of fixed and mobile broadband
services happens over 5G.
Chapter 16, 5G and Satellite Communications, focuses on how terrestrial networks such as 5G work
together with non-terrestrial satellite networks.
Chapter 17, Automation, Orchestration, and Testing, describes in detail the role of automation and
orchestration in 5G networks and the process of testing a network before going to production.
Conventions used
There are a number of text conventions used throughout this book.
Code in text: Indicates code words in text, database table names, folder names, filenames, file
extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: “After a
successful transaction, UDM reports the 201 created message.”
Bold: Indicates a new term, an important word, or words that you see onscreen. For instance,
words in menus or dialog boxes appear in bold. Here is an example: “Select System info from the
Administration panel.”
Note
Some of the images in this book have been inspired from Keysight Technologies - https://
www.3g4g.co.uk/5G/ and the Ericsson 5G Air Interface course - LZU1082750 (2022)
document. Efforts have been made to create these to the best of our ability in a new and
unique appearance whilst retaining the intended meaning of these images. We are happy to
add additional acknowledgements in subsequent editions of this publication where required.”
Get in touch
Feedback from our readers is always welcome.
General feedback: If you have questions about any aspect of this book, email us at customercare@
packtpub.com and mention the book title in the subject of your message.
Errata: Although we have taken every care to ensure the accuracy of our content, mistakes do happen.
If you have found a mistake in this book, we would be grateful if you would report this to us. Please
visit www.packtpub.com/support/errata and fill in the form.
Piracy: If you come across any illegal copies of our works in any form on the internet, we would
be grateful if you would provide us with the location address or website name. Please contact us at
[email protected] with a link to the material.
If you are interested in becoming an author: If there is a topic that you have expertise in and you
are interested in either writing or contributing to a book, please visit authors.packtpub.com.
https://packt.link/free-ebook/9781838980108
This part of the book will provide an overview of 5G technologies. You will develop a solid understanding
of the fundamental building blocks that enable 5G technology. The chapters in this part will unravel the
aspects that make 5G unique and capable of addressing high-quality demands in terms of bandwidth,
latency, and quality of service, as well as the technologies that back 5G, the enhancements to the air
interface, and the packet core, which come together to light up the network that is capable of this
performance. It will cover how to design and implement 5G macro and private networks and, at the
same time, explain the various design and deployment options available.
This part of the book comprises the following chapters:
• Chapter 1, Introduction to 5G
• Chapter 2, End-to-End Architecture Components, Concepts, Security, and Transport
• Chapter 3, Building Blocks – Cloud Native Infrastructure
• Chapter 4, 5G Air Interface and Physical Layer Procedures – Part 1
• Chapter 5, 5G Air Interface and Physical Layer Procedures – Part 2
• Chapter 6, 5G Air Interface and Physical Layer Procedures – Part 3
• Chapter 7, Packet Core Procedures
• Chapter 8, Voice over New Radio (VoNR)
1
Introduction to 5G
5G is the fifth-generation technology standard for mobile cellular networks, which is the successor
to 4G networks. This chapter introduces key aspects and methodologies of the 5G New Radio (NR),
with a focus on the concepts and drivers. It provides some basic understanding of the 5G NR and
Next-Generation Radio Access Network (NG-RAN) and the end-to-end system architecture at a
high level. Core network-related aspects will be evaluated in the upcoming chapters.
Understanding the lessons of this chapter, mainly 5G concepts and drivers, and some key features of
5G NR is important to build the foundation for the upcoming chapters in the book.
In this chapter, we will cover the following topics:
Key drivers
Mobile technologies such as 3G, 4G, and 5G were initially governed by the International Mobile
Telecommunications (IMT) requirements of the International Telecommunication Union –
Radiocommunication (ITU-R). IMT-2000 was established by ITU-R with detailed specifications
for the first 3G deployments that took place around 2000. In early 2012, ITU-R established the
specifications of IMT Advanced for 4G wireless cellular technology. Similarly, for the 5G technology,
ITU-R defined IMT-2020.
4 Introduction to 5G
IMT-2020 is the benchmarks and guidelines that the ITU-R has set down for what a 5G network should
be. Today, organizations such as the 3rd Generation Partnership Project (3GPP) are working toward
fulfilling the requirements of IMT-2020. Within IMT-2020, there are three use cases that are the main
focus of 5G. Those use cases include Enhanced Mobile Broadband (eMBB), Ultra-Reliable and Low
Latency Communications (URLLC), and Massive Machine-Type Communications (mMTC). We
will consider each of these in turn.
From 2G all the way through to 4G we have seen constant increases in the mobile broadband data
rates that subscribers can expect to achieve. 5G is no exception with its promise of eMBB. To be able
to market 5G, some high data rates need to be provided to subscribers to show how competitive
it is against 4G. The headline data rates are roughly in the high hundreds of megabits per second.
Certainly, 5G will deliver data rates that satisfy applications such as Augmented Reality (AR), ultra
HD videos, or 3D applications.
But certainly, with 5G, subscribers will typically experience data rates in the high hundreds of megabits
per second.
The second key use case is URLLC. When we consider URLLC, we need to consider the fact that 5G
will really be an enabler network. So, we see a variety of different applications here that might be able
to use the 5G Core (5GC) Network. Remote surgery, autonomous driving, industrial control, and
drone control are examples of applications that require low latency and high reliability.
5G concepts and drivers 5
URLLC has stringent requirements in terms of latency and reliability. The latency for the network
is set at around 1 ms. The network for certain applications needs to be super reliable as well, with
99.999% (five 9s) reliability.
The third key use case is mMTC and fundamentally, it is the cellular-Internet of Things (IoT).
Although we already had a cellular-IoT with earlier technologies, we see it again with 5G as well.
There are numerous different IoT applications that can use the services of the 5G infrastructure. The
network must be super flexible and super adaptable from the 5G service providers’ perspective. The
network needs to be able to provide exactly the correct requirements for the IoT applications that are
using it. Network function virtualization, network slicing, and edge computing came into prominence
as the three key aspects of 5G. These three aspects will be examined later in the upcoming chapters.
Latency ms 10 1
Connection density devices/km2 105 106
Network energy efficiency bit/Joule 1x 100x
Area traffic capacity Mbit/s/m2 0.1 10
The following list expands on the preceding performance synopsis and key areas that service providers
today are moving toward:
• Peak data rate (Gbits/s): This is the peak throughput target that can be achieved by a single
user in the ideal radio conditions, and it is measured in Gigabits per second.
• User-experienced data rate (Mbits/s): Shows the user-experienced throughput target, which
needs to be achieved by 95% of the users in dense urban areas. This is the speed the user will
experience in the field.
• Spectrum efficiency (bits/s/Hz): This is the number of bits per second per Hertz achieved
by 95% of users in the coverage area. It indicates how efficiently the subscribers can use the
valuable radio spectrum.
• Mobility (km/h): Shows how fast the subscribers can move while maintaining a specific
normalized traffic channel data rate.
• Latency (ms): Represents the one-way delay between the time from when the source sends an
application packet to when the destination receives it.
• Connection density (devices/km2): Shows how many devices can be supported per kilometer
squared. This is something closely related to the cellular-IoT.
• Network energy efficiency (bit/joule): Indicates how much energy is used in the network to
send a bit each time.
• Area traffic capacity (Mbit/s/m2): How many megabits of information can be sent per meter
squared per second.
5G standardization
Like many of the preceding technologies, 2G, 3G, and 4G, it is 3GPP that really defines the standards.
3GPP has defined the specifications for 5G, which are there to address the IMT-2020 requirements.
Some of the techniques that were introduced in Release 14 were carried on to Release 15 to be used
as 5G techniques.
5G was first standardized in Release 15. The first drop of Release 15 back in December 2017 provided
a standard for service providers for Non-Standalone (NSA) operation within the network. However,
Release 15 did not completely standardize every aspect of 5G. Release 16 and Release 17 includes
further enhancements to 5G to provide full capability and address IMT-2020’s requirements.
5G NR and NG-RAN 7
In terms of a timeline, back in 2017 and 2018, the earlier proprietary 5G systems started to appear;
however, standardization was not complete at the time, so some NSA 5G networks started to emerge.
The period of 2019-2020 was really the time in which the first Phase-1 deployments of standardized
5G based on 3GPP Release 15 commenced. However, most of the networks that were deployed in 2019
centered around NSA operation, which is composed of 5G RAN with Evolved Packet Core (EPC).
Phase-1 deployments are only centered on eMBB services. It is Phase 2 where we see those additional
two pillars of 5G, namely URLLC and mMTC.
Phase-2 deployments are based on a combination of Release 15 and Release 16 features. We see full
SA operations take place with the various features relating to URLLC and mMTC as well as eMBB.
In this section, we looked at the key drivers, performance synopsis, and standardization of 5G, which
will help us understand the forces driving the technology we will be studying in this book.
We will now look at 5G NR and NG-RAN.
5G NR and NG-RAN
Figure 1.4 shows the end-to-end architecture for the 5G system.
NG-RAN architecture
Figure 1.5 shows key elements within the architecture of the NG-RAN. The User Equipment (UE)
can be in the form of a mobile device, but it could also be in all manner of different forms, as can be
appreciated with the advent of IoT. In order to provide RAN coverage, there are gNBs, which stands
for New Radio Node B. A radio interface is needed to create connectivity between the UE and the
gNB. That radio interface is called 5G Uu. Notice also that there is connectivity between the gNBs.
So, the Xn reference points allow these gNBs to communicate with each other. Finally, connectivity
between gNBs and the core network is needed, which is also achieved by the N reference points. In
the diagram, the N2 reference point is providing the control plane flow, whereas the N3 reference
point is used for the user plane, which carries user traffic and user data.
8 Introduction to 5G
The gNB is responsible for radio resource management and a big part of that is scheduling uplink
and downlink data onto the radio interface. The gNB handles numerous different devices and its cell
or even cells. A single gNB may be in control of several different cells. It is responsible for scheduling
user data correctly onto the downlink or telling the UE when to transmit data on the uplink. The
gNBs are also responsible for handovers. The Xn reference point that sits between the gNBs allows
them to coordinate handovers between themselves. Security is a key factor as well, so the gNB will be
involved in the security across the radio link as well as the UE. Finally, the gNBs are responsible for
dual connectivity, which will be examined later in this chapter.
The UE is responsible for bidirectional data transfer via the 5G NR, ensuring a high quality of service.
So, the UE needs to be sure that the correct traffic is sent to the correct bearer. By being the other end
of the radio connection, the device is also responsible for security. Finally, the UE needs to support
dual connectivity if it is being used in the network architecture.
Tracking areas
Looking at the NG-RAN at a higher level, we can see that there are thousands of gNBs deployed to
provide that RAN coverage. In any mobile communication system, the UE is not constantly connected
to the network. The device will routinely be set to an IDLE state in order to preserve the battery
life. In the IDLE state, the UE will be conducting operations such as cell reselection. But it will also
periodically be listening to see whether it is being paged. Any data coming into the 5GC to be sent to
the UE requires paging. The network needs to know where that device is.
5G NR and NG-RAN 9
However, the problem is that the cell reselection that takes place in an IDLE state is done autonomously
and the device does not keep the network updated as to which specific cell it’s in. If we need to page
that UE, what we don’t want to have to do is page every single gNB in the NG-RAN. So, consequently,
the NG-RAN is broken down into tracking areas. What’s crucial in the system is that the UE might
be autonomously making cell reselection when it is in the IDLE mode. The UE will keep the network
updated as to which tracking area it is currently in. A tracking area is simply an administrative collection
of gNBs and their associated radio coverage, as depicted in the figure.
The 5G Core Access and Mobility Management Function (AMF) in the 5GC keeps track of the
tracking area that the subscriber is currently in. So, the subscriber’s UE will be required to update the
network any time it moves into a new tracking area. The User Plane Function (UPF) in the 5GC is
responsible for the user plane data. If user data comes into the UPF, it will inform the AMF and the
AMF will page a specific tracking area instead of paging every gNB in the network, since it already
knows which tracking area the UE is in.
The tracking areas effectively make paging much more efficient. As soon as the UE connects to the
network, the AMF will know its cell ID. But when it is IDLE, it just knows the location of the UE to the
granularity of the tracking area. Tracking area planning is all about making the paging more efficient.
is, will the service provider be deploying the 5GC or 5G Radio Access Network first or will they both
be deployed in parallel? Either way, there are various connectivity and deployment options available
for the service providers to choose from. It is not necessarily the case of one or the other being used;
it could be a mixture.
With the NSA approach, there is a 5G gNB, which supports dual connectivity to a 4G eNB, which
stands for Evolved Node B. So, the UE will be in communication with both RAN nodes together. It
will have 4G radio connectivity to the eNB and 5G radio connectivity to the gNB. With the help of
5G radio connectivity, service providers can provide 5G services to their customers. In this approach,
notice that the control connectivity goes back into the 4G EPC since the eNB is the primary RAN
device in this architecture. So, this approach provides the benefits of 5G gNB with 5G RAN coverage.
Alternatively, 5GC can also be utilized. In this approach, there is a gNB again and that gNB is in
communication with a Next-Generation eNB (ng-eNB). The main difference is that the ng-eNB
connects to the 5GC. But it’s a similar scenario whereby dual connectivity is used with the gNB as a
secondary device and the ng-eNB as a primary device or master device and that control comes from
the 5GC down to the ng-eNB. Both these options are NSA. It depends on the service provider as to
which approach they want to go for.
The second option is SA, which is a pure 5G deployment. The UE is using the gNB and that gNB is
connecting directly to the 5GC.
Certainly, the NSA option is more straightforward to implement with a smaller investment. However,
in the long term, network architectures and thus network deployments will be based on SA.
5G NR and NG-RAN 11
Dual connectivity
In a typical network deployment, there are UEs in communication with RAN nodes and RAN nodes
are connected to the core network through the control plane and user plane. In the context of dual
connectivity, the RAN node is the master RAN node. The master RAN node effectively controls any
dual connectivity activity that takes place, which includes adding a secondary RAN node. This is
where the dual connectivity terminology comes from.
With this approach, a secondary RAN node works in parallel with the master RAN node to improve
the effective data rate that the UE can achieve. To accomplish this, there must be a control and user
plane connection between the secondary and master nodes. Certainly, the data rate for the subscriber
device can be significantly increased by taking this approach.
The terminology used between the master RAN node and the secondary RAN node varies depending
on the network architecture and mobile technology. In 5G, for instance, the master and secondary RAN
nodes could both be gNBs. Alternatively, the master could be an ng-eNB and the secondary could be
a gNB. So, there are several different options available. From the service provider’s perspective, it is
up to them how to deploy their dual connectivity solution.
Certainly, there are different approaches where a mixture of technologies is used between the master
and secondary RAN nodes, as can be found in 5G NSA deployments. Fundamentally, by using these
12 Introduction to 5G
two nodes together, better coverage and improved data rates can be provided for the subscribers. Note
that the UE has also got to support dual connectivity. This is particularly important if, for example,
the master RAN node is an eNB and the secondary RAN node is a gNB, in which the device is then
supporting 4G and 5G radios simultaneously.
Small cells
Small cells are nothing new; they are not a new technology. Small cells have already been in use with
previous technologies for several years. In this section, small cells will be examined in the context of
dual connectivity in 5G.
5G is set to really benefit from the deployment of small cells. In the following scenario, small cells are
providing augmented indoor coverage where in-building penetration of the macro cell, especially in
a high-frequency range, might be quite difficult. Consequently, these small cells are deployed within
a building to improve indoor coverage and capacity in some cases. However, for 5G, indoor coverage
is an important aspect of small cells and indeed outdoor small cells will be routinely deployed.
There are macro-level RAN nodes and small cells with the outdoor small cell deployment approach.
These macro-level RAN nodes act as the master RAN nodes, whereas the small cells act as the secondary
RAN node within the dual connectivity deployment.
As the UE moves through the network, the blue line shows us the coverage that is experienced from
the macro-level RAN nodes. The small cells provide data rate boosts to the UE as it moves through
them. Therefore, in a dense urban environment, these small cells, which may only have a range of
hundreds of meters, can provide that augmented data rate boost to the network while increasing the
overall capacity.
These small cells can be set on the top of street poles, street furniture, lampposts, and so on. Small cells
are a strong deployment option for service providers to really achieve the data rates expected for 5G.
5G NR and NG-RAN 13
Increased spectrum
In meeting the target of 100 megabits per second as a mean data rate, or potentially 20 Gbps as a
peak data rate, it is essential for the service providers to have access to a more licensed spectrum.
Consequently, the licensed spectrum bands that are being considered for 5G operation have been
greatly increased.
For 5G deployments, there are several bands in use. They are below 1 GHz, 1-6 GHz, and 6-100 GHz
bands. The below 1 GHz and 1-6 GHz bands are not new, and they are used by service providers quite
routinely. 6-100 GHz is really the new band. So, let’s explain why this new band is needed.
Below 1 GHz is excellent for building penetration with wide area coverage. The coverage is potentially
about tens of kilometers depending on the topography. But the problem with operating below 1 GHz is
that there is not that much spectrum available for service providers, that is, there is limited spectrum
availability. So, what we need to do is start looking higher up in the radio spectrum.
1-6 GHz provides decent coverage, and there is also good spectrum availability. 6-100 GHz is low
range and only provides hundreds of meters of coverage, but there is greater amount of spectrum
available. However, it is the key enabler for unlocking the stringent data rate requirements. Service
providers will be operating in much bigger bands higher up in the licensed Radio Frequency (RF)
spectrum, which is essential for providing those data rates.
As it has been with technologies that have come before and at the same time as 5G, ITU is responsible
for standardization and global harmonization of the RF spectrum. At the World Radio Conference in
November 2015, they already started to discuss and define some of the operating bands for 5G, and
at the World Radio Conference in October 2019, those bands were set in place.
Radio enhancements
5G NR means that the UE needs to be able to support 5G radio, and so too does the gNB. There are
many different tweaks that have been employed in NR protocols. However, only two high-level aspects
are going to be examined here.
Fundamentally, one of the big changes is the employment of Cyclic Prefix Orthogonal Frequency
Division Multiplexing (CP-OFDM) to provide greater deployment flexibility, which adopts variable
subcarrier spacing. This helps service providers obtain much more flexibility in terms of what kind
of RAN coverage they want to provide. Therefore, CP-OFDM allows them to address whether to
deploy a small cell or a very large macro cell while allowing them to be very flexible in terms of the
frequency range that they can operate on. Moreover, variable subcarrier spacing allows addressing
specific latency requirements.
To address the requirements of the different IMT-2020 use cases, there will be a mixture of different
cell types. Some cells might require low latency and high frequency, whereas others might be long-
range cells. Therefore, to accommodate those different IMT-2020 requirements, such as latency and
coverage, CP-OFDM has been introduced.
14 Introduction to 5G
The other key area that has been introduced with 5G NR is the use of 256 Quadrature Amplitude
Modulation (256QAM), which is already in use with LTE Advanced technology. This is simply a
radio modulation technique and effectively allows squeezing even more data onto the radio carrier,
hence increasing those data rates as appropriate. However, to utilize 256QAM the UE needs to be in
a very good radio coverage environment.
Beam forming
On the left-hand side of Figure 1.11, traditional antenna coverage is represented. Traditionally, the
antennas might be sectored so they cover quite a large area. Within that coverage area, there might be
fixed wireless access subscribers within the houses, mobile phones, or even fast-moving subscribers.
But the idea of traditional antennas is to cover a wide area.
In 5G, Massive MIMO is set to be used. A Massive MIMO antenna is a totally new antenna design
that comprises a huge number of radio frequency elements, in effect radio frequency antennas.
One of the key advantages of Massive MIMO antennas is being able to form beams of radio frequency
energy. This Massive MIMO array can provide much finer grain coverage. If there is a UE within that
beam of coverage, the UE will get better general RAN coverage, which means the technologies such
as 256QAM can be used to achieve the optimum data rate.
It is not only about creating that narrower beam of radio frequency energy; Massive MIMO antennas
should be able to do that for numerous subscribers within the cell. So, the beam will constantly be
flicking around to service different subscribers, which is called beam steering.
Beam steering
Beam steering is the concept of beams following a UE in the network. If the UE does not move too
quickly, it can constantly provide feedback to the antenna so that the antenna can adjust the direction
of the beam that it is sending. It is great for slow-moving UEs, while it is more challenging for fast-
moving UEs for the beam to keep track of them. Basically, it depends on the speed of the UE whether
the beam steering is used or not.
Beam forming and beam steering are considered to be critical areas associated with 5G RAN deployments.
Cloud RAN
The final point related to 5G NR and NG-RAN techniques and technologies is the notion of cloud
RAN. Essentially, cloud RAN sees the introduction of virtualization technologies to the radio access
network. With cloud RAN, each individual gNB has separate compute and processing resources. The
idea behind cloud RAN is to take that compute and storage capability and move it to a Centralized
Unit (CU). This CU is responsible for conducting the processing and computing activities of all these
gNBs. So, the idea here is the compute capabilities are centrally located in a data center and all that
remains is down at the cell site are distributed units.
The distributed units are the transmit and receive elements of the gNB. This helps RAN deployment
to be simplified and potentially cheaper. The central controlling element fundamentally is sending
16 Introduction to 5G
to the distributed units what they need to transmit. The distributed units are simply responsible for
transmitting, receiving, and exchanging that traffic with the CU.
The optical transmission links that connect the CU to the distributed unit in this approach are very
critical. Fundamentally, these links must meet very low-latency requirements and they can be over a
kilometer long. But in summary, here, the CU is simply using virtualization technologies to control
several distributed units.
In this section, we analyzed the concepts of NG-RAN architecture, 5G RAN deployment options, and
NR and NG-RAN features, which create the basis for the upcoming chapters, where we will examine
them in detail.
Summary
5G standardization is being driven to meet the requirements of IMT-2020. We mentioned the three
pillars several times: eMBB, URLLC, and mMTC. The theoretical maximum data rate for 5G is 20
Gigabits per second, although the mean data rate for the subscriber is in the low hundreds of megabits
per second. RAN latency requirements are around sub-1 ms.
3GPP standardization for 5G started with Release 15 and moved on to Release 16. In Release 17, we
also see enhancements taking place.
Commercial deployments already started taking place in 2019 and onward into 2020 and 2021.
Summary 17
We also analyzed the main components of the 5G system, including the 5G NR and NG-RAN. In
terms of the NG-RAN, there are two main elements: the user equipment and the gNB.
We saw that tracking areas are designed to make paging more efficient by creating subgroups of gNBs
across the Radio Access Network.
We discussed the different RAN deployment options available to service providers. At a high level,
they are called NSA and SA deployments.
We also analyzed the NR and NG-RAN features, which gives us important knowledge for upcoming
chapters. First, we talked about dual connectivity. It can be used to significantly increase a subscriber’s
experienced data rate. It is a key technology enabler for 5G. Small cells are closely related to dual
connectivity. We talked about how they can be deployed indoors or outdoors. With respect to licensed
spectrum, we said it is essential to unlock an additional licensed spectrum for the service provider so
that they can operate the network at those high data rates.
We also talked about the new air interface technologies. We talked specifically about CP-OFDM and
the use of 256QAM. Beam forming antennas associated with the use of Massive MIMO will be critical
and with that, we also get beam steering. Then, finally, we discussed Cloud RAN. We talked about how
it can provide efficiency and potential cost savings to the service provider if they choose to deploy it.
In the next chapter, we will go over the end-to-end network architecture of 5G. We will learn about
some concepts and the high-level components of access networks, packet core networks, and transport
networks. We will also understand how the quality of service is managed in 5G networks.
2
End-to-End Architecture
Components, Concepts,
Security, and Transport
In this chapter, we will learn about the various components that make up a 5G network. We will go
into detail about the role of each of these components. We will introduce some terms newly introduced
in 5G and understand how they all fit in. The topics discussed here will create a foundation for
understanding a 5G network and its various Network Functions (NFs). This chapter will provide
the knowledge base upon which we will build in upcoming chapters to be able to design and operate
a commercial 5G network.
We will go over the end-to-end architecture of 5G. We will learn about what it takes to build a 5G
network from scratch. We will learn about the various components that make up the network. We will
also understand some concepts that are fundamental for understanding and building 5G networks.
We will touch upon the transport and security aspects of 5G and also provide a decision chart that
will help you with a jumpstart to build your own 5G network.
In this chapter, we’ll work through the following topics:
• A typical 5G network
• High-level components
• 5G network concepts
• 5G identifiers
A typical 5G network
A typical 5G network comprises three broad components that it uses to connect to the internet or
to applications. Firstly, we have the radio component, also known as the access network. Then, we
20 End-to-End Architecture Components, Concepts, Security, and Transport
have the packet core network, which comprises various 5G NFs that we will discuss shortly. Thirdly,
we see the transport network, which serves as the backbone of the 5G infrastructure and carries the
user and control traffic between the access network and the packet core network, finally reaching the
Application Functions (AFs) such as content servers or, simply put, the internet.
In Figure 2.1, we can see the 5G infrastructure components:
• ACCESS NETWORK: The access network comprises the radio components, basically the
G-NodeB (gNB), also known as New Radio (NR). The access network is responsible for
transmitting radio waves, which are received by the User Equipment (UE). This UE could
include a mobile handset in a conventional use case, a vehicle in V2X communications, or
sensors and so on in advanced IoT use cases. The access network is hence the radio network
and is restricted to communication over the air.
• PACKET CORE NETWORK: The packet core network comprises control and User Plane
Functions (UPFs) that are responsible for the management of the subscriber session, charging,
data processing, the Quality of Service (QoS), and so on. We will go over each component shortly.
• TRANSPORT NETWORK: The transport network is the backbone that connects the access
network with the packet core network and the internet. Here, the word internet is loosely
High-level components 21
used – it can be any AF or content server, such as Netflix, a server with custom content, or an
IoT platform. The most important facets of the transport network are that it should be able to
meet the latency and bandwidth requirements and also should be secure and not subject to
attack by rogue elements.
Now that we’ve understood the basic 5G network, let’s move on to looking at the high-level components.
High-level components
Multiple components come together to bring up a 5G network. In this section, we will learn about
the high-level components that are a must in creating and operating a 5G network. 5G provides a
lot of flexibility in the design of the network – we will also discuss the options as we go over each
high-level component.
• In the CU, the radio stack is decomposed to comprise Service Delivery Adaptation Protocol
(SDAP) for NR, Packet Data Convergence Protocol (PDCP), which uses packet processing
components, including ciphering and header compression, and Radio Resource Control
(RRC), which is responsible for controlling radio channels.
These components are not time-critical and hence they are good candidates for virtualization.
The CU is generally deployed in remote near-edge data centers and is usually co-located with
UPFs for low-latency applications. The mid-haul transport network connects the CU to the DU.
• The DU comprises the Radio Link Control (RLC), Medium Access Control (MAC), and
Physical (PHY) layers, along with the brain of the radio base station, the scheduler. The DU is
a logical node hosting the RLC, MAC, and PHY layers of the gNB, and its operation is partly
controlled by the CU. The components in the DU are responsible for rate adaptation, channel
coding, modulation, and scheduling radio resources among the UEs in its coverage. One DU
supports one or multiple cells. One cell is supported by one DU. The DU is connected to the CU
by an F1 interface. This is highly time-sensitive and must operate within the guardrails of the
latency requirements, which are in the order of milliseconds. The DU can be located in near-
edge data centers or can be collocated with the Remote Units (RUs) for far-edge sites.
22 End-to-End Architecture Components, Concepts, Security, and Transport
• The RU is the entity that is deployed at the cell sites, also known as Remote Radio Head (RRH).
It connects to the DU through a CPRI or an eCPRI interface.
To summarize, the access network comprises the entities that control over-the-air communication between
the UE and the 5G network. We will get into the details of this communication in upcoming chapters.
To design a 5G network, it is of the utmost importance to first decide on what use cases need to be
supported. The design of the network will change according to the latency, reliability, and bandwidth
needed to support a particular use case. In the example shown here, the use cases supported are
enhanced broadband, Ultra-Reliable Low Latency Communications (URLLC), and the IoT, which
means that this can be adapted to cover most applications.
Let us focus on the main components of this design one by one – firstly, a far-edge site. This is basically
the cell site in which the radio tower is erected. As most of us will know, an entire geographical
area is broken down into cells in which radio base stations transmit. The hexagonal figures denote a
combination of one or more cells, which can be connected to one or more RUs. Since this is close to
the user accessing the network, it is known as far-edge.
It should be noted that for some deployment options, a far-edge site can host both the DU and the RU.
In other cases, the DU can be located in a local data center close to a collection of sites to aggregate
the data. It is also possible to locate the DU, along with the CU, in a near-edge data center. The near-
edge data center can also host the UPF for delay-sensitive applications. It is also possible to collocate
the CU, DU, and RU in a far-edge data center. Hence, many different location configurations are
24 End-to-End Architecture Components, Concepts, Security, and Transport
possible. It is the operator’s choice to select the appropriate combination. The general idea is that
closer proximity of these radio components to the UPF will reduce the latency and hence be more
appropriate for delay-sensitive applications.
The CU is then connected to the mobile packet core by optical fiber. The mobile packet core can be
centrally located. It is also possible to regionalize the packet core in cases where the geographical area
of a country is large. In this case, there can be multiple regions – for example, east, west, north, south,
and central – that cater to the traffic and subscribers in proximity in order to reduce latency. Hence, the
determining factor for the design choice is also the geographical area of coverage. Often, the connectivity
of the CU to the packet core is via leased lines, so it is important to ensure the lines are secure and use
security protocols to avoid malicious snooping and attacks that can cause denial-of-service.
5G network concepts
Multiple NFs come together to make the 5G System (5GS). Each of these NFs has a designated function
and is connected to one or more other NFs to provide its services or consume services provided by
another NF.
5G almost entirely ushers in the adaptation of virtualized infrastructure. The NFs have been designed
to operate over Commercial Off-The-Shelf (COTS) hardware and are no longer complicated or
expensive. These NFs are therefore virtualized. They can be virtual machine-based or use microservices-
based or bare-metal-based software capable of running microservices directly, bypassing the need for
a VM. The 3GPP standards on 5G have been written keeping this microservices-based virtualized
infrastructure in mind. Hence, 5G completes the cycle of telecom virtualization that started with 4G
and comes full circle with 5G.
3GPP has defined each of these connections between any two NFs, as shown by the reference point
architecture diagram in Figure 2.3. Each of the connections is named – this name comprises the letter
“N,” followed by a number to uniquely identify the connection between the two NFs.
We will go into the details of what role each of these NFs performs and how it interoperates with its
neighboring NFs:
5G network concepts 25
This diagram details the various constituents of a 5G network. In the previous sections, we have focused
mainly on radio and transport. In the upcoming sections, we will cover each NF.
The AMF
A reference point diagram for an AMF is shown in Figure 2.4. The AMF is connected to various other
NFs via well-defined interfaces, as indicated here:
It must be noted that all these interfaces are service-based interfaces. We will learn more about the
service-based model in the next chapter. The numbers denote a specific connection name:
• N11: This is the interface that connects the AMF to the SMF, and the AMF controls it
• N15: This is the interface that connects the AMF to the PCF
• N2: This is the interface that connects the AMF to the N3-Interworking Function (N3-IWF)
and the Next Generation Radio Access Network (NG-RAN)
• N1: This is the virtual interface that connects the AMF to the UE for signaling
• N17: This is the interface that connects the AMF to the Equipment Identity Register (EIR)
• N20: This is the interface that connects the AMF to the Short Messaging Service Function (SMSF)
• N22: This is the interface that connects the AMF to the Network Slice Selection Function (NSSF)
• N12: This is the interface that connects the AMF to the Authentication Server Function (AUSF)
• N8: This is the interface that connects the AMF to the UDM
The AMF is responsible for the termination of the CP interface from the NG-RAN (N2). Hence, it is
connected to the gNB via the same interface. The AMF also terminates the NAS (N1) and is responsible
for ciphering and integrity protection of NAS messages exchanged between it and the UE. The AMF
undertakes the registration management of the UE and ensures that a legitimate UE is successfully
registered with the network. It will reject the registration of UEs without subscriptions or incorrect
subscriptions. Hence, it behaves as a gatekeeper to the network, only allowing legitimate subscribers
to access the network. Hence, it provides access authentication and authorization functions. It also
provides support for network slice-specific authentication and authorization.
The AMF is responsible for managing the connection of the subscriber. It is also responsible for
reachability management and will page an idle UE so that it can come back to a connected mode
and service a call. The AMF is also responsible for mobility management, which means that it is
responsible for successfully handing over UE from one tower to another, and also from one AMF
region to another. If the UE ventures outside of the coverage of the AMF, it is also responsible for
inter-RAT handovers to LTE or the WLAN (N3-IWF). It is responsible for providing an EPS bearer
ID for interworking with the 4G EPS.
The AMF events allow for lawful interception, and armed events can be sent to the authorities for law
enforcement. It also provides location services management to regulatory bodies. The AMF provides
a transparent container for Session Management (SM) messages between the SMF and the UE. An
AMF uses the N14 interface for AMF re-allocation for AMF-AMF information transfer. This can be
either intra- or inter-PLMN, and therefore be leveraged for both inter- and intra-PLMN mobility.
Additionally, to implement SMS functionality, it provides transport between the UE and the SMSF.
5G network concepts 27
The SMF
The SMF is responsible for session establishment, modification, and release. It is responsible for
maintaining the tunnel between the UPF and the access node (the gNB). One of the most important
responsibilities of the SMF is UE IP address allocation and management. This UE IP address can be
locally allocated from a pre-configured IP pool, or it can be received from the UPF or an external data
network. The SMF is expected to perform DHCPv4 and DHCPv6 server and client functionalities. It is
responsible for responding to Address Resolution Protocol (ARP) requests and IPv4/IPv6 neighbor
solicitation requests based on the local cache for Ethernet Protocol Data Units (PDUs). The SMF
responds to ARP and neighbor solicitation requests by providing the MAC address corresponding
to the IP address sent in the request:
SMF selects the UPF that will service the subscriber, and this selection can be based on various
parameters, such as the current load on the UPF, the TAC, or cell ID-based selection for closer
proximity to the UE. It is responsible for providing traffic steering information to the UPF so that
traffic is routed to the proper destination. It interacts with the PCF via the N7 interface and receives
traffic rules and QoS parameters for each subscriber. The SMF also provisions lawful intercept probes
for law enforcement authorities. It is responsible for collecting charging data and providing it to the
CDF for billing purposes. The SMF is also the termination point for SM parts of NAS messages. It
provides support to downlink data notification messages and notifies the AMF of any incoming traffic
for a particular UE in idle mode. SMF determines the SSC mode for a session (we will discuss SSC
modes in the next section). The SMF supports PCSCF discovery for voice sessions.
The UPF
The UPF is the main data plane NF in the 5G packet core. It connects to the gNB (radio) using the N3
interface and the data network or the internet on the data plane using the N6 interface. It is connected
28 End-to-End Architecture Components, Concepts, Security, and Transport
to the SMF on the control plane by the N4 interface. The user data traffic flows from the UE to the
gNB to the user plane and exits to the data network. No other node in the 5GS is in the data path:
The UPF is the anchor point for intra- and inter-RAT mobility. In some cases, the UPF can also
optionally allocate IP address prefixes in response to SMF requests. It carries out packet routing and
forwarding and it can be involved in packet inspection, which is used to detect the application based
on the service data flow template and the optional Packet Flow Descriptors (PFDs) received from
the SMF. The UPF enforces gating, redirection, or steering policies on the traffic – these policies
are received from the SMF but applied on the UPF, as it is directly in the traffic path. Hence, QoS
enforcement UL/DL is done here and also supports reflective QoS marking in DL.
The UPF plays an integral part in lawful interception and can forward data packets to law
enforcement servers.
The user plane also accounts for the volume of data packets and reports the same to the SMF. The
UPF carries out downlink packet buffering, which applies to minimizing packet loss, mainly during
handovers. It is responsible for sending and forwarding end markers to the NG-RAN node used in
UE mobility scenarios.
It also triggers downlink data notifications to the SMF when data arrives for UE in idle mode. The
UPF is also responsible for responding to router solicitation and ARP requests; it sends the MAC
address corresponding to the IP address in the request.
The UPF can duplicate packets in the downlink and eliminate them in the uplink direction in the
GTPU layer. It supports TSSS steering functionality to steer MA PDU session traffic.
The PCF
The PCF is responsible for providing a unified policy framework to govern network behavior. It provides
policy rules to control plane functions such as the SMF so that they can be passed on to the UPF to
enforce them. It also accesses subscription information from a Unified Data Repository (UDR) to
5G network concepts 29
make relevant policy decisions. It accesses the CHF for usage monitoring information, based on which
it sends rules to the SMF. Hence, the PCF is used to manage the network QoS and traffic steering rules.
It interacts with the AF over N5 and receives application-level information, such as the bandwidth and
QoS requirements, and also takes a decision on traffic routing based on application traffic properties.
The PCF interacts with the UDR; it retrieves policy and subscription information. The UDR can also
send notifications based on subscription information changes to the PCF so that it can in turn notify
the SMF with updated rules for traffic policing.
N30 interfaces with the Network Exposure Function (NEF); it exposes the capabilities, services, and
resources of the PCF to the outside world.
The N28 interface of the PCF with the CHF is leveraged for usage control, to notify the PCF when the
subscriber crosses a usage threshold and needs to be throttled, as an example. When a threshold is
breached, the CHF notifies the PCF, which, in turn, sends throttling rules to the SMF to be enforced
on the UPF.
The AMF and the PCF exchange UE mobility-related information so that the PCF can trigger policies
based on RAT type, UE mobility, and so on.
The NEF
The NEF is responsible for securely exposing the NF capabilities and events to third-party AFs. The
NEF stores information to and retrieves information from the UDF located in the same PLMN and
securely provides information from non-3GPP networks. It also translates information between the
AF and the 5GS. It masks network and user information for external AFs based on the network policy.
30 End-to-End Architecture Components, Concepts, Security, and Transport
The NEF can also support PFD storage, which it retrieves from the UDR and can supply to the SMF
using a push or pull method based on the request from the SMF. Network Data Analytics Function
(NWDAF) analytics can be securely exposed to AFs using the NEF. The NWDAF can also retrieve
information about the AF via the NEF. It can also support non-IP-based delivery.
The NRF
The Network Repository Function (NRF) is used for service discovery. It receives an NF discovery
request from the NF instance or Service Communication Proxy (SCP) and provides the requested
information to the requesting NF or SCP, whichever applies. It can be used to discover P-CSCF for
IMS calls. It maintains a profile of all the NFs that are registered with it and maintains a record of
the services they offer. It maintains the health of the NFs it discovers and keeps track of the load
information. It notifies the already registered NFs of any new NF registration and informs the other
NFs about the services available from new NFs. In the case of network slicing, multiple NRFs can be
deployed at the PLMN level, the shared slice level, or a slice-specific level.
The NRF maintains the following information on registered NFs:
• NF instance IDs
• NF types
• PLMN IDs
• Network slice identifiers
• IP addresses or FQDNs of the NFs
5G network concepts 31
• NF capacity information
• NF priority information
• NF set IDs
• Names of supported services, if applicable
• Endpoint addresses of instances of each supported service
• TAIs
• NF load information
• Routing indicators for the UDM and AUSF
• GUAMIs for the AMF
• SMF area identities for the UPF
• UDM group IDs
• UDR group IDs
• AUSF group IDs
• PCF group IDs
• HSS group IDs
• Supported analytics IDs
• Event IDs supported by AFs for the NEF
• Application identifiers supported by the AFs for the NEF – ranges of external identities
Figure 2.9 – The reference architecture for the 5G core with a focus on the NRF
32 End-to-End Architecture Components, Concepts, Security, and Transport
The UDM
The UDM function is the main repository for subscriber information and engages in subscriber
management. It is responsible for the generation of 3GPP – that is, authentication credentials. It stores
and manages the Subscription Permanent Identifier (SUPI) for each subscriber in the 5GS. It supports
the de-concealment of the SUPI to reveal privacy-protected subscriber information (the Subscription
Concealed Identifier (SUCI)). It provides access authentication based on the user subscription – for
example, for roaming users, it verifies whether the subscriber has roaming privileges in the requested
network. It manages the users serving NF registration by storing and retrieving the AMF for the UE
and storing SMFs for UE PDU sessions. It maintains the SMF/Data Network Name (DNN) assignment
for the UE and thereby helps maintain the session continuity in the case of handovers and so on. It
also supports lawful interception.
The UDM may use subscriber information stored in the UDR – in which case, the UDM only
implements the application logic and does not need to store data.
The AUSF
The AUSF supports authentication for 3GPP access and non-3GPP access; it is responsible for storing
keys and implementing an EAP authentication server.
The N3IWF
The N3 Interworking Function (N3IWF)enables the 5GS system to work with untrusted non-3GPP
access networks. It supports the establishment of IPsec tunnels connected to the UE. The N3IWF
terminates the IKEv2/IPSec protocols with the UE over the NWu. The information needed to authenticate
and authorize the UE within the 5GS is relayed over N2. It terminates the N2 and N3 interfaces of the
5G core network for the control plane and user plane. It relays UL/DL NAS signaling between the UE
and the AMF. It handles N2 messages from the SMF, which are transparently carried by the AMF and
related to the UE. It carries user traffic from non-3GPP access networks into the 5GS. It enforces the
QoS relayed in the N2 message. It terminates the data path between N3 and the UPF. It also serves as
the local mobility anchor within the untrusted 3GPP networks.
A classic example of the use of the N3IWF is WLAN support in a 5GS, where the WAN (which is
untrusted) is able to work with the 5GS.
The AF
The AF interacts with 3GPP packet core NFs to support application’s influence on traffic routing. It
has access to the NEF and interacts with the policy framework for policy control and IMS interactions
in the 5G core:
5G network concepts 33
The role of the AF is relevant in non-roaming cases. The AF can send requests to influence the SMF
routing decisions for the traffic in a PDU session. The AF may also influence the UP selection by
the SMF. The AF interacts with the PCF via N5 and hence can update policies related to an ongoing
PDU session.
The UDR
The UDR serves as the data store for the subscription information for UE. It helps in the storage and
retrieval of subscription data by the UDM. It helps with storage and the retrieval of policy data for
the PCF. It also stores and retrieves structured data for exposure via the NEF:
It stores PFDs for application detection. It also stores and retrieves NF group IDs corresponding
to a subscriber. It must be noted that the UDR is an intra-PLMN NF and it will store and retrieve
information only for the NFs within the same PLMN.
The SMSF
The SMSF is responsible for providing the functionality of supporting SMS over NAS. It performs
SMS management subscription data checking and conducts SMS delivery accordingly. It relays the
message from the device toward the SMS-GMSC, IWMSC, or SMS router, and vice versa:
It also generates CDRs related to the SMS. It can perform lawful interception and interacts with
the AMF and the SMS-GMSC for the notification procedure that communicates whether the UE is
available or unavailable for SMS transfer. It also notifies the SMS-GMSC to inform the UDM when
the UE is unavailable to receive SMS.
The NSSF
Network slicing is a concept introduced with 5G networks. Network slicing allows the operator to
design their physical infrastructure differently for different use cases. As an example, a URLLC use
case, an enhanced broadband use case, and an IoT use case can all be assigned different types of
infrastructure (hardware or networking) based on the requirements of latency, reliability, availability,
and so on. Hence, the operator can choose to deploy a latency-sensitive application for URLLC in a
CPU and a memory-intensive chipset with faster processors, while the enhanced broadband use case
can be deployed on COTS viable hardware. Hence, unlike the legacy model of one-size-fits-all, with
network slicing in 5G, this is no longer the case.
Network slices are assigned Network Slice Selection Assistance Information (NSSAI), with a given
slice and service type to identify the use case.
5G network concepts 35
The NSSF is responsible for selecting a set of network slice instances to serve the UE. It determines the
allowed slices for the UE and the AMF set that will be used to serve the UE. This can be determined
through the static configuration of the AMF sets assigned to each slice on the NSSF or by querying
the NRF.
The SEPP
The Security Edge Protection Proxy (SEPP) is used to enable different 5G networks to securely
interconnect with each other. It is responsible for providing end-to-end confidentiality and integrity
between two operator networks in roaming cases. Hence, this NF is used to aid roaming partners to
interconnect securely. It carried out message filtering and policing on inter-PLMN control plane interfaces:
It hides the network topology of the two networks it connects from each other. The SEPP protects
the connection between service producers and service consumers. It acts as a service relay between
the actual service provider (in one network) and the service consumer (in a different network), but
for both the service producer and the consumer, the result of the service relay is transparent. Hence,
it is equivalent to a direct service interaction.
The NWDAF
As the name suggests, this NF represents operator-managed network analytics. It implements service-
based interfaces to collect data via a subscription or request model from other NFs:
36 End-to-End Architecture Components, Concepts, Security, and Transport
The objective is to provide an analytical capability in the network that can be leveraged for network
automation, monitoring, identifying challenges in the network, and so on. The NWDAF can be securely
exposed by the NEF for consumption by external entities.
The following use cases are supported by the NWDAF:
The SCP
The SCP is an optional NF that helps with indirect communication between a producer and a
consumer. It serves the additional role of load-balancing service requests among various producers.
Hence, when a consumer sends a request, the SCP selects the appropriate producer based on the load
and availability criteria:
5G network concepts 37
The NFs can have direct communication, such as in the example in the preceding figure in which the
consumer and NRF directly communicate. However, communication can also happen via the SCP,
as in the example shown at the bottom of the diagram. In this case, the discovery of the NF can also
be delegated to the SCP, which, in turn, contacts the NRF to find the appropriate consumer and relay
the information to the consumer.
Among the other responsibilities of the SCP is communication security. It authorizes the NF consumer
to access the NF producer.
It monitors the NFs and balances the load. The SCP can be deployed in a centralized or distributed
manner. Similarly, more than one SCP can be present in the communication path between the producer
and consumer services. To ensure that multiple SCPs can route messages between a producer and
consumer, the SCP can also register its profile in the NRF. Alternatively, a local configuration should
also be supported.
It can be deployed at a PLMN level, shared slice level, or slice-specific level with the condition that
the SCP can communicate with the appropriate NRF.
The NSSAAF
The Network Slice Specific Authentication and Authorization Function (NSSAAF) is used for
slice-specific authorization and authentication with an AAA server, which can be hosted either by
the host PLM or by a third party that has a business relationship with the host operator, such as a
slice dedicated to a particular enterprise. This is executed with the help of the EAP framework. The
AMF performs the role of the EAP authenticator and communicates with the AAA server via the
NSSAAF. The NSSAAF is responsible for any AAA protocol-related interworking with the AAA
protocol supported by the AAA server.
38 End-to-End Architecture Components, Concepts, Security, and Transport
The procedure of NSSAA is triggered by the AMF during a registration procedure when a certain
network slice requires slice-specific authentication, when there is a subscription change, or when the
AAA server requires a re-authentication.
In previous sections, we have learned about the key components of a 5G network, explored their role
and responsibility, and how they interwork with each other. In the next section, we will cover some
key 5G network concepts that are used.
5G network concepts
In this section, we will go over the various new concepts and terminologies introduced with 5G.
PDU sessions
A PDU session is the logical connection between the UE and the data network. It is by the means of
this logical connection that the UE is able to browse data, place calls, and so on.
This connection determines the QoS experienced by the user. Consider a case in which the UE initiates
an attach request to the network so that it can access the internet; what happens in the background
is that a logical connection (or pipe) is created between the UE and the 5G network that carries the
data flows associated with browsing the internet.
This logical connection is defined by attributes such as a QoS parameter. Certain PDU sessions require
a guaranteed QoS, which must be provided by the network if the PDU session is accepted. Hence, the
network must reserve resources for this kind of PDU session. A classic example of this is an emergency
call. When a user places an emergency call, the network must admit the call and provide the necessary
resources. We will learn more about 5G QoS in the upcoming sections.
5G network concepts 39
In the preceding diagram, three PDU sessions are depicted between the same UE and the network.
Each PDU session can have one or more QoS flows, differentiated by the QoS flow indicator.
In the example, one PDU session is an IMS session, the second can be a data session, and the third can
be IoT or enterprise access. Hence, the same device is able to cater to multiple types of applications
that require different types of resources from the network simultaneously.
Every PDU session in UE is associated with an identification number, which is known as the PDU
session ID. In the 5GS, this can range between 1 and 15. For a PDN connection established via MME,
the PDU session ID value is set to 64, plus the EPS bearer ID for the default EPS bearer of the PDN
connection; for a PDN connection established via an ePDG, the PDU session ID value is set to 80,
plus the EPS bearer ID for the default EPS bearer of the PDN connection:
The PDU session can be of the IPv4, IPv6, IPv4v6, unstructured, or Ethernet type.
40 End-to-End Architecture Components, Concepts, Security, and Transport
5G QoS
To understand the 5G QoS better, it is best to start with the terminologies used to describe it:
Every PDU session in the 5GS has one or more QoS flows and each of these flows is identified by its
QFI. The SMF allocates the QFI based on the QoS needed for the particular user traffic. On the radio
interface, on the other hand, multiple QoS flows can be sent into one Dedicated Resource Bearer
(DRB). Only one GTPU tunnel is formed between the radio and user plane for each PDU session.
The GTPU header has a field to depict the QFI, which is used to differentiate flows. The QFI values
can be repeated within the same user equipment for different PDU sessions for the same subscriber.
5G network concepts 41
In the preceding figure, we can see that the UE is accessing the internet. The UE interacts with the
NG-RAN node, which is, in turn, connected to the 5G user and control planes. When the UE powers
up, a PDU session is established; this is the default session used to access the internet. In this case, it
has a 5Q1 of 9, indicating a class of QoS for non-guaranteed bitrate sessions with a delay budget of
300 ms, used for browsing, file downloads, and so on.
A second flow is installed within the same PDU session with a 5QI of 8, which has higher priority
than the first flow with a 5QI of 9. This flow is denoted within the PDU session by QFI 2. A single
GTPU tunnel will serve both flows in the PDU session, and hence a single tunnel endpoint identifier
is allocated to both these flows.
The diagram also shows the GTPU packet with the source and destination IP information, destination
port information, tunnel endpoint identifier details, QFI, and the actual data payload.
Next, considering that the UE now wishes to access voice services, a second PDU session will be set
up. Firstly, a flow with 5QI of 5 is set up, which is used for IMS signaling. Then, subsequently, when
the user actually places a voice call and dials a number, a second flow is installed with a 5QI of 1 and
this is used to carry the voice traffic. Note that within the PDU session, we have two flows denoted
by QFI 1 and QFI 2 with a 5QI of 5 and a 5QI of 1 respectively. There is a second GTPU tunnel in
addition to the one established earlier for the internet browsing session:
42 End-to-End Architecture Components, Concepts, Security, and Transport
It must be noted that each traffic flow is associated with a filter, as shown here. This is used by the UE
to separate the traffic for each flow. Also, note that the same QFI number does not indicate the same
packet filter. Every flow in the UE will be associated with its own filter, which is distinct regardless of
the similarity of the QFI number in different PDU sessions.
Multiple PCC rules (SDFs) can be bound to the same QoS flow as long as the 5QI and the ARP value
are the same.
There can be a maximum of 64 QoS flows in a PDU session. The number of DRBs on the RAN side
that the UE needs to support is 16. In the 5G core, not all PDU sessions may be active at the same time,
so this does not limit the number of PDU sessions that UE can support, although 16 PDU sessions
are quite a lot anyway.
The 5G 5QI-to-QoS mapping is shown here:
5G network concepts 43
Default
Default Packet Packet Default
5QI Resource Maximum
Priority Delay Error Averaging Example Services
Value Type Data Burst
Level Budget Rate Window
Volume
1 20 100 ms 10-2 N/A 2,000 ms Conversational voice
2 40 150 ms 10-3 N/A 2,000 ms Conversational video (live streaming)
Real-time gaming, V2X messages (see
TS 23.287 [121])
3 30 50 ms 10-3
N/A 2,000 ms
Electricity distribution – medium
voltage, process automation monitoring
Non-conversational video
4 50 300 ms 10-6 N/A 2,000 ms
(buffered streaming)
Mission-Critical Push To Talk
65 7 75 ms 10-2 N/A 2,000 ms
(MCPTT) on the user plane
66 20 100 ms 10-2 N/A 2,000 ms Non-MCPTT on the user plane
67 GBR 15 100 ms 10-3 N/A 2,000 ms Mission-critical video on the user plane
75
“Live” uplink streaming (e.g., TS
71 56 150 ms 10-6 N/A 2,000 ms
26.238 [76])
“Live” uplink streaming (e.g., TS
72 56 300 ms 10-4 N/A 2,000 ms
26.238 [76])
“Live” uplink streaming (e.g., TS
73 56 300 ms 10-8 N/A 2,000 ms
26.238 [76])
“Live” uplink streaming (e.g., TS
74 56 500 ms 10-8 N/A 2,000 ms
26.238 [76])
“Live” uplink streaming (e.g., TS
76 56 500 ms 10-4 N/A 2,000 ms
26.238 [76])
5 10 100 ms 10-6 N/A N/A IMS signaling
Video (buffered streaming)
6 60 300 ms 10-6 N/A N/A TCP-based (e.g., www, email, chat, FTP,
P2P file sharing, progressive video, etc.)
Voice
7 70 100 ms 10-3 N/A N/A Video (live streaming)
Interactive gaming
Video (buffered streaming)
8 Non-GBR 80 300 ms 10-6 N/A N/A TCP-based (e.g., WWW, email, chat, FTP,
P2P file sharing, progressive video, etc.)
9 90
Mission-critical delay-sensitive signaling
69 5 60 ms 10-6 N/A N/A
(e.g., MC-PTT signaling)
Mission-critical data (e.g., example
70 55 200 ms 10-6 N/A N/A
services are the same as 5QI 6/8/9)
79 65 50 ms 10-2 N/A N/A V2X messages (see TS 23.287 [121])
Low-latency eMBB applications
80 68 10 ms 10-6 N/A N/A
Augmented reality
44 End-to-End Architecture Components, Concepts, Security, and Transport
The SSC mode is associated with every PDU session, and it does not change during the lifetime of
the PDU session. The following are the various modes of session continuity – for example, in a UE
mobility use case when the user is traveling on a high-speed train:
• SSC Mode 1: In this case, the network needs to preserve the connectivity of the service provided
to the UE. As an example, for a PDU session of the IPv4, IPv6, or IPv4v6 type, the IP address
needs to be preserved.
• SSC Mode 2: In this case, it is not mandatory to maintain the connectivity. When the UE
moves from one region to another or undergoes a handover procedure triggered by any other
reason, the network can “break-before-make” in this case. Hence, the user connectivity or PDU
sessions can be released. As an example, if the UE is allocated an IPv4/IPv6 address during its
initial attachment, the address can be released and a new IP address can be assigned to the UE.
Hence, a disruption to the session continuity is accepted with SSC Mode 2.
• SSC Mode 3: As we learned, in SSC Mode 2, the technique of break-before-make is employed
and accepted, and SSC Mode 3 is an enhancement of that. A new PDU session is set up before
the already established PDU session is torn down. Hence, it is a “make-before-break” procedure.
The IP address, in this case, is also not preserved, as the new session may have a different IP
address assigned. However, this allows better service continuity than SSC Mode 2 due to the
make-before-break principle.
In the previous section, we learned about the key concepts of PDU sessions, 5G QoS, and SSC in 5G.
These concepts will be used widely by network engineers when designing and operating 5G networks.
5G identifiers
In telecommunication systems, the network operator allocates a SIM card to every device. This SIM
card is associated not just with the mobile number but also with a SUPI in the 5GS. It was known as
International Mobile Subscriber Identity (IMSI) in the 4G world.
46 End-to-End Architecture Components, Concepts, Security, and Transport
The authentication of the UE and the network is based on symmetric keys and is dependent on the
identification of the user. However, if the identification is sent in cleartext over the air from the UE to
the network, it is susceptible to being imitated by malicious entities, who can pose as legitimate users.
To avoid this, mobile networks use several temporary identifiers called Globally Unique Temporary
Identifiers (GUTIs).
These identifiers are frequently changed and used for identifying a UE over the air. However, in some
situations, like the first user registration, the SUPI is used, and then from thereon, a GUTI is used:
The GUAMI serves as a globally unique identifier for each AMF within the 5G network. Between
different regions, AMF set IDs can be duplicated:
Now, in 5G, a SUPI can be an IMSI, as in 4G, or a Network Access Identifier (NAI), which can be
used in SIM-less devices.
A SUPI is a string of 15 decimal digits: 3 digits for the Mobile Country Code (MCC), 2 or 3 digits for
the Mobile Network Code (MNC), and the next 9 or 10 digits for the Mobile Subscriber Identification
Number (MSIN).
For privacy reasons, the SUPI from the 5G devices should not be transferred in cleartext and is instead
concealed inside the privacy-preserving SUCI. The SUPI is privacy-protected over the air of the 5G
RAN by using the SUCI. For SUCIs containing IMSI-based SUPIs, the UE, in essence, conceals the
MSIN of the IMSI. On the 5G operator side, the Subscription Identifier De-concealing Function
(SIDF) of the UDM is responsible for the de-concealment of the SUCI and resolves the SUPI from
the SUCI based on the protection scheme used to generate the SUCI.
The DNN performs the same function and follows the same format as the Access Point Name (APN)
in 2G, 3G, and 4G systems.
48 End-to-End Architecture Components, Concepts, Security, and Transport
The DNN is essential for the UE to be able to identify to which network it needs to connect for a
particular type of service. Common use cases are accessing the internet and the ability to place voice
calls. In this case, the UE would need to connect to a mobile network, requesting access to DNN data
(for internet access) and the DNN IMS (for voice, video, and text services). Hence, two PDU sessions
will be established, one with DNN data and one with a DNN IMS. Similarly, there can be other DNNs
based on advanced 5G use cases, such as having a DNN for enterprise connectivity or for IoT devices.
Summary
In this chapter, we went over the various 5G NFs and some 5G concepts. The concepts discussed in
this chapter will be the foundations on which we will explore 5G deeper and the various procedures
and deployment options.
In upcoming chapters, we will deep-dive into the cloud-native and service-based infrastructure and
go into details of various 5G procedures, call establishment, and so on.
In the next chapter, we will discuss the building blocks of 5G, which is the cloud-native infrastructure.
We will compare and contrast the 4G and 5G network design principles.
3
Building Blocks – Cloud Native
Infrastructure
In this chapter, we will learn about the infrastructure building blocks of 5G. We will cover the evolution
of telecom infrastructure from legacy networks (3G–4G) to 5G networks. We will discuss in detail
producer-consumer models, cloud-native infrastructures, REST principles, and service-based interfaces
in 5G. Understanding these topics will help us understand the real transformation that 5G technology
is about to bring to the world of telecom applications and infrastructure.
By the end of this chapter, we will be able to understand the fundamentals of telecom infrastructure
and its evolution. We will also be delving into details about service-based infrastructure and how it
applies to 5G Network Functions (NFs). In addition to this, we will cover the services offered by
each network function and who consumes them. This will be more of an implementation view of the
functions, roles, and responsibilities of the NFs we discussed earlier in Chapter 2, in the context of
the services offered and consumed.
In this chapter, we’ll cover the following main topics:
In many cases, the service provider themselves would request only a fraction of the capacity of the
appliance for, say, adding a small percentage of users. It would still need to procure the hardware at
an appropriate size for the original larger capacity, hence greatly increasing the Capital Expenditure
(CAPEX) on building and expanding a mobile network.
Operators consistently have been under pressure to reduce data rates across the world; hence, it became
imperative for them to reduce the operational expenditure and CAPEX.
To mitigate this problem, over the last 10 years, a lot of work has been done to find solutions. The
most notable one was to build virtualized software for the network elements that could be deployed
on Commercial Off-The-Shelf (COTS) hardware. This would free the operator of expensive custom
appliances. Hence, the first step toward transformation was to free the mobility (3G/4G) software from
purpose-built hardware and virtualize it, so that the various software for mobility network elements
could now run on virtual machines over COTS servers.
This was further accelerated by open source projects such as OpenStack, which was adopted by
many telecom vendors as their infrastructure of choice. Hence, the first move from appliance-based
infrastructure to virtualized infrastructure took place years before discussions on 5G specifications
even started.
Figure 3.1 describes this transition; to the left of the figure, legacy purpose-built hardware with
3G and 4G packet core application software is shown. To the right, the block depicts a virtualized
infrastructure, a Management and Orchestration (MANO) framework, as proposed by the European
Telecommunications Standards Institute (ETSI).
In the virtualized infrastructure, the telecom software (in this case, the 4G packet core network elements)
are hosted on COTS hardware. This is made possible by Virtual Infrastructure Manager (VIM)
software, which is responsible for resource allocation and the management of the COTS hardware.
The VIM abstracts the hardware from the installed virtual machines and provides compute, storage,
and networking capabilities to the virtual machine installed on it.
Other components, such as the Virtual Network Function Manager, are responsible for the life cycle
management of the Virtual Network Function (VNF); in this case, it’s the virtual machine hosting 4G
packet core network elements such as the Mobility Management Entity (MME), the PDN Gateway
(PGW), and the Serving Gateway (SGW).
The Element Manager (EM) is responsible for managing the individual VNFs.
Cloud-native infrastructure and applications 51
To summarize, the first major transformation of telecom applications came with virtualization. This
started with 3G and 4G software between 2012 and 2016. This trend has now been taken forward and
enhanced natively in 5G. Network functions and standards in 5G have incorporated the tenets of the
cloud and virtualization from the very beginning.
It is recommended to architect 5G NFs on cloud-native development principles. Cloud-native software
is built for reliability, consistency, and ease of scaling.
The preceding 5G specifications have justified the adoption of cloud-native development principles.
We will now go over the details of cloud native-based infrastructure in the next section.
Service-based architecture
As 5G has been developed on cloud principles, 5G NFs also follow web-scale application principles,
so it is designed in a manner in which the NFs provide and consume services to and from each other.
Hence, 5G is based on a producer-consumer model. The 3rd Generation Partnership Project (3GPP)
has chosen to use the widely adopted Representational State Transfer (REST) model to support
communication between various NFs in 5G.
A Service-Based Architecture (SBA) is a system architecture in which the functionality of the system
is achieved by applications providing services and consuming services to and from each other. In the
context of a 5G core, a service-based interface is between two NFs that provide or consume a service
to or from each other.
Figure 3.3 portrays the producer–consumer model of communication. In this example, consider three
applications – Application A hosting service A, Application B hosting service B, and Application
C hosting services C and D. In order to execute its function, Application A would need information
from Application C; hence, Application C produces the information via Service C, consumed by
Application A. Similarly, in order to execute its functionality, Application B would need information
from Application C, which is provided by service D. Hence, consumer B consumes the services
provided by service D hosted in application.
Service-based architecture 53
Note that an application can host any number of service producers or consumers.
To extend this concept to a 5G example, we could say that the Session Management Function (SMF)
would consume the SM policy services produced by the Policy Control Function (PCF), as shown
in Figure 3.4:
We will go into more detail about the services provided and consumed by the 5G NFs in the
upcoming sections.
To summarize the concepts we have covered so far, an SBA is a system architecture, in which the
functionality of the system is achieved by a set of NFs providing services to other NFs that are
authorized to access those services.
A network function service is basically a particular capability exposed by a network function (service
producer) to another authorized network function (service consumer). Each network function can
have one or more services.
In the next section, we will learn about REST, its principles, and the way it applies to 5G.
54 Building Blocks – Cloud Native Infrastructure
What is REST?
REST is a style of software architecture and uses a subset of HTTP. REST is used to create web applications
that provide and consume services from each other. A web service that follows the guidelines stated
by REST is called a RESTful application.
The main benefits of REST are the following:
The client is called the service consumer and the server is called the service producer.
Hence, a requesting client can store some information – for example, a user subscription – for
further use, the client is notified when such information changes on the server, and the dirty cache
can be refreshed.
This stateless property is adopted by the 5G NFs and enables them to scale easily, without needing to
maintain a lot of information on memory or disks.
The client does not need to know this detail; hence, the client does not need to be configured to contact
multiple servers, thus simplifying operations and configurations to a large extent.
The aforementioned methods to manipulate resources are based on HTTP/HTTP2 and are as follows:
The POST, GET, PUT, PATCH, and DELETE methods are used extensively between 5G NFs to request
and provide services to each other.
REST in 5G
In this section, we will learn about the applicability of REST in 5G, and how all the various concepts
that we have gone through in the previous sections come together in a 5G system.
Figure 3.10 represents some of the RESTful interfaces in a 5G system:
We explore the details of each of them and understand the services provided to and consumed by
each of these NFs. We will also understand the role of each of these services and how they contribute
to the functionality of the network function as a whole.
REST in 5G 59
AMF services
The following is a list of services offered by the AMF per 3GPP Release 16, 29.518; note that each service
has a name associated with it and can have one or more service operations. These communications
will be with a known consumer in the form of a request and response:
These are the services offered by the AMF. In the next section, we will cover the services offered by
the SMF.
SMF services
In this section, we will see how the SMF provides the functionality of session management via the
various services it offers to its peer NFs, per 3GPP Release 16, 29.502.
62 Building Blocks – Cloud Native Infrastructure
The following table illustrates the SMF service operations. The SMF interfaces with the AMF, PCF,
UDM, NRF, NEF, UPF, and NWDAF to provide the following services:
• The Nsmf_PDUSession service controls the creation, modification, and deletion of PDU
sessions. The resource is handled between the SMF and AMF via CRUD operations. The created
context is associated with an SM context ID in the SMF.
• The Nsmf_PDUSession_Create service operation is used to create a new PDU session
in the SMF or associate it with an existing PDN connection (4G) in the home SMF and PDN
Gateway Control (PGW-c).
• The Nsmf_PDUSession_Update service operation is used by the SMF to update an existing
PDU session.
• The Nsmf_PDUSession_Release service operation is used by the SMF to release or
disconnect an already established PDU session.
• The Nsmf_PDUSession_CreateSMContext, Nsmf_PDUSession_UpdateSMContext,
and Nsmf_PDUSession_ReleaseSMContex services are respectively used to create,
update, or release an SMF-AMF association to support the PDU session and UE context.
• The Nsmf_PDUSession_SMContextStatusNotify service operation is used by the
SMF to notify its consumers of SM-context-related status changes – for example, whether a
PDU session is released for local reasons, or handovers.
• Nsmf_PDUSession_StatusNotify is used by the SMF to notify PDU-session-related
changes to its consumers.
UDM services
As you saw in Chapter 2, the UDM is involved with subscriber information, so let’s take a deeper look
at what this information’s contents are. It’s an easy guess that it would include a subscriber identifier,
such as a SUPI, but what are the associated details of this SUPI? Let’s look at an exhaustive list of user
details, per Release 16, 23.502.
64 Building Blocks – Cloud Native Infrastructure
UDR services
As we explored in Chapter 2, the UDR serves as the repository of subscription data. The details related
to subscription are retrieved by network function consumers by querying the UDR. Hence, like any
regular database, keys are used to retrieve datasets related to each user. The most common data key
is the Generic Public Subscription Identifier (GPSI) or SUPI.
Figure 3.15 lists the exposure data stored in the UDR:
The UDR offers the following services to its network function consumers:
Let us go over the various service operations provided by the UDR, per 3GPP Release 16, 23.502:
REST in 5G 67
AUSF services
The AUSF services are used to provide a UE authentication service to the requesting network function.
The following table describes the services offered and the consumers of them.
PCF services
The PCF provides a list of services to consumer NFs. These services are mostly related to UE policies.
The list of services is mentioned in the following list and table, per 3GPP Release 16, 23.502:
68 Building Blocks – Cloud Native Infrastructure
• The Npcf_AMPolicyControl service is used by the consumer – in this case, the AMF – to
create and manage an access and mobility policy for a UE identified by its SUPI.
• The Npcf_PolicyAuthorization service is provided by the PCF to authorize an Application
Function (AF) request and to create policies as requested by an AF for a particular PDU session.
• The Npcf_SMPolicyControl service is one of the most critical services offered by the
PCF to the SMF. This helps to create and maintain a policy associated with the SMF. The PCF
provides information about PDU-session-related policy information. PCC rules are leveraged
by the SMF to send traffic policing rules to the UPF, such as throttling a particular subscriber
or providing steering rules.
NEF services
The NEF provides services to its consumers' AF, the NWDAF, and SMF consumers, per 3GPP Release
16, 23.502:
• The Nnef_EventExposure service, hosted by the NEF, is used by the NWDAF to collect
data from the AF. The NWDAF subscribes to events, and the event IDs are associated with the
data in the AF and exposed by the NEF.
• The Nnef_PFDManagement service is used by consumers such as the SMF and AF to create,
update, and remove packet flow descriptions.
NRF services
The NRF provides the following list of services, per 3GPP Release 16, 23.502:
AF services
The Naf_EventExposure service offered by the AF enables the consumer network function to
subscribe for notifications of events. The consumer can be notified about the following events:
The Naf_ProSe service enables the consumer to request authorization for discovery requests.
Lets take a deep dive into each of these services provided by the NSSF:
• The Nnssf_NSSelection service is used to support network slice selection. The requesting
NF is the AMF in this case, and the NSSF provides to the AMF the allowed NSSAI and configured
NSSAI for the serving PLMN.
72 Building Blocks – Cloud Native Infrastructure
• The Nnssf_NSSAIAvailability service is for the AMF to inform the NSSF about the
S-NSSAIs (the S-NSSAI is used to uniquely identify a network slice) that the AMF supports per
Tracking Area and to get the availability of the S-NSSAIs per Tracking Area that is supported
by the AMF.
• The Nnssf_NSRestriction service enables a network service consumer to subscribe and
unsubscribe to network slice instance restriction notifications.
In this chapter, we have learned about the various services offered and consumed by the NFs in the
5G system, in order to process a data or voice call. We have gone over the services offered to police
traffic and also to charge the subscriber. This is how the producer-consumer model in 5G works to
realize the service-based infrastructure.
Summary
In this chapter, we went into detail about cloud-native infrastructure and service-based infrastructure,
delved into the details of foundational REST concepts, and finally, the services offered by key NFs. This
will help us to build the fundamentals of a 5G system from the bottom up. These services and methods
are used by the NFs to carry out various 5G procedures, such as attaching, voice calls, handovers,
network registration, authentication, and detaching.
In the next chapter, we will be introduced to the radio aspects of 5G, including the scheduling of
radio resources.
4
5G Air Interface and Physical
Layer Procedures – Part 1
In this chapter, we are going to introduce you to 5G New Radio (NR) physical layer procedures for
control and user planes. We will start by looking at general physical layer procedures and then continue
with waveform, numerology, and frame structure. Throughout the chapter, we will be comparing and
contrasting NR and Long-Term Evolution (LTE).
After reading this chapter, you will have a good understanding of NR’s physical layer structure, downlink
and uplink references, and synchronization signals. You will also have a good understanding of the
numerology concept, which is the main difference between NR and LTE in the air interface.
In this chapter, we’ll cover the following topics:
Flexible numerology allows the Subcarrier Spacings (SCS) to be scalable, and the subcarrier spacings
in this case are 15, 30, 60, 120, and 240 kHz. In the normal Cyclic Prefix (CP), there are 14 OFDM
symbols, as there are in LTE.
Similar to LTE, NR uses multiple antennas, both on mobile devices and in the gNB. There is high
utilization of massive Multiple-Input Multiple-Output (MIMO) in NR.
Figure 4.2 – Multiple antennas, both in the gNB and the Terminal
The dedicated antenna beams from Massive MIMO antennas bring TX and RX diversity and help to
reject and mitigate interference. This Massive MIMO will bring high bitrates and capacity, increased
coverage, and energy efficiency.
General physical layer procedures 75
As opposed to LTE, which has a maximum bandwidth of 20 MHz, we have flexibility with NR. We
can deploy different bandwidths up to 400 MHz.
In NR, due to the larger number of subcarriers available, the spectral efficiency is between 94–99%,
while in LTE, it is 90%.
NR channel structure
Channel structure composes of logical channels, transport channels, and physical channels. Logical
channels are composed of control and data channels. They are basically the service flow between
Medium Access Control (MAC) and Radio Link Control (RLC) in the NR’s protocol stack. Transport
channels are the multiplexing of logical data in the logical channels, and this data is organized into
transport blocks to be transported by the physical channels. Therefore, the physical channels carry
these data blocks through the NR air interface.
In a nutshell, logical channels create transport channels, and then transport channels create physical
channels. We have also reference and synchronization signals. The left pane of the following figure
shows the downlink channels, whereas the right pane of the figure shows the uplink channels:
76 5G Air Interface and Physical Layer Procedures – Part 1
We will provide more details about these channels in the upcoming sections.
• Synchronization Signal (SS): The time and frequency synchronization for random access. It
consists of a primary synchronization signal and a secondary synchronization signal.
• Primary Synchronization Signal (PSS): Time and carrier synchronization detection.
• Secondary Synchronization Signal (SSS): Used for frame synchronization.
• Phase Tracking Reference Signal (PTRS): Compensates phase shifts. It is associated with PDSCH.
General physical layer procedures 77
Now, let’s see the reference and synchronization signals in the uplink.
• Physical Random Access Channel (PRACH) preamble: This is used for the initial transmission
of a device. It is contention-based or contention-free. It is a timing and receiver beam estimation.
• Sounding Reference Signal (SRS): In reciprocity-based MIMO, this is used to estimate the
UL channel and set the DL precoding.
• Demodulation Reference Signal (DMRS) for PUCCH: Demodulation reference signals
for PUCCH.
• Demodulation Reference Signal (DMRS) for PUSCH: Demodulation reference signals
for PUSCH.
• Phase Tracking Reference Signal (PTRS): This is associated with the Physical Uplink Shared
Channel (PUSCH) to compensate for phase noise.
We’ve analyzed reference and synchronization signals. Now, let’s see how some of those are related
to the NR cell definition.
78 5G Air Interface and Physical Layer Procedures – Part 1
NR cell definition
A Synchronization Signal block (SSB – SS block) information defines an NR cell. The SS block is
composed of PSS, SSS, and a Physical Broadcast Channel (PBCH). We will analyze the SS block in
greater detail in the next chapter within initial access procedures.
A cell ID is created by PSS and SSS. The PBCH carries a Master Information Block (MIB). The MIB
provides important parameters to devices to acquire the System Information Block 1 (SIB1), which
contains the configuration for system access.
A SIB2 or higher can be specific to a cell or System Information (SI) area. There can be several cells
in an SI area.
The details of SIB1, SIB2, and the remaining SIB messages are listed here:
• SIB 1: Cell selection/barring, radio resource configuration, and scheduling of other SIBs
• SIB 2: Cell reselection (intra-frequency, inter-frequency, and Inter Radio Access Technology
(IRAT)) in common
• SIB 3: Intra-frequency cell reselection-specific information
• SIB 4: Inter-frequency cell reselection-specific information
• SIB 5: IRAT cell reselection-specific information
• SIB 6 and SIB 7: Earthquake and Tsunami Warning System (ETWS)
• SIB 8: Commercial Mobile Alert Service (CMAS)
• SIB 9: GPS time and Coordinated Universal Time (UTC)
We will now see how the reference signals are used for cell measurement.
General physical layer procedures 79
Ultra-lean design
NR minimizes network transmissions that are not directly related to user-data delivery.
In LTE, the reference signals are always on. However, in NR there are no always-on reference signals.
NR schedules transmissions and measurements of reference signals. This design is also good for energy
efficiency and minimizing interference.
The ultra-lean design concept of NR brings energy efficiency. This can be analyzed by comparing
power amplifiers on time ratios of LTE and NR.
The following figure shows the power amplifier usage of an empty LTE cell. Due to always-on reference
signals, the power amplifier is on around 50% of the time.
Due to the ultra-lean design of NR, reference signal transmissions and measurements are not done
periodically; they are scheduled instead. SS blocks are sent periodically.
In the preceding figure, you can see that the SS blocks are sent at intervals of 20 milliseconds, and
there are no always-on signals in an empty NR cell. This lowers power amplifier usage by around 5%,
which is one of the building blocks of energy efficiency in NR.
In this section, we have made a quick introduction to NR physical layer procedures and the air interface.
In the following section, we are going to analyze waveform, numerology, and frame structure.
Waveform
NR employs OFDM for downlink and uplink transmissions. These are the very same waveforms that
were used in LTE.
In the preceding figure, the visualization of an OFDM waveform is presented. It has a symmetric
design, and the same waveform is used in downlink and uplink transmissions. Besides supporting
MIMO in downlink and uplink transmissions, it also supports flexible numerology.
Within a given numerology, all other subcarriers are zero at sampling points. OFDM is a proven
technology, and it has several benefits:
• Frequency diversity
• It’s robust against Inter Symbol Interference (ISI)
• Easy to implement
• A flexible bandwidth
• Suitable for MIMO
However, there are also some drawbacks to it. For instance, it is sensitive to doppler shifts and frequency
errors. We also see a high Peak to Average Power Ratio (PAPR).
NR uses OFDM with a cyclic prefix or a CP-OFDM waveform in the downlink. In the uplink, it uses
both CP-OFDM and DFT-s-OFDM. DFT-s-OFDM is also referred to as transform precoding in 3GPP.
CP-OFDM in the uplink is intended for high throughput on MIMO scenarios, while DFT-s-OFDM
is better for power-limited scenarios due to its power efficiency. Both waveforms will be used in an
orthogonal multiple-access framework.
Transform precoding is controlled by the network. So, for the uplink, the selection between CP-OFDM
and DFT-s-OFDM is done by the network. DFT-s-OFDM is generally used to reduce PAPR and to
improve coverage in uplink coverage-limited scenarios.
The maximum number of carriers used in NR is 3,300. This requires Fast Fourier Transform (FFT)
sizes to go up to 4K, depending on the system bandwidth. The maximum FFT size used for LTE was 2K.
NR numerology
The subcarrier spacing is scalable to the power of 2 of 15 kHz in NR. This is called numerology and
it is represented with µ. The subcarrier spacing is fixed at 15 kHz only in LTE. The reason to choose
the subcarrier spacing as multiples of 15 kHz is to allow for better coexistence between LTE and NR.
It would be much more difficult if a different carrier spacing was selected.
Having different subcarrier spacings allows support for services with different International Mobile
Telecommunications (IMT) 2020 requirements, from high-reliability use cases to low-latency use
cases. 3GPP Release 15 supports the following numerologies for NR.
82 5G Air Interface and Physical Layer Procedures – Part 1
Release 15 supports subcarrier spacings of 15, 30, 60, 120, and 240 kHz with the numerologies 0, 1,
2, 3, and 4 respectively.
The phase noise at high-frequency bands such as Millimeter Wave (mmWave) is bigger than the typical
phase noise that lower frequencies experience. One of the main ways to mitigate this increased phase
noise is to use larger subcarrier spacing. As a result, 15 and 30 kHz will be used for synchronization and
broadcast transmissions below 6 GHz, whereas 15, 30, and 60 kHz will be used for data transmissions
below 6 GHz. Note that 60 kHz subcarrier spacing for below 6 GHz is optional for devices. For
frequency bands above 6 GHz, 120 and 240 kHz will be used for synchronization and broadcast, and
above 60 kHz and 120 kHz for data transmission. A single cyclic prefix length is supported in all cases.
However, normal and extended cyclic prefix lengths can be included for 60 kHz subcarrier spacing.
In the future, specifications will include the data transmission at 240 and 480 kHz for forward-
compatibility purposes. We might also see 3.75 kHz subcarrier spacing in the future as new cases
are introduced.
Illustration of numerologies
The following figure shows an example of the different cyclic prefix lengths and OFDM symbol
lengths for all the supported subcarrier spacings. The lengths are indicated assuming a 4K FFT, as
was mentioned previously.
Waveform, numerology, and frame structure 83
There are some basic rules for numerology. The slot length is 1 millisecond in 15 kHz. Note that 15
kHz carrier spacing is the same as LTE for normal CP. This is to support LTE-NR coexistence in the
same radio frequency. As the subcarrier spacing increases, the slot duration halves. We always have
14 OFDM symbols in a slot regardless of the slot duration. There is an exception in 60 kHz subcarrier
spacing with an extended cyclic prefix. As you can see from the preceding diagram, when the extended
cyclic prefix is utilized, the OFDM symbols drop to 12.
All these rules guarantee OFDM symbol alignment between the different numerologies, which will
make multiplexing of different subcarrier spacing both in time and frequency much easier.
Frequency is one factor to consider when choosing numerology. A frequency’s phase noise determines
the minimum subcarrier spacing. The phase noise rises in the high-frequency bands. Therefore, larger
subcarrier spacing is required to compensate for the increased phase noise.
84 5G Air Interface and Physical Layer Procedures – Part 1
For a given frequency, the required cyclic prefix sets the maximum subcarrier spacing. Slot duration
affects latency based on subcarrier spacing.
The use of large subcarrier spacing in small cells is capable of providing very low delays. It is necessary
to use an extended cyclic prefix in large cells.
Waveform, numerology, and frame structure 85
Mixed numerology
NR supports multiplexing or the mixing of different numerologies, such as TDM and/or FDM in the
downlink and uplink, both in time and frequency. From a device’s perspective, FDM mixed numerology
is limited to data and SSB. NR does not mandate a device to transmit and receive with more than one
numerology at the same time.
There are two use cases for multiplexing numerologies in FDM. The first one is multiplexing data
channels with data channels using different numerologies. This case is not supported in Release 15,
but it will be supported to transmit and receive from a device using two different numerologies in
later releases. However, having the downlink in one numerology and the uplink in another one is
supported in Release 15.
The second use case is the multiplexing of the SS block and the data channels using different numerologies.
This case is optional from a device point of view, as mentioned before. It is important to note that a
device does not have to read both signals at once.
Special care must be taken when transmitting and receiving simultaneously using different subcarrier
spacing. The OFDM waveforms for different subcarrier spacings are not always orthogonal with each
other, which means, for instance, a 30 kHz transmission can interfere with a 15 kHz transmission
on the adjacent frequency resources. To mitigate the interference, you can either include relevance
between different numerologies or filter the transmission of the different subcarrier spacings to reduce
the interference caused to adjacent channels. More complex options can be considered as well.
We already mentioned that multiple numerology downlink reception and uplink transmissions are
not supported from a device point of view. However, the gNB can still transmit or receive using
different numerologies to and from different devices. A gNB with good filtering characteristics
between numerologies can assign them close together. In the uplink, there will be no additional RF
requirements for the devices. Therefore, this needs to be considered by the gNB when planning the
uplink resources scheduling between devices using different numerologies.
NR numerology examples
Variable frequency bands and carrier bandwidths are supported by flexible numerology. In the following
diagram, you can observe different NR numerology examples.
86 5G Air Interface and Physical Layer Procedures – Part 1
To have large cell sizes and coverage, we should choose lower frequencies. However, larger time
dispersions happen in wide areas with lower frequencies. So, to overcome this situation, larger cyclic
prefixes are needed. Luckily, 15 kHz subcarrier spacing provides us with larger cyclic prefixes (4.7 μs,)
so we can easily choose 15 kHz for wide-area deployments.
Likewise, low- to mid-band frequencies have less time dispersion. Therefore, choosing 30 kHz
subcarrier spacing with a cyclic prefix of 2.4 μs would be enough to deal with fewer time dispersions.
On the other hand, we will also see small cell deployments with higher frequencies – for instance, MM
wave for high capacity. In this case, time dispersion is even less. So, for instance, a cyclic prefix of 0.59
μs would be enough if a 120 kHz subcarrier spacing is utilized. Note that this kind of deployment will
also provide lower latency compared to the other preceding cases, due to the shorter slot duration of
120 kHz subcarrier spacing.
Now, let’s understand the frame structure of NR by comparing it to LTE.
Frame structure
NR uses the same frame duration as LTE, which is 10 milliseconds. The frame is divided into tens
of subframes with 1 millisecond each, as in LTE. At this point, the similarities between LTE and NR
frame structures end.
The NR subframe is not related to the scheduling unit or Transmission Time Interval (TTI), as it
was in LTE. NR just provides a common time reference to which all numerologies can refer, and NR
is assigned to different units, slots, and mini-slots.
Waveform, numerology, and frame structure 87
The slots are composed of 14 OFDM symbols, and the slot duration depends on the subcarrier spacing.
The slots are aligned with subframe boundaries, and they are a typical scheduling unit for type A for
PDSCH or PUSCH. Increasing the subcarrier spacing shortens the OFDM symbol duration in time;
hence, it reduces the slot duration accordingly. This can be seen in the preceding figure. A slot at 15
kHz corresponds to 1 millisecond, and the length reduces to the powers of 2 as the subcarrier spacing
increases. So, the number of slots in a subframe changes depending on the subcarrier spacing. This
also influences the TTI length, which can be from 1 millisecond at 15 kHz to 125 microseconds at
120 kHz subcarrier spacings.
A mini-slot is a unit shorter than a slot. It can be either 2, 4, or 7 OFDM symbols and can start at any
symbol boundary. It is a typical scheduling unit for type B for PDSCH or PUSCH.
Let us provide more information to elaborate more on type A and type B scheduling. There is a lot of
similarity between type A scheduling and LTE scheduling, and DMRS uses slot boundaries.
In Type B scheduling, the transmission can start at any symbol. The length can range from 1 to 13
OFDM symbols. However, it is limited to 2, 4, and 7 OFDM symbols. DMRS is relative to the start
of the transmission.
The slot-based scheduling assigns a slot to devices. The devices monitor the control channels in each
slot and the assignments are always referred to the slot boundaries.
88 5G Air Interface and Physical Layer Procedures – Part 1
The device monitors control channels in the mini-slot and assignments are referred to in these mini-
slot boundaries, which can float within the slot, giving more flexibility in time domain assignments.
One of the motivations to have a non-slot-based scheduling scheme is to support low-latency use
cases. Low-latency traffic can be sent over mini-slots, since they are not required to be aligned with
slot boundaries, as described before. Once the traffic arrives to layer 1, it can start being transmitted
almost immediately without us having to wait for the next slot, which reduces the latency in the process.
The other motivation is having a finer time domain granularity for scheduling operations. This is very
interesting in the case of beamforming and the MM wave for different devices. The gNB can transmit
to one device in one mini-slot and move to another device in the next mini-slot. This process can be
repeated several times within a slot, since mini-slots are shorter than slots.
The third motivation is to support LTE and NR coexistence. When we have LTE and NR in the same
RF frequency, it is important for NR not to overlap with the first three LTE OFDM symbols that carry
the control channels (PDCCH). This can be easily done with the mini-slots. In LTE, it is rather useful
to have Multimedia Broadcast Single Frequency Network (MBSFN) subframes, where some OFDM
symbols are left blank. This has enabled many new features in LTE. So, having the option to schedule
devices in only a limited set of OFDM symbols in a slot will free those OFDM symbols for future use
without breaking compatibility with other devices, and they will support a mini-slot from the beginning.
Finally, this concept is forward-compatible toward an unlicensed spectrum operation.
Resource grid
Up to this point, we have analyzed the NR frame structure in the time domain. Now, let us focus
on the frequency domain. In the frequency domain, a Physical Resource Block (PRB) in NR is
composed of 12 subcarriers, like in LTE. A Resource Element (RE) corresponds to one OFDM
symbol in one subcarrier.
Waveform, numerology, and frame structure 89
Note that a PRB in NR is not statically 180 kHz in the frequency domain, like in LTE. In NR, due
to the numerology, as the subcarrier spacing changes, 12 subcarriers will occupy different amounts
of bandwidth.
The preceding table indicates the minimum system bandwidth limited by the synchronization signals
and the maximum number of PRBs, 275, which corresponds to 3,300 subcarriers. For the bigger
90 5G Air Interface and Physical Layer Procedures – Part 1
subcarrier spacing, the limiting factor is not the number of subcarriers but the component carrier
bandwidth, which cannot be more than 400 MHz.
The resource grid changes as the number of available subcarriers and the number of OFDM symbols change.
All resource grids for each numerology are available at the same time and they overlap, as shown in
the preceding figure.
Duplexing scheme
The duplexing scheme is harmonized in NR. We have Frequency Division Duplex (FDD), static Time
Division Duplex (TDD), and dynamic TDD in NR. These are used for downlink and uplink transmissions.
As a result of harmonizing FDD and TDD, the maximum commonality between FDD and TDD
modes is achieved, which is crucial to LTE/NR coexistence.
We expect to have mainly FDD employment below 3 GHz deployments. For frequencies above 6
GHz, TDD will mainly be used. However, between 3 GHz and 6 GHz, we expect to see a mixture of
FDD and TDD deployments.
Waveform, numerology, and frame structure 91
The slots can be either all downlinks or uplinks, or a mixed combination of the downlink and uplink
resource sets. We typically include a downlink symbol at the beginning of the slot and an uplink
symbol at the end of the slot.
An NR slot can be statically configured using a similar scheme as the uplink/downlink configurations
in LTE TDD. They can be also semi-statically and dynamically configured, meaning that a network
can dynamically and individually change the downlink and uplink direction of the regions in the slot
from one to another.
The transmission direction of data (uplink or downlink) is determined per slot as part of the scheduling
process. The main advantage of dynamic TDD is better spectrum efficiency, since uplink and downlink
resources can be dynamically scheduled based on traffic requirements.
But how are these dynamically changing downlink and uplink slots happening? The Slot Format
Indication (SFI) is defined for that purpose. Now, let us understand what an SFI is.
SFI can be either dynamic or static. The dynamic SFI is carried over a Downlink Control Information
(DCI) message. This is a separate DCI from the one carrying the downlink and uplink grants. This
Summary 93
could potentially cause inconsistencies between SFIs, because SFI could signal one resource downlink
and the DCI uplink grant could indicate the same resource as an uplink, for instance. Note that a static
or semi-static SFI indication will be provided through Radio Resource Control (RRC) signaling.
In this section, we’ve learned about the OFDM waveform that is used in NR, like in LTE. We’ve also
analyzed the NR numerology that is designed for different NR use case requirements. We’ve also seen
how this scalable numerology affects slot duration and what advantages it brings. Furthermore, we
showed different NR scheduling schemes and slot formats.
Summary
In this chapter, we introduced you to NR general physical layer procedures and channel structure. We
made comparisons of bandwidths, energy efficiency, and spectral efficiency between LTE and NR.
Then, we covered all the important aspects regarding the NR waveform, numerology, and frame
structure. We learned that NR is OFDM-based with scalable subcarrier spacing. This changes the slot
durations to allow for different kinds of services, but it also presents challenges regarding how these
different subcarrier spacings can be multiplexed in the frequency domain without interfering between
them. We have also discovered that NR supports a slot-based scheduling mode. We saw that there are
several interesting use cases that necessitate the introduction of this scheduling mode, such as LTE/NR
coexistence or forward compatibility. Finally, we have described the dynamic TDD duplexing mode
that NR introduces and how it is signaled to devices by using the slot format indication.
In the next chapter, we are going to learn about initial access and management. We will refer to physical
channels and signals frequently to better understand the initial access procedure.
5
5G Air Interface and Physical
Layer Procedures – Part 2
The next New Radio (NR) concept that we will cover in this chapter is the initial access to a network
and beam management procedures. These procedures are new to NR, and there is nothing similar
in Long-Term Evolution (LTE), especially for initial access. As we will see during this chapter, both
millimeter wave operation and reducing the number of signals that are always transmitted are the two
main drivers for this initial access procedure design. Upon completion of this chapter, we will understand
the concept of beam sweeping and especially its relationship with Millimeter Wave (mmWave)
frequency. We will focus on how a device and the gNB can identify the best special beams to be used
for transmission. We will also describe the beamforming’s effect on the initial access procedure. Upon
completion of this chapter, we will understand some of the design decisions regarding initial access,
as well as how decisions can enable LTE-NR coexistence in the same radio frequency.
In this chapter, we’ll cover the following topics:
Directional transmissions enable new methods of multiplexing different users in the spatial domain,
such as transmitting simultaneously to different directions instead of spatial multiplexing based on
precoders, as with LTE. However, such directional transmissions mean that when connecting to the
network for the first time, it will be challenging for a device to find it. In NR, no omnidirectional
transmission could be assumed like in LTE, especially for mmWave, so directional transmission is
going to be used as described. In the initial access procedure, we must allow for the gNB and the
device to initiate the communication using directional transmissions or beams, without any prior
knowledge of their physical location.
Note
For the sub-6 GHz frequencies, namely Frequency Range 1 (FR1), NR transmissions can be
omnidirectional, like in LTE.
That covers the initial access procedure and its relation to beams. We now know that the NR initial
access procedure must work in a single-beam scenario as well as a multi-beam one, and it must support
LTE-NR coexistence. Now, we will go into more detail about the initial access procedure.
This is the basic procedure by which communication shifts from a wide coverage scenario into a beam-
sweeping scenario. The beams to be used are further narrowed down once the data transmission is
done through beam refinement procedures.
Here, we have introduced the concept of channel reciprocity. This implies the channel conditions
measured in one link direction can be assumed to be equivalent in the other one, the reciprocal one.
For instance, if the device sees that the gNB downlink transmission is in one spatial direction, it will
assume that the transmitted uplink in the same direction will also be received by the gNB. Note that
this is only true in Time Division Duplex (TDD) systems where the same frequency is used for the
downlink and uplink transmissions.
So, the first step in the initial access procedure from a device point of view is identifying the best SS
block within those transmitted by a network. The device must obtain the time index of the received
SS block that uniquely identifies the selected block.
98 5G Air Interface and Physical Layer Procedures – Part 2
The time index discovery is very crucial because, without any other time reference, the device will
not know where the frame starts and where to transmit random access preambles. That is why all SS
blocks carry a time index indication dividing between the PBCH Demodulation Reference Signal
(DMRS) and explicit indication in the PBCH payload. With this time index information, the device
can completely identify the best SS block.
The device transmits the Physical Random Access Channel (PRACH) on a set of resources that
depend on the time index of the received SS block, by implicitly linking a set of PRACH resources
to a particular SS block. Then, the gNB will know which SS block is received by the device in the
downlink. With that information, the gNB can continue the rest of the initial access procedure in the
same beam spatial direction, as notified implicitly by the device in the PRACH.
On the left pane of the following figure, the gNB is transmitting the SS blocks in different directions.
The device is listening to the network from only one direction, although in a real environment it might
also be a beam-sweeping intersection. Eventually, the gNB’s transmission direction and the device’s
reception direction becomes aligned in such a way that the device can correctly decode the SS block.
Since the device knows the SS block time index, it can derive when and where to send a PRACH
transmission, as shown in the right pane of the figure.
Figure 5.3 – Mapping between DL and UL beam directions when UL/DL reciprocity is reliable
The network knows whether an SS block is transmitted in one spatial direction, and any devices
listening to it transmit the PRACH at a specific time and with a specific set of resources. Hence, the
gNB knows in advance that, at a given time, it must listen for the PRACH in the same direction as
the corresponding SS block in the downlink it sends. This is the assumption for both the gNB and
the device that will enable communication, without any prior knowledge of the physical location of
any of them.
(RMSI) comes in. The RMSI carries all the information that a device requires to access a network,
and the minimum system information in the PBCH contains the basic information the device needs
to decode the RMSI.
The concept of beam sweeping is still used, and for each SS block, there is an RMSI transmitted in the
same direction as the corresponding SS block. The RMSI is carried on the PBCH, as we discussed, and
its configuration and the numerology to be used is contained in the PBCH payload.
The numerology used for RMSI is the following:
A dedicated Control Resource Set (CORESET) is used for delivery of the downlink grant for the
RMSI. More system information is transmitted to a device via the Physical Downlink Shared Channel
(PDSCH), per the device’s demand.
Note that the system information delivery is different from the LTE in the sense that, apart from the
SS block and RMSI, there is no periodic transmission of System Information Blocks (SIB); instead,
the information is provided on a device-specific manner on a demand basis. This reduces the number
of blocked resources due to broadcast information transmission to a minimum. This is also due to
NR having an ultra-lean design.
Note that this was the case for the LTE as well. So, up to four different messages are exchanged in this
procedure. Message 1 (Msg 1) or PRACH defines a random access response window (RAR window),
where the device expects a Message 2 (Msg 2) response from the gNB. After that, Message 3 (Msg
3) and Message 4 (Msg 4) follow with a set of timers that are configured to trigger retransmissions
of the messages, in case they are not received correctly. Let us now analyze the message flows for the
random access procedure in detail.
Msg 1 or PRACH is sent from the device to the gNB to start the random access procedure. Keep in
mind that the different Subcarrier Spacings (SCs and formats are defined for PRACH, and we will
examine them in detail in the next section of this chapter. For the moment, we will imagine that the
subcarrier spacing used in the PRACH by the device is indicated in the RACH configuration of the
RMSI, and we are not interested in the PRACH format. Note also that the beam used by the device at
this point was selected by itself, based on the received SS block in the downlink.
The next message, Msg 2, is sent from the gNB to the device. It uses the same numerology as the
RMSI, and the beam used is derived from the beam that the device used or selected in the PRACH
transmission, as we described earlier.
Then, the device sends Msg 3 to the gNB, using the configured numerology in an RMSI and a device-
selected beam, which will be typically the same as the Msg 1 beam.
Finally, the gNB sends Msg 4 to the device using the same numerology as Msg 2. For the beam to be
used in transmission, there are two options. The first one is that the previous message from the device
to the gNB does not contain any beam report information; in that case, the same beam as Msg 2 is
used. If Msg 3 from the device to the gNB contains beam report information, the gNB can use it to
select a better beam from which to send a message.
The initial access and random access procedures that we described here are part of NR beam management.
Now, we are going to understand what beam management is.
Beam management
Beam management is responsible for maintaining a set of beams in the gNB and a device that can be
used for downlink transmission and uplink reception. This consists of several aspects:
• Beam determination: This concept is defined by what means the gNB or the device selects its
own transmission and reception beams
• Beam measurement: This is used to measure the characteristics of the received beam-formed signals
• Beam reporting: This is used by the device to report to the gNB information about the received
beamforming signals, obtained through the previous beam measurement
• Beam sweeping: As we already know, this is the operation intended to cover a special area,
with beams transmitted during a time interval in a predetermined way
Physical channels and signals for the initial access procedure 101
For these purposes, devices in idle mode will use the signals in the SS block. For connected devices,
beam management is based on a Channel State Information Reference Signal (CSI-RS) in the
downlink and Sounding Reference Signals (SRS) in the uplink. This also indicates that those signals
must support beam sweeping, and the beam report will contain the measurement results from them.
Working in a multi-beaming scenario as we are currently doing can potentially force a device to receive
and transmit simultaneously in two different spatial directions. For Release 15, devices will not be
mandated to support this operation, since typical device implementation at first will have a single
panel. From a device point of view, it cannot, for instance, measure SS blocks on one beam and then
receive the PBCH on a different beam. Note that this is only from the device’s point of view. From a
gNB point of view, nothing prevents it from transmitting on two different devices simultaneously in
different spatial directions if it supports it.
So far, we have covered the initial access procedure and its relationship with beam sweeping and beam
management. Now, we will observe the role of some physical channels and synchronization signals
in the initial access procedure.
SS block
The SS block is composed of four consecutive OFDM symbols that contain one symbol for PSS,
another symbol for SSS, and two symbols for the PBCH. The SS blocks are grouped in SS bursts and
those are grouped again in SS burst sets. The SS burst set is periodically transmitted at each system
default value of 20 milliseconds, and all the SS blocks are contained in 5-millisecond windows at the
beginning of the 20-millisecond period, as shown in the following figure:
102 5G Air Interface and Physical Layer Procedures – Part 2
Each of these SS blocks can be transmitted over different spatial directions to implement the beam-
sweeping technique we described earlier. This is represented on the right hand of the preceding diagram.
Now, we will continue going into more detail about the SS block. First, we will give a definition of the
SS burst set, and then we will discuss its composition, mapping locations, and SS block utilization in
LTE-NR coexistence.
So, as we saw in the previous figure, all SS blocks are confined in a 5-millisecond period that repeats
every 20 milliseconds. This is the default periodicity that each device will assume. This indicates that
a network can change periodicity to another value, but the devices that have not accessed the network
yet will have to assume this periodicity as 20 milliseconds. Once the devices are connected, they will
be notified of the actual value set by the gNB. The same happens in the case of the network turning
off certain SS blocks.
The number of SS blocks that are periodically repeated depends on the frequency band. For frequencies
less than 3 GHz, there are only four SS blocks in an SS burst set supported. Between 3 GHz and 6
GHz 8 SS blocks are supported in an SS burst set and this number is increased to 64 for mmWave.
The underlying reason for this is that as the frequency increases, the likelihood of using beamforming
increases. In the case of mmWave, a significant amount of SS blocks may be needed so that many
spatial directions can be used to accommodate the desirable beamforming pattern.
The different channels in the SS blocks are multiplexed in time. The frequency location of the SS
block is not fixed and can be located anywhere within the carrier bandwidth. This frequency location
of the SS block cannot even be aligned to Physical Resource Blocks (PRB). This, together with the
Physical channels and signals for the initial access procedure 103
Bandwidth Part (BWP) concept that we will discuss in the next chapter, gives us a lot of flexibility
in defining a cell.
In NR, the SS block can be located in any position in the frequency domain in contrast to LTE, where
synchronization signals are located in the center of the spectrum. Several simultaneous transmissions
of SS blocks in different frequency resources are also possible. The use case for this is about how devices
can access a network in NR. In LTE, all devices must support the maximum 20 MHz bandwidth;
however, this is not the case for NR.
Any device, no matter the supported minimum bandwidth, can access a network, no matter what the cell
bandwidth is. Also, depending on a device chipset’s processing capabilities, it could potentially access
the network as a single carrier or as intra-band contiguous Carrier Aggregation (CA). For instance,
a device can access a 400 MHz cell as a single cell with 400 MHz bandwidth or as four contiguous
Component Carriers (CCs), as each one of them is 100 MHz. For this last case, a different set of SS
blocks can be configured for each of the 100 MHz CCs, so the devices accessing the network in this
CA mode can consider each of these CCs.
SS block composition
Now, we will take a deeper look at the SS block structure. As shown in the following figure, the SS
block is composed of four consecutive OFDM symbols that span over 20 PRBs.
The PSS is transmitted on the central 127 subcarriers of the SS block in the first OFDM symbol. The
SSS is transmitted in the same resource elements or subcarriers in the third OFDM symbol. The
PBCH uses the entire 20 PRBs of the second and fourth OFDM symbols, as well as four PRBs at each
side of the SSS symbol.
The devices perform matched filtering to find PSS. PSS and SSS together indicate an Physical Cell
ID (PCI):
• 3 x SSS [range is {0, 1….335}] + PSS [range is {0, 1, 2}] = 1,008 PCIs [range is {0, 1….1,007}]
The SS block has a frequency offset to the Common Resource Block (CRB) grid. The device is informed
of the offset or is given the Absolute Radio-Frequency Channel Number (ARFCN).
As mentioned before, the SS block is sent periodically, and its default value is 20 milliseconds. It is
possible to sweep the SS block with different indexes in different beams.
Devices decode the Master Information Block (MIB) in the PBCH.
Now, we will see the location in time of different SS blocks for the case of frequency bands below 6
GHz. If you recall from the beginning of the section, the SS blocks for below 6 GHz are transmitted
with either 15 kHz or 30 kHz subcarrier spacing. For both cases, there are two SS block positions in
each slot, as shown in the following figure:
In the 15 kHz case, the slot duration is 1 millisecond, and two possible SS block positions can be seen
in the figure. In the 30 kHz case, the slot duration is 500 microseconds. So, two SS block locations are
possible in this period. As you can see in the preceding figure, there are two different mappings for
30 kHz. The second one is intended for low-latency use cases. It has an empty pair of OFDM symbols
within SS blocks, which allows downlink and uplink transmissions for low-latency scenarios.
SS block locations show an alteration for frequencies above 6 GHz. The following figure presents the
SS block locations in a slot for the 120 kHz and 240 kHz subcarrier spacings:
Physical channels and signals for the initial access procedure 105
In 120 kHz, we have two SS block locations in a 125 microseconds slot, whereas we can see 4 SS block
locations in the case of 240 kHz.
What we mean by LTE and NR coexistence is providing LTE and NR networks at the same RF frequency
and that share the same bandwidth. This coexistence requires that NR SS blocks shall not collide with
LTE cell reference signals; otherwise, this would create interference. This is crucial for the sake of LTE
network performance. The 30 kHz subcarrier spacing case is the only one that can guarantee that no
interference occurs between NR SS blocks and LTE cell reference signals.
The preceding figure shows the 30 kHz mapping during 1 millisecond of the LTE subframe, and in
red, you can see the locations of the LTE cell reference signals. Recall from the previous chapter that
for LTE, µ=0 has a subcarrier spacing of 15 kHz. The yellow SS block will not interfere with the LTE
cell reference signals, while, in contrast, the green one does interfere. Therefore, the gNB must turn
it off to avoid interference. This is the underlying reason for the LTE-NR coexistence requirement
that we mentioned.
In a nutshell, LTE and NR coexistence forces the SS block to use 30 kHz subcarrier spacing, and the
gNB must turn off any colliding SS blocks with LTE cell reference signals. A consequence of this is
106 5G Air Interface and Physical Layer Procedures – Part 2
that LTE-NR coexistence requires a minimum bandwidth of 10 MHz, since this is the bandwidth used
by the SS block at this 30 kHz subcarrier spacing.
In the following figure, the SS block locations are displayed relative to a 5-millisecond window. Blue
and orange colors indicate the slots containing two SS blocks, whereas the green and yellow colors
show a set of two slots containing four SS blocks in this time window.
As we detailed in previous sections, below 6 GHz, we have a total of either four or eight SS blocks,
depending on exactly which frequency band is used, and above 6 GHz, we have a total amount of 64
SS blocks.
We saw that the SS blocks are transmitted using beam sweeping. If we recall the beginning of this
section, it is important to identify these SS blocks with the time indexes so that devices can derive
the resources to transmit the PRACH.
In NR, three bits of the SS block time index will be carried out by selecting the PBCH DMRS sequence.
This is enough for the following 6 GHz case, where the number of SS blocks in an SS burst set is eight
or less. For higher frequencies, up to 64 SS blocks can be transmitted. In that case, we need three extra
bits where those bits are signaled explicitly in the PBCH payload.
Now that we understand the details of an SS block structure, we will now provide a brief overview of
the different channels that composed SS blocks. We will start with the PSS and the SSS.
Physical channels and signals for the initial access procedure 107
PSS is a 3 length 127 M sequences, and it is created by cyclic shifts of a basic M sequence. SS is 336
length 127 M sequences with the addition of two M sequences. The following figure represents how
this sequencing works:
After the detection of PSS and SSS, the device knows the PCI and the timing of the PBCH.
As described previously, PSS and SSS are used for cell search. The preceding figure represents the cell
search flow diagram. The device first detects the SS block SCS and the frequency. Then, it gets the
SSS symbol timing and the cell ID, which can be 0, 1, or 2. Later, the device detects the cell ID group
that comes from SSS.
Now, it is time to discuss the PBCH, which is the other part that composes the SS block.
PBCH definition
The PBCH is broadcasted as part of the SS block. This is the last channel that composes the SS block.
Moreover, the PBCH, PSS, and SSS are transmitted on the same antenna port using a single antenna
transmission scheme. Sample data that the PBCH carries is represented in the following figure:
The PBCH transmission time interval is 80 milliseconds and its payload is 56 bits, including the CRC.
This is enough for the minimum system information, as we described before. Those bits are channel-
encoded using the polar coding scheme. In the next chapter, we will discuss further channel coding
schemes that NR uses in more detail.
MIB
Recall that the PBCH carries the MIB for devices to decode. The 3rd Generation Partnership Project
(3GPP) describes the MIB, as shown in the following figure:
Physical channels and signals for the initial access procedure 109
Now, we will see how the resource element mapping occurs for the PBCH.
The following figure shows the basic processing chain for the PBCH. The payload will go through
two different scrambling operations. The first one happens before encoding, whereas the second one
happens after decoding.
110 5G Air Interface and Physical Layer Procedures – Part 2
The first scrambling is initialized based on the cell ID and the system frame number. The second
scrambling is initialized based on the cell ID and the SS block time index.
The last channel that we will discuss in this section is the PRACH.
Four different formats are defined for the long-sequence PRACH. As we realized, this format has a
small subcarrier spacing and lasts a very long time. The long-sequence PRACH originates from the
LTE preambles. A long-sequence PRACH consists of a Cyclic Prefix (CP), followed by one or more
sequences, and finishing with a guard period to align to the slot boundaries.
Since the subcarrier spacing is larger, the slot duration is shorter. This makes a long-sequence PRACH
extremely useful in frequency bands above 6 GHz in combination with beam sweeping.
The main difference between the short-sequence and long-sequence PRACH types is that the subcarrier
spacing is much higher in a short-sequence PRACH. 15 kHz and 30 kHz subcarrier spacings below
6 GHz frequency and 60 kHz and 120 kHz subcarrier spacings above 6 GHz are used.
The short PRACH structure is essentially the same as the long one, with a CP, followed by a repetition
of PRACH sequences, and ending with a guard period, as shown in the following figure:
The PRACH and subcarrier spacing combinations are presented in the following figure for convenience.
In this detailed table, you can find the allocated bandwidth, which is expressed in the number of RBs
for PUSCH and the subcarrier index.
Summary 113
The preceding table above shows the length of the sequences, the number of repeated sequences, the
used subcarriers, the subcarrier spacings, the length of the cyclic prefixes, and their formulas, where
ĸ is taken as 64 in the calculations.
In this section, we analyzed physical channels and signals playing a role in the initial access procedure.
We examined in detail the SS block, PSS/SSS, and PBCH. Then, we saw a random access preamble,
which is basically the PRACH. We finished the section by analyzing and comparing short- and long-
sequence PRACH formats.
Summary
In this chapter, we learned that beam sweeping is required when operating at an mmWave frequency.
The use of beam sweeping affects the synchronization signals and PRACH design, since the initial
access procedure must account for the directionality of the transmissions.
114 5G Air Interface and Physical Layer Procedures – Part 2
We have seen how identifying this SS block transmission in each beam with different time indexes
and linking the PRACH resources to these indexes helps in this procedure. This directional aspect of
the transmission is new to NR.
Finally, we have also gone through some of the considerations about LTE-NR coexistence, especially
how the SS block transmissions can utilize 30 kHz subcarrier spacing to avoid interference with the
LTE cell-specific reference signals.
In the next chapter, we will detail the remaining downlink and uplink physical channels and signals. We
will analyze one of the other different concepts of NR, which is called the PDCCH Control Resource
Set (CORESET). We will also see different channel coding schemes, such as a Low-Density Parity
Check (LDPC) and polar coding. Then, we will examine another new concept, bandwidth parts, and
their related use cases.
6
5G Air Interface and Physical
Layer Procedures – Part 3
Regarding physical channels, we have discussed the Primary Synchronization Signal (PSS), Secondary
Synchronization Signal (SSS), and Physical Broadcast Channel (PBCH) in the downlink, as well
as the Physical Random Access Channel (PRACH) in the uplink, in the previous chapter. In this
section, we will go through the rest of the New Radio (NR) physical channels and other aspects related
to physical layer procedures. Briefly, we will cover the different channel coding schemes used for NR,
and we will go through the processing chain of the downlink and uplink data channels. In this chapter,
we will pay particular attention to how the channel structure is changed to allow for lower-latency use
cases and how lower latency impacts the operation of Enhanced Mobile Broadband (eMBB) data
traffic. Finally, we will discuss Bandwidth Parts (BWPs).
In this chapter, we’ll cover the following main topics:
Now, let’s start with the downlink physical channels and signals.
The PDCCH
In NR, the PDCCH carries the Downlink Control Information (DCI), like LTE. The modulation
used for the channel is Quadrature Phase Shift Keying (QPSK) and the Radio Network Temporary
Identifier (RNTI) masks the DCI Cyclic Redundancy Check (CRC) bits as it was done in LTE.
The PDCCH is divided into Control Channel Elements (CCEs) in NR. Each CCE is composed of
six Resource Element Groups (REGs), where each REG is composed of one Physical Resource
Block (PRB) in one Orthogonal Frequency Division Multiplexing (OFDM) symbol. The PDCCH
is encoded in several CCEs depending on the aggregation level used. The PDCCH uses a one-port
transmit diversity scheme in which the REG bundling is applied per CCE. The device can assume
that the same precoder is applied to a set of REGs within a REG bundle.
PDCCH CORESETs
The set of resources to which a PDCCH can be mapped is called a Control Resource Set (CORESET).
It is equivalent to the control region in LTE. A CORESET contains a set of REGs, and it is configured
by the network using Radio Resource Control (RRC) signaling.
The CORESET configuration consists of the frequency domain resources to use the starting OFDM
symbol and the time duration. This configuration provided by the network can be device-specific
and the CORESET defines the cell search space for the device to use to monitor the control channels.
This is the main difference between it and LTE. In LTE, the control region was located at the first
three OFDM symbols and was shared between all users in the service area. In NR, the control region
Downlink physical channels and signals 117
is defined specifically for each device. Additionally, this adds flexibility to resource control allocation
and allows devices not capable of running at maximum bandwidth to operate. A device with a smaller
bandwidth support can be also configured so that the CORESET spans only on supported bandwidth.
Group-Common PDCCH
A special case of PDCCH is a Group-Common PDCCH. This is a PDCCH intended for a group of
devices. First, it carries the Slot Format Indicator (SFI). As discussed in the previous chapters, the
SFI indicates which OFDM symbols in a slot are configured as downlink, uplink, or flexible. Second,
it carries the Preemption Indicator (PI). This is related to low-latency traffic. We will discuss this
further in this chapter.
So far, we have covered the control channel for the downlink. Now, let’s analyze the shared channel.
The PDSCH
Now that we have briefly described the PDCCH, which is mainly used for scheduling decisions
required for the downlink data channel, the PDSCH, let’s have a look at the PDSCH. The general
aspects of this channel are similar to LTE. It carries user data. The modulated symbols are mapped
across layers associated with the codeword first, followed by subcarriers, and lastly OFDM symbols.
The supported modulations in NR are QPSK, 16 Quadrature Amplitude Modulation (QAM), 64
QAM, and 256 QAM.
PDSCH is rate-matched around Synchronization Signal Blocks (SS blocks) and CORESETs in case its
transmission overlaps with them. If there is an overlap with an SS block, the network can specifically
indicate to a device whether the PDSCH is rate-matched around an SS block or not. This is related to
the fact that the gNB may choose not to transmit some SS blocks, as we mentioned in previous chapters.
PDSCH DMRS
One difference between LTE and PDSCH mapping is the position of the Demodulation Reference
Signal (DMRS). In NR, the PDSCH DMRS is front-loaded. This means that DMRS is located very
early in the slot. Thus, a device can make a channel quality estimation sooner and start decoding very
early in the slot transmission, which results in reduced latency.
There are two mapping types for the modulation reference signals, namely, DMRS mapping Type A
and DMRS mapping Type B. Type A uses slot-based scheduling. In Type A, the DMRS OFDM symbol
is fixed regardless of the PDSCH assignment, and it is configurable between OFDM symbols 2 and 3.
In Type B, the first OFDM symbol is assigned to the PDSCH:
118 5G Air Interface and Physical Layer Procedures – Part 3
Type B employs non-slot-based scheduling in which assignments are not referred to the slot boundaries.
This makes it impossible to use a fixed location for the DMRS in the slot due to the mini slots, which
can be assigned anywhere in the slot.
If a single channel estimation at the beginning of a slot is not enough – for example, in high-speed
mobility scenarios – additional DMRS symbols can be configured. This is the case, for instance, for a
PDSCH that carries broadcast information, Remaining Minimum System Information (RMSI), or
multicast information. The gNB will have to transmit this information to many devices and it will not
know which devices are in high-speed or not, so it will use these extra DMRS symbols as a precaution.
Now, we will cover other PDSCH-related aspects.
The following figure indicates the processing chain for the PDSCH. It is very similar to LTE. The PDSCH
supports up to two codewords, which are scrambled, modulated, and then mapped onto layers. The
layers are then mapped onto the Resource Elements (REs), together with the DMRS, and transmitted:
Downlink physical channels and signals 119
Notice that there is no precoder defined as in LTE transmission mode 9, for instance. Depending on
the device feedback, the gNB employs a suitable precoder, which is applied to both data and DMRS.
Downlink PIs
In the following figure, we have an example of eMBB traffic being preempted by low-latency traffic. A
device receives the eMBB slot and suddenly a mini slot is scheduled with some low-latency mission-
critical traffic. The situation is flagged to the device using the PI in either the same or a later slot. Why
is that useful? Well, if the device knows that an OFDM symbol was punctured by other traffic, it can
just skip decoding the affected code blocks and save power and processing time.
120 5G Air Interface and Physical Layer Procedures – Part 3
There is a minimum processing time called N1, which defines the minimum processing time in the
device to send the Hybrid Automatic Repeat Request (HARQ) feedback. The device notifies the
gNB about N1 time and the PI is given afterward.
Now, let’s move to the next downlink physical signal, the CSI-RS.
The CSI-RS is mapped to antenna ports and antenna ports are mapped to physical antennas. However,
the details of mapping are not specified:
The implementation-specific relation is modeled by the F matrix here. The device estimates the
composite channel, including F. Quasi-Colocation (QCL) relations describe what assumptions the
device may make about F.
Let’s move to the next downlink physical signal, the TRS, which is new in NR.
The TRS
NR has no Cell Specific Reference Signal (CRS) to use for fine time-frequency tracking. Therefore,
the TRS is employed to track time, frequency, delay spread, and Doppler spread more efficiently. The
TRS is managed as device-specific. An example of the TRS format is illustrated here:
A TRS can be configured in different ways. For instance, it can consist of bursts of four consecutive
OFDM symbols in two consecutive slots. Another typical configuration is a TRS burst of two TRS
symbols in two adjacent slots.
Let’s move to the next downlink physical signal, PTRS, which is also new in NR.
PTRS
A device can be configured in downlink and uplink with PTRS to track phase variations, mainly for
high bands:
Figure 6.8 – PTRS occurring every second PRB and every symbol
PTRS is dense in time and occurs every second or every fourth symbol depending on the scheduled
Modulation and Coding Scheme (MCS). PTRS is sparse in frequency and exists for one subcarrier
every second or every fourth PRB depending on the scheduled BW. PTRS is not presented at low
scheduled MCSs and bandwidths or for random access, System Information (SI), and paging messages.
In this section, we’ve covered the downlink physical channels, PDCCH, PDSCH, and some of their
aspects, together with the downlink physical channels such as CSI-RS, TRS, and PTRS. In the next
section, we will cover the physical channels and signals in the uplink.
Uplink physical channels and signals 123
The PUSCH
The PUSCH carries data and also optionally Uplink Control Information (UCI). As we described
before in previous chapters, the uplink waveform can be either Cyclic Prefix OFDM (CP-OFDM) or
Discrete Fourier Transform-Spread-OFDM (DFT-s-OFDM). The waveform to be used is signaled
to the device by the network. DFT-s-OFDM is only used for single-layer transmissions, and it is
intended for power-limited scenarios. This waveform also supports intra-slot frequency hopping for
more diversity.
As in the downlink case, PUSCH mapping is done in the same order as in LTE; first, across the layers
associated with the codeword, then across the subcarriers, and, finally, across the OFDM symbols.
The PUSCH uses the same modulation as the downlink with the exception that Binary Phase Shift
Keying (pi/2-BPSK) can be employed for DFT-s-OFDM. The intention is to provide more Peak-to-
Average Power Ratio (PAPR) gain for the waveform.
The uplink transmission can be either codebook-based or non-codebook-based, and the transmission
can be grant-based or grant-free. A grant-based transmission is a transmission signaled by the network
using the corresponding DCI. A grant-free transmission is an uplink transmission made automatically
by the device without any explicit prior grant being transmitted in the downlink.
Grant-free transmissions are crucial for low latency. In a normal scenario, a device requests an uplink
data transmission using a Scheduling Request (SR) and then waits for the gNB to deliver an uplink
grant. With grant-free transmission, the device can send data in the uplink once it is available. There
are two types of grant-free transmissions: Type 1 and Type 2. In both cases, the set of resources that
the device can use for uplink transmissions is configured semi-statically via RRC. In Type 1, there is
no Layer 1 (L1) signaling while in Type 2, additional L1 signaling is required to activate or deactivate
the resources configured for this grant-free transmission.
The PUSCH reference signal structure is similar to the downlink case. The DMRS is front-loaded and
additional OFDM symbols can be configured for high-mobility cases. The only difference is that the
DMRS sequence itself changes depending on the waveform. For CP-OFDM, it is the same as in the
downlink, and for DFT-OFDM, it is a Zadoff-Chu-based sequence.
124 5G Air Interface and Physical Layer Procedures – Part 3
The following figure shows the PUSCH coding chain for the CP-OFDM waveform. It is very similar
to the downlink case. The only difference, in this case, is that the precoder is included after the layer
mapping. The precoder to be used in the uplink is explicitly included in the specification. One of the
reasons is Multi-User Multiple Input Multiple Output (MU-MIMO). When the gNB configures
MU-MIMO, it must coordinate the precoders between different devices so that the data streams for
each one can be correctly separated:
In the downlink, this is not a problem. The gNB has total freedom in defining the precoders and then
coordinating them accordingly. However, if freedom was given to the devices in the uplink, that would
be impossible. To make uplink transmissions from different devices, we use precoders that enable
MU-MIMO. The precoder that a device uses must be explicitly indicated:
Uplink physical channels and signals 125
The figure here shows the same coding chain for the DFT-s-OFDM. The transform precoder is inserted
between the layer mapper and the precoding. Notice that only one codeword is used in this case.
Now that we have covered the PUSCH, PUSCH DMRS, and the processing chain for different OFDM
schemes in the uplink, the last physical channel we are going to cover in the uplink is the PUCCH.
The PUCCH
The PUCCH carries UCI, HARQ feedback, and SR. Two different PUCCHs are defined; long and
short. The long PUCCH spans over many OFDM symbols while the short PUCCH uses only one or
two OFDM symbols.
126 5G Air Interface and Physical Layer Procedures – Part 3
In the table presented here, you can see different PUCCH formats divided between long and short
PUCCH formats and classified as a function of the supported number of information bits.
Format 0 for the PUCCH is a short PUCCH for up to two information bits. This PUCCH is based on
sequence selection, which means that the bits are not modulated in the signal. Instead, four different
12 subcarrier sequences are defined and the sequence that is used depends on the information bits.
In the figure here, you can see four PUCCH sequences with the information bits presented.
Uplink physical channels and signals 127
Format 2 for the PUCCH is another short PUCCH with no multiplexing in the same PRB, and
contiguous PRB allocation. The DMRS is mapped on REs 1, 4, 7, and 10 for each PRB. In the figure
here, you can see where the DMRS is mapped in a PRB used for this PUCCH format.
Format 1 is a long PUCCH used with two bits or fewer. This format uses 12 subcarriers, and it is
between 4 and 12 OFDM symbols. Information bits are modulated onto a single modulated symbol,
which is spread using a Zadoff-Chu sequence for each OFDM symbol. The DMRS is introduced in
every other symbol in the time domain, as can be seen from the following figure:
Formats 3 and 4 are the remaining long PUCCH formats. These can be configured with intra-slot
frequency hopping for more diversity and can span over more than one slot with inter-slot frequency
hopping, which is optionally available.
In this section, we’ve covered the downlink physical channels, PUSCH and PUCCH, and some of their
aspects. Thereby, we have covered the main physical channels and signals in the downlink and uplink.
To complete the physical layer description, we also need to consider the channel coding schemes.
Figure 6.14 – Transport channel coding for the downlink shared channel
Then, LDPC coding is performed for each code block and the last steps are rate matching, interleaving,
and concatenating those code blocks.
The same applies to the uplink with the exception that UCI can be piggybacked on the PUSCH as was
the case in LTE. In that case, there is an extra Data and Control Multiplexing operation as shown
in the figure here.
Data retransmissions
Now that we understand the transport channel coding chains in NR, let’s compare LTE and NR
regarding transport block retransmissions.
One of the main differences between data retransmissions in NR and LTE is the addition of CBG-based
retransmissions to NR. In NR, it is possible to only retransmit the code blocks that failed at the decoding
stage, rather than the entire transport block. This saves resources during retransmission and improves
latency since the processing time of the older retransmissions will be shorter because only a few of
the originally transmitted code blocks will be decoded:
The DCI includes information not only about the group of code blocks that is retransmitted but also
the soft buffer. When processing the error retransmission, the new information received is traditionally
combined with the previous original transmission. This combining scheme works if the codeword
was retransmitted due to the Signal to Interference and Noise Ratio (SINR).
If the original transmission fails since it is pre-empted by low-latency traffic, then the information
from the original transmission does not correspond to the retransmission. In that case, it is better to
flush the previously received information from the soft buffers rather than using a combining scheme
because it corresponds to the low-latency traffic.
NR supports adaptive and asynchronous HARQ in both the downlink and uplink:
BWPs 131
The number of HARQ processes is configured to the device with at most 16 HARQ processes:
NR defines two device capabilities for the minimum HARQ processing time. Initially, most devices
will support the baseline capability shown in the preceding table. The following table indicates the
second device capability that is defined by the specification:
A HARQ process needs to feedback multiple acknowledgments at the same time – for instance, for
carrier aggregation, multiple downlink slots followed by an uplink slot. Note that the number of
bits to feedback depends on the number of downlink transmissions and some of these downlink
transmissions might be missed by the device.
Finally, a HARQ codebook can be a semi-static codebook (Type 1) or a dynamic codebook (Type 2).
In this section, we listed the channel coding schemes for NR, and we showed how they are introduced
in channel processing chains. We’ve also discussed the retransmission schemes by comparing them
with LTE. Now, it is time to learn the final revolutionary aspect of the NR physical layer.
BWPs
In this last section of this chapter, we will cover another concept introduced in NR, which is the
BWPs. This concept is new in NR and very powerful for a few interesting and important use cases.
In this section, we will learn what BWPs are and how they are configured, activated, and deactivated.
We will also describe the main use cases for BWPs to better understand their importance in the NR
physical layer.
132 5G Air Interface and Physical Layer Procedures – Part 3
Defining a BWP
So, let’s start by defining what a BWP is. A BWP is a set of contiguous PRBs with nested bandwidths
where the devices are only allowed to transmit or receive. Each BWP has its own configuration with
a specific numerology to use and a set of reserved resources for which transmission is not allowed.
Devices always operate using BWPs. This means that at least one initial BWP must be defined by the
PBCH so that all devices can access it. This initial BWP will also contain the CORESET and PDSCH
for the RMSI. However, a BWP does not need to contain an SS block.
BWP parameters
A device must be configured with one uplink and one downlink BWP at least. However, it can be
configured with multiple BWPs as well. It is important to know that these configured BWPs may
overlap in the frequency domain. Note that in Release 15, only one of them is active, so only one
uplink and one downlink BWP can be active at the same time. Among others, the main parameters
that can be configured for BWPs are the numerology, the frequency location, the number of PRBs,
and the CORESET with which the control channel must be monitored.
BWP operations
Devices can only transmit and receive using the active resources of the BWP with the associated
numerology. The BWPs can be activated or deactivated by many different means, including dedicated
RRC signaling, DCI with explicit indication, or timer-based activation:
BWPs 133
In the figure here, you can see a basic example of how BWPs operate. There is an initial BWP that
is used by all devices for initial access. Then, either by DCI or RRC, the devices can be assigned to
different BWPs based on their frequency resource needs.
Now, let’s understand BWPs deeply by evaluating their use cases.
134 5G Air Interface and Physical Layer Procedures – Part 3
Another interesting use case is energy saving. If a device does not require high throughput, it can be
transferred to another BWP with less bandwidth. Therefore, the device can then reduce its baseband
processing clock and save power:
Another use case is being able to multiplex the numerologies. Each BWP has its own numerology, as
discussed previously. So, devices with different numerologies can be separated by the configurations of
the BWP. Moreover, in situations in which the numerology for a device should change – for example,
a traffic type change – the device is assigned to another BWP associated with that new numerology:
BWPs 135
Another use case is the support of the non-contiguous spectrum. If all the BWPs defined in a cell
block a certain frequency range, the network frees those resources and avoids any transmission from
the network for the devices on those frequencies:
One final use case is forward compatibility. This is also related to the previous use case. This is basically
the possibility to avoid the transmission of all the devices in a given frequency range, which could
make it easier to support new features in the future without having to consider the impact on the
device penetration in the network.
So, BWPs are one of the main improvements for NR. We have explored at a high level how they are
configured and activated and some of the main scenarios in which they can be employed.
Summary
In this chapter, we went through the downlink and uplink physical channels and signals for NR.
Although certain aspects are taken from LTE, we still covered the similarities and differences for
NR. We discussed channel coding schemes, LDPC code, and polar coding. We finished the chapter
by evaluating the use cases of BWPs. As such, this chapter has fully covered the NR air interface and
physical layer procedures.
Next, we’ll look at the packet core procedures in 5G.
7
Packet Core Procedures
In this chapter, we will consolidate the concepts and fundamental knowledge from the previous
chapters and map them to real 5G system procedures. We will see how the fundamentals of cloud-
native infrastructure give shape to the communications between the various network functions in a
producer-consumer relationship to bring about the reality of the 5G system and various procedures
that enable a 5G device to get access to mobile broadband. All the call flows explained in detail here
are expected to be implemented in code that has been built based on cloud-native development
methods; these are mainly container-based and have a producer-consumer method of providing and
consuming services.
In Chapter 2, we learned about the role of the network functions in the 5G packet core, and in
Chapter 3, Building Blocks – Cloud Native Infrastructure, we learned about the services offered by each
of those network functions. In this chapter, we will see how all the network functions come together
to service a 5G device. We will get into the details of call flows of fundamental procedures that enable
a 5G device in a network.
In the upcoming sections, we will go over the following topics:
this pipe is used for the user data to flow between the 5G packet core to the UE. The PDU session ID
is generated by the UE. Figure 7.1 shows a PDU session along with various Quality of Service (QoS)
flows associated with it:
The establishment of a PDU session involves the UE along with a number of network functions. These
network functions exchange messages with each other, and when all these message transactions are
successful, a PDU session is finally established.
Figure 7.2 describes the procedure through which this end-to-end connectivity is established. It can
be noticed here that the participating nodes are as follows:
• UE
• gNB (gNodeB/RAN)
• AMF (Access and Mobility Function)
• SMF (Session Management Function)
• SCP (Service Communications Proxy)
• UDM (Unified Data Management)
• PCF (Policy Control Function)
• CHF (Charging Function)
• UPF (User Plane Function)
Note that, optionally, a Network Registration Function (NRF) can also be used for service registration
and discovery, but we have left it out of our example here for the sake of simplicity.
PDU session establishment in 5G 139
• S-NSSAI(s)
• UE-generated PDU session ID
• DNN information
140 Packet Core Procedures
Hence, Steps 1 and 2 are used to relay the UE request to establish a PDU session and the related
information to ascertain the type of request and the UEs capability, and so on. The gNB transparently
relays this message to the AMF.
In Step 3, the AMF selects the SMF based on DNN, NSSAI, PLMN, TAI, request type, or based on
local configuration, if available. After this, the AMF sends the SMF the Nsmf_PDUSession_
CreateSMContext request; this message relays to the SMF the information gathered by the AMF.
This relates to PDU session creation, so the AMF (with information such as the request type, DNN,
PDU type, etc.) requests the SMF to create a session. Based on this information, the SMF decides
whether it can accept the request by fulfilling all the criteria in the request or not. For example, the SMF
can reject the message if the request is for an IPv6 PDN type and the SMF/UPF only supports IPv4.
In Steps 4 and 5, the SMF registers itself to be mapped to this session with the UDM as its serving
SMF. The UDM determines whether the SMF is authorized to be its consumer. It also uses the same
to be implicitly notified if it is deregistered in the UDM.
PDU session establishment in 5G 141
In Steps 6 and 7, the subscription data pertaining to the UE is fetched. The UDM queries the UDR
(as discussed in Chapter 3, Building Blocks – Cloud Native Infrastructure) by a key such as SUPI to
retrieve this information. The following list contains some of the contents of the subscription data
fetched by the SMF from the UDM:
• Subscribed UE-AMBR, which is the aggregation ID, the UL, and DL MBRs across all
non-guaranteed QoS flows
• Subscribed S-NSSAIs
• Any restriction on the RAT type
• Forbidden areas, if any, and service area restrictions, if any
• CAG information
• DNN list
• Charging characteristics
• SMF+PGW-C FQDN for interworking with 4G EPC
• SSC modes allowed
• Static IP address or prefix, if applicable
In Steps 8 and 9, the SMF requests the UDM to notify in the case of any subscription information
being changed. Also, the UDM delivers any Steering of Roaming information to the UE. Basically,
these procedures ensure that the SMF is notified in case of changes to UE subscription information,
and thereby, it can implement the same to modify its existing session.
In Step 10, the Nsmf_PDUSession_CreateSMContext response is sent from the SMF to the
AMF. If the SMF can successfully process the request, it responds by providing an SM context ID to
the AMF. This message contains a cause field that determines success, and in the case of failure,
provides a cause value and an N1 container to be relayed to the UE indicating the outcome.
In Steps 11 and 12, the SMF selects the PCF that it needs to communicate with for retrieving the
policies associated with the subscriber for this PDU session request. The SMF can use the NRF to
discover the PCF, or it can also select the PCF based on local static configuration. After this, the SMF
performs an SM policy association procedure with the PCF and retrieves the default PCC rules for
the PDU session. The PCF responds with a Policy Create Response message with the PCC
rules for the PDU session:
142 Packet Core Procedures
In Steps 13 and 14, the IP address for the PDU session is allocated; this is done by the SMF. Also at
this stage, the SMF selects the UPF that it will use to further establish the data plane for the PDU
session. The allocated UE IP address or prefix, access type, RAT type, policy control triggers, serving
network information, UE time zone, and user location information is communicated to the PCF
using this update message:
PDU session establishment in 5G 143
In Steps 15 and 16, if a charging system is allocated in the network, the CHF Create Request message
is used to trigger the charging system. It is used to notify the Session Creation event to the charging
system. This message would be the initial invocation and will contain an invocation sequence number
that would increment with each subsequent transaction of the SMF with the CHF – for example, for
reporting volume or when any other trigger condition such as a RAT type change happens, the SMF
sends the subscriber an identifier and a Notify URL.
The CHF responds with PDU session charging information and the list of triggers:
In Steps 17 and 18, the SMF sends an N4 session establishment request to the selected UPF and
provides the packet detection, enforcement, and reporting rules that it had received from the PCF
in Steps 13 and 14. These include the PDR, QER, FAR, and URR. The UPF responds with the uplink
tunnel information.
Steps 19 and 20 are applicable only if N26-based interworking is enabled in the network and the SMF
plays the role of PGW-c/SMF. This is a request to the AMF to assign an EPS bearer ID to this PDU
session for a future handover to the 4G EPS system. If N26-based handover is not supported, this is
not applicable.
In Steps 21 and 22, the message from the SMF to the AMF carries an N1 container to be passed on
to the UE and an N2 container for the gNB; a lot of important information about the PDU session is
packed in these containers, such as the following:
144 Packet Core Procedures
• PDU session ID
• N2 SM information, including the following:
PDU session ID
QFI(s)
QoS profile,
CN tunnel info
S-NSSAI from the allowed NSSAI
Session-AMBR
PDU session type
User Plane Security Enforcement information
UE integrity protection maximum data rate
QoS rules and QoS flow level, and QoS parameters, if needed, for the QoS flows associated
with the QoS rules
Selected SSC mode
S-NSSAIs
UE requested DNN
Allocated IPv4/v6/v4v6 address
Interface identifier
Session-AMBR
Selected PDU session type, and reflective QoS timer, when available
P-CSCF addresses within the PCO, if requested
Control Plane Only indicator, when available
Header compression configuration, when available
Always-on PDU Session Granted, when available
Small data rate control parameters, when available
Small data rate control status, when available
Serving PLMN rate control
• If multiple UPFs are used for the PDU session, the CN tunnel info contains tunnel information
related to the UPFs that terminate N3
PDU session establishment in 5G 145
The CN tunnel information included in the N2 container has the core network addresses of the N3
tunnel corresponding to the PDU session that is provided to the gNB via the AMF. It also provides
the QoS information and profiles to the RAN via N2 and via N1 to the UE.
In Step 23, the message is directed from the AMF to the RAN (gNB). The N2 PDU session request
contains N2 SM information and a NAS message. The NAS message contains the PDU session ID and
N1 SM container containing the PDU Session Establishment Accept message.
Hence via this message, the AMF directs the NAS container to the UE and the SM message for the gNB.
In Step 24, the RAN may send an RRC connection reconfiguration message, which will relay to the
UE the QoS rules for the PDU session. The gNB also allocates the RAN tunnel information for the
PDU session.
146 Packet Core Procedures
In Step 25, the PDU session response is sent from the RAN to the AMF; this contains the PDU
session ID, the cause, N2 SM information comprising of the PDU session ID, AN tunnel information
(which corresponds to the N3 tunnel information), list of accepted or rejected QFIs, and a user plane
enforcement policy notification.
With the availability of the N3 tunnel information, the first uplink user data can now be sent from
the UE to the 5G core.
In Step 26, the PDU Session Update SM Context Request message is sent from the AMF
to the SMF. It is used to forward the N2 SM information received from the RAN to the SMF. The SMF
is provided with the list of accepted QFIs, which it further enforces via the UPF.
In Steps 27 and 28, the N4 session modification procedure with the UPF is carried out by the SMF.
The SMF provides the AN tunnel info it has received from the gNB via the AMF, and the UPF receives
the forwarding rules.
The UPF responds with an N4 Session Modification Response to the SMF.
After this step, the UPF is ready to deliver any data packet in the downlink direction to the UE.
In Step 29, the PDUSession_UpdateSMContext response message is sent from the SMF to the
AMF. The SMF can subscribe to any UE mobility event notification from the AMF, and with the help
of this, the SMF is notified about relevant events to the SMF.
In the case of PDU session types IPv6 or IPv4v6, the SMF generates an IPv6 router advertisement and
sends it to the UE after this stage. For the Ethernet PDU session type, the SMF can send the MAC
address and the DS-TT Ethernet port.
This marks the end of the PDU session establishment procedure.
In this section, we have gone through the details of the PDU establishment procedure and the call
flow to set up a PDU session in 5G. We have also learned about the concept of a PDU and the role it
has to play in establishing connectivity for a UE. In the next section, we will go through the call flow
to establish a 4G call using the 5G packet core network.
All the other interfaces involved in a 4G session creation (for example, Gx, Gy, Gz, etc.) are replaced
by the corresponding 5G core SBI interfaces (Npcf, Nudm, and Nchf). The SMF+PGW-C provides
information over N4 to the UPF+PGW-U related to the handling of traffic over S5-U.
This option will be used typically by network operators when most of their network has a 5G core
deployed. In this case, it makes sense to slowly retire the legacy of the 4G-based core and leverage the
interworking function of the 5G core to cater to 4G devices.
In Figure 7.7, we see how interworking is supported between the 5G and 4G cores. Another key feature
that is enabled by this design is the fact that handovers between 4G and 5G and vice-versa would be
seamless, which would be made possible by leveraging a common UPF that will serve both 4G and
5G sessions. Hence, continuity can be maintained on the user plane and the user traffic will not be
disrupted during this transaction.
• The SMF/PGWC allows the 4G session. Either the PDU session ID is received on PCO/APCO
or the CSReq will have a 5GIWKS bit set.
• During PDN connection establishment in the EPC, the UE allocates the PDU session ID and
sends it to the PGW-C+SMF via PCO. An S-NSSAI associated with the PDN connection is
determined based on the operator policy and is sent to the UE in the PCO together with a
PLMN ID that the S-NSSAI relates to.
• X2 and S1-based handover for EPS. When the UE is attached to E-UTRAN, all handover
procedures will result in SMF+PGW-C seeing only a Modify Bearer Request message
from SGW for either location change and/or SGW change during handover.
The following diagram denotes the detailed flow:
150 Packet Core Procedures
In this section, we have gone over the details of the process to establish a 4G session using the 5G
interworking function. This may turn out as a popular choice for the telecom operators to deploy, as it
encourages the use of common infrastructure and network functions for both 4G and 5G, and hence
the need to maintain two large 4G and 5G networks simultaneously is reduced to a large extent. This
saves operational expenses (OPEX) to a large extent. In the upcoming section, we will explore how
voice calls are supported in a 5G network.
Figure 7.13 – Packet capture: AMF TO SMF PDU session create SM context request
The UDM to SMF subscription fetch message is shown next. It depicts some of the important fields,
such as the DNN configurations, allocation, and retention priority values, and so on:
154 Packet Core Procedures
The SMF to AMF communication as is seen on the wire is depicted next. It contains an acknowledgment
of the session created and mapped to a unique subscriber context with the IMSI details, as shown in
the following figure:
IMS 5G PDU session establishment 155
The following shows the IMS 5G PDU attach call flow (continued from earlier):
The subsequent details of the IMS PDU session establishment procedure are listed next via Steps 10 to 16:
Step 10: The SMF sends HTTP GET request /nnrf-disc/v1/nf-instances?dnn =
ims&requester-nf-type=SMF&target-nf-type=PCF for PCF instances, and the NRF
responds with 200 OK with the service instance ID, API versions, NF (Network Function) service
status, and IPv4 addresses.
Step 11: The SMF initiates the Npcf_SMPolicy Control_Create request by including SmPolicy
ContextData, which contains SUPI, GPSI, PDU session ID, RAT type, serving network, user
location info, UE time zone, PEI, online/offline charging, charging characteristics, PDU session type,
allocated UE IP address/prefix(es), and subsDefQos.
Step 12: The PCF responds with 201 Created, PolicyCreation, SessRules, policyCtrlReq
triggers, chargingInfo.pccRules, and revalidation time.
Step 13: The SMF initiates a POST request/npcf – smpolicycontrol/v1 /smpolicies/
ism.l.imsi-123123xxxxxx/update to PCFUpdate with access type, IPv6 address prefix,
RAT type, reppolicyCtrire triggers, serving network, UE time zone, user location info.
Step 14: The PCF responds with 200 OK for the successful transaction.
Step 15a: The SMF sends an HTTP GET request //x.x.x.x:8080/nnrf-di Sc/V1/
nf-instances?preferred locality= honoulu & requester-nf-type=SMF&target-
nf-type-CHF for CHF instances, and the NRF responds with 200 OK with service instance ID,
API versions, NF service status, and IPv4 addresses.
Step 15b: The SMF sends an HTTP POST request /nchf-convergedcharging /V2/
chargingdata to CHF initial with invocation Sequence Number, Timestamp PDU Session Charging
Information, Subscriber Identifier, and Notify URI.
Step 16: The CHF responds with 201 Created with triggers and PDU session charging information.
Next, we will present some snapshots from real traces.
Figure 7.17 shows a packet capture between the PCF and SMF. This message contains the session and PCC
rules sent by the PCF, along with a revalidation timer value, various triggers, and supporting features:
IMS 5G PDU session establishment 157
Figure 7.18 shows the packet capture depicting a discover message between the SMF and NRF. The
NRF provides the details of a PCF that the SMF would need to contact to process the call:
Figure 7.19 shows the policy update message exchanged between the SMF and the PCF:
Note the different types of information exchanged between the two network functions. Next, we’ll
continue with the IMS PDU session establishment procedure.
IMS 5G PDU session establishment 159
Step 17: The SMF sends a PFCP session establishment/modification request to the UPF and provides
packet detection, enforcement, and reporting rules to be installed on the UPF for this PDU session
(PDR, QER, FAR, and URR).
Step 18: The UPF responds with uplink tunnel information.
Step 19: The SMF sends an HTTP GET request, http://x.x.x.x:8080/nnrf-disc/v1/
nf-instances?requester-nf-type=SMF&target-nf-instance-id=bbe596c6-
0a81-4e94-85bc-f3b1b4a9a52f&target-nf-typ AMF/, for AMF instances, and the
NRF responds with 200 OK with the service instance ID, API versions, NF service status, and
IPv4 addresses.
Step 20: In the sm create context request, AMF sends epsinterworkingind":"WITH_N26, and
seeing this indicator, the SMF sends an AssignEBI HTTP POST request to the AMF (http://
x.x.x.x:8080/na mf-comm/v1/ue-contexts/imsi-123xxxxxxx/assigebi/)
with the ARP list and PDU session ID.
Step 21: The AMF responds with assignedEbiList (ARP, value, and EPS bearer ID).
160 Packet Core Procedures
Step 22: The SMF sends an HTTP POST request to AMF (http://x.x.x.x:8080/namf-comm/
v1/ue-contexts/imsessages/N1N2MessageTransfer Session) with details (PDU
information ID, N2 (PDU SM Session ID), QFI(s), QoS Profile(s), CNTunnel Info, S-NSSAI from the
Allowed NSSAI Session - AMBR, PDU Session Establishment type, N1 SM container (PDUAccept
([QoS Rule(s) and QoS flow level QoS parameters if needed for the QoS flow(s) associated with the
QoS rule(s)], selected SSC mode, S – NSSAI(S), DNN, allocated IPv4 address, interface identifier,
Session - AMBR, selected PDU session type, [reflective QoS timer] available), [P - CSCF address(es)],
[Always-on PDU SessionGranted). Multiple UPFs are used for the PDU Session. CNTunnel Info
contains tunnel information related with the UPF that terminates N3.
Figure 7.22 shows a wire capture of the SMF and NRF transaction for the discovery of an AMF; the
requestor and target field can be used to identify which network function is requesting the details of
the target network function from the NRF.
IMS 5G PDU session establishment 161
Figure 7.23 shows the content of the N1N2 message transfer transaction between the SMF and the
AMF. Some key fields, such as the Always on indicator and protocol configuration
options, depict the kind of information exchanged with this message:
162 Packet Core Procedures
Figure 7.24 depicts the contents of a successful N1N2 message transfer transaction:
Figure 7.24 – Packet capture SMF to AMF N1N2 Message Transfer Success
Step 23: The AMF acknowledges the request with 200 OK and responds with a cause, N1+N2+TRANSFER_
INITIATED.
Step 24: Resource setup for the uplink tunnel.
VoNR call flow 163
Step 1: The UE initiates SIP registration toward the called party via UPF, and P-CSCF through the
IMS core network in the backend.
Step 2: P-CSCF sends Npcf_PolicyAuthorization_Update to the PCF to enforce policies,
modify service information, apply gate control for traffic shaping and policing, modify subscription
to SDF notification/deactivation, and so on.
Step 3: The PCF sends an HTTP POST request (/callbacks/v1/smPoliciesUpdate
Notification/imsi-123xxxxxx:1:1591309591702656285/update) to
the SMF to update PCC rules (SIP VoNR audio), policy control request triggers, SDF, and
charging-related information.
Step 4: The SMF processes the received PCC rules and sends a 204 No Content (200 OK) message
for a successful transaction.
Step 5: The SMF sends an HTTP POST request to AMF (http://x.x.x.x:8080/namf-comm/
v1/uecontexts/imsi-123xxxxxxxxx/n1-n2-messages/NIN2) with details (PDU
session modification command ID, QFIS, QoS profile(s), and Session - AMBR), N1SM container
(PDU session modification command (PDU Session ID, QoS rule(s), QoS flow level parameters if
needed for the QoS flow(s) associated with the QoS rule(s), QoS rule operation, and QoS flow level
QoS parameters operation, Session - AMBR)).
Step 6: The AMF acknowledges the request with 200 OK and responds with a cause: N1_N2_
TRANSFER_INITIATED.
Step 7: The AMF sends N2 PDU session request N2 SM information received from the SMF, NAS
message PDU Session ID, and NI SM container (PDU session modification command).
Step 8: Access Network Specific Resource modification process takes place and the gNB notifies to
UE about any change in parameters and UE acknowledges the same.
Step 9: An N2 PDU Session Acknowledgment message is sent from the gNB to the AMF with a
confirmation that the radio-related modifications in Step 8 is successful.
VoNR call flow 165
Figure 7.26 – Packet capture PCF to SMF policy control update notify
The following figure shows the N1N2 message transfer packet capture during the establishment of a
voice call. The key information elements are shown in the diagram:
166 Packet Core Procedures
We will now continue to the next phase of the call flow and go over the remaining steps one by one:
VoNR call flow 167
Step 10: The AMF forwards the N2 SM information and the user location information received from
the (R) AN to the SMF, and if the (R) AN rejects QFls, the SMF updates the QoS rules and QoS
parameters if needed for the QoS flow(s).
Step 11: The SMF acknowledges with 204 No Content.
Step 12: The UE acknowledges the PDU session modification command by sending a NAS message
(PDU session ID, N1 SM container (PDU session modification command ACK)).
Step 13: The gNB transfers the NAS message to the AMF.
Step 14: The AMF forwards the N1 SM container (PDU session modification command ACK) and user
location information received from the (R) AN to the SMF via the Nsmf_PDUSession_Update
SMContext service operation.
path/nsmf -pdusession /v1/sm-contexts/imsi- 123xxxx :1/modify
Step 15: The SMF acknowledges with 204 No Content.
168 Packet Core Procedures
Step 16: The SMF sends an HTTP POST request (/nchf -convergedcharging/v2/
chargingdata/acdsddsdd-988739-1466329180645-SBI/update) to the CHF. The
SMF sends ChargingDataUpdateReq by including Multi-Uni-Usage with Rating-
Group-ld, which is received as part of Charging_Description of Sm_Policy Control_
UpdateNotify_Request to install PCCRules.
Step 17: The CHF responds with 200 OK with triggers and PDU session charging information.
Step 18: The SMF updates the N4 session of the UPF(s) that are involved in the PDU session modification
by sending an N4 session modification request (N4 Session ID) message.
Step 19: The UPF acknowledges the request and responds with “cause” accepted.
This marks the end of the VoNR procedure.
The VoNR procedure is key to establishing voice calls with NR. The IMS PDU session establishment
along with a VoNR call flow completes the requirement needed to make a voice call or a video call
over NR.
One key thing to keep in mind, however, is that the IMS PDU session is established when the phone
is turned on, but the VoNR call flow is executed when we dial a number for voice or video calls.
In the next section, we will study the integration of Wi-Fi with 5G networks.
Wi-Fi attach
One of the prime features of the 5G core network is its capability to inter-work with different types
of access networks, both 3GPP-based and non-3GPP-based. One such network is Wi-Fi. The 5G
radio can coexist with Wi-Fi access to cover coverage gaps. Hence, denser access can be planned
with complementing radio access technologies. This is how Wi-Fi and New Radio (5G radio) can
complement each other and do not need to be treated as competing technologies.
Wi-Fi attach 169
Step 6: For the successful transaction, UDM responds with 200 OK and sends the DNN configurations
– "5gQos profile: 5qi", "arp:SessAmbr" values, iwkEpsind, and so on.
Step 7: The SMF sends an HTTP POST subscription notification request to UDM for POST/nudm-
sdm/v2/imsi-123123xxxxxx/sdm-subs.
Step 8: For the successful transaction, UDM responds with 201 Created.
Step 11: The PCF responds with 201 Created with policy creation with SessRules,
policyCtriReqTriggers, chargingInfo, pccRules, and revalidation time.
Step 12: The SMF initiates a POST request (/npcf-smpolicycontrol/v1/sm-policies/
ism.1.imsi-123xxxxxxxxxx/update to PCF Update) with access type,
ipv6addressPrefix, RAT type, reppolicyCtriretriggers, ServingNetwork,
ueTimezone, and user location info.
Step 13: PCF responds with 200 OK for the successful transaction.
The packet capture below shows the Create Session Response that is sent from SMF to ePDG. You
can have a glance at the message structure and information elements within it that is sent across to
the ePDG.
In this section, we have delved into the details of establishing a Wi-Fi session. This explains the
interworking of WLAN technology with the 5G core network. This enables a 5G/4G network support
handover between 4G/5G and WLAN.
Summary
In this chapter, we have seen the various procedures in 5G and how they come together to service a
subscriber. We have gone over how a PDU session is established in 5G, and we have gone over how to
connect a 4G radio to work with a 5G interworking function. We have seen how to establish a voice
call over New Radio and finally, we have seen how Wi-Fi access integrates with a 5G system. By the
end of this chapter, we now understand the 5G call flows in detail and have developed a near-practical
understanding of the messages exchanged between the various network functions to bring about a
data or a voice call in 5G.
In the upcoming chapters, we will delve further into 5G-NSA and 5G-SA system architectures that
leverage these procedures. The next chapter introduces exclusive VoNR concepts.
8
Voice over New Radio (VoNR)
The combination of Voice over Long-Term Evolution (VoLTE) and Voice over NR (VoNR) will be
the long-term voice infrastructure for mobile service providers. In this chapter, we will discuss the
main concepts behind future VoNR networks. Furthermore, VoNR will be analyzed from end to end
with a focus on the architecture requirements, initial procedures, call establishment, and interworking.
VoNR has got some very close similarities to VoLTE. For example, both technologies require an IP
Multimedia Subsystem (IMS) for call signaling, and both technologies employ their Radio Access
Network (RAN), transport, and core networks to carry voice media in the form of IP packets.
We’ll go through the following topics in this chapter:
services. The same IMS architecture can also be employed for VoNR services when a service provider
deploys a 5G network. therefore, leveraging existing IMS deployments will be a key driver for VoNR.
Ultra-high-definition audio
VoNR employs ultra-high-definition audio through the Enhanced Voice Services (EVS) codec and
its extension of Immersive Voice and Audio Services (IVAS). This ultra-high-definition audio is
fundamentally used for voice calls. Furthermore, it will integrate with applications and contents, such
as announcements, music, conferencing, and real-time communications, leveraging VoNR.
The following diagram shows the established QoS flows of SIP signaling and voice packets required
for VoNR:
QoS flows are established in power distribution unit (PDU) sessions, and a PDU session creates
connectivity between the device, the gNodeB (gNB), and the User Plane Function (UPF). The UPF
provides connectivity to the IMS with an N6 reference point to allow subscribers to conduct calls.
IP multimedia subsystem
The IMS is the control infrastructure that provides call control services, and it consists of many
separate elements such as Call Session Control Functions (CSCFs) and some application servers,
and it utilizes some core network nodes.
178 Voice over New Radio (VoNR)
CSCFs comprise Proxy CSCF (P-CSCF), Interrogating CSCF (I-CSFC), and Serving CSFC (S-CSCF).
P-CSCF is the first point of contact for home network subscribers in the IMS, and SIP signaling is
forwarded through P-CSCF. I-CSCF is responsible for selecting S-CSCF, and it communicates with the
Unified Data Management (UDM) for the selection procedure. S-CSCF is generally responsible for
processing, routing, and responding to SIP signaling messages. S-CSCF interacts with the Telephony
Application Server (TAS) in the call setup procedure.
The TAS is an IMS application server that supports supplementary service functionalities such as
calling line ID hiding and call diversion:
• Subscriber provisioning
• IMS connectivity establishment
VoNR initial procedures 179
• IMS registration
• Third-party registration
Subscriber provisioning
Several network elements must be provisioned appropriately with subscriber information for VoNR
services. Some of these elements are the UDM, the Home Subscriber Server (HSS), the TAS and
Service Centralization and Continuity (SCC) application servers, the Policy Control Function
(PCF), and AAA servers in case of Wi-Fi calling.
The information indicating whether a subscriber is permitted access to the IMS for voice services is
contained within the subscriber profile in the UDM, which acts as a central repository of subscriber
information. The subscriber profile contains appropriate QoS profiles for the subscriber, and it
also contains whether roaming is supported. Likewise, the UDM within the IMS also keeps that
subscriber information.
Other elements, such as the TAS and the SCC application servers, must also be provisioned. The TAS,
for instance, contains subscriber information if supported with supplementary service functionalities
such as calling line ID hiding and call diversion. The TAS downloads these via Sh or other interfaces
such as Lightweight Directory Access Protocol (LDAP)/Diameter.
When the call is established, the PCF authorizes the appropriate QoS profiles for the subscribers.
Depending on the network deployment, some additional services, such as Wi-Fi calling, can be
supported. In this case, AAA servers are deployed. AAA servers also store the subscriber data, so they
need to be provisioned in the subscriber provisioning as well.
For a regular data subscriber, the DN is usually the internet. However, for a VoNR subscriber, the
default DNs are both the internet and the IMS. Following the subsequent PDU session establishment
request, the PDU session providing connectivity to the IMS is established with a default QoS flow.
This default QoS flow has the 5QI value 5, and it carries SIP signaling. SIP signaling is required for
the next stage, which is the IMS registration procedure.
IMS registration
The IMS registration procedure includes many elements. However, P-CSCF, S-CSCF, and UDM are
the main elements taking place. P-CSCF serves as the ingress and the egress point to the IMS, provides
security, and manages SIP message routing. S-CSCF is the registrar in the registration procedure, while
the UDM has the security information together with the subscriber profile.
The IMS registration procedure is outlined in Figure 7.4. In step 1, the device sends an initial registration
request to the IMS. This request contains information such as the device capabilities and identification
information. Then in step 2, the P-CSCF obtains the security information from the UDM. That security
information allows the IMS network to send an authentication challenge down to the device. Finally,
in step 3, S-CSCF sends the authentication challenge to the device. Now, in step 4, the device attempts
to register again with the authentication response to the challenge in step 2 and 3. If the response is
correct, then in step 5, S-CSCF allows the device to access the IMS services:
In terms of the IMS, the network is now set up to receive and process any mobile-originated or
terminated SIP signaling requests.
Third-party registration
Registration to the application servers such as the TAS is not part of the IMS registration procedure.
However, in the IMS registration procedure, S-CSCF interacts with the UDM and downloads the user
profile in the form of Initial Filter Criteria (IFC), which comprises a list of conditions upon which
the application servers can be registered on behalf of the subscriber:
VoNR call procedures 181
Therefore, following the IMS registration procedure, S-CSCF sends a third-party registration to the
application servers listed in the IFC content.
In response to the SDP Offer, the called party sends an SDP Answer in 183 Session Progress provisional
message with the called party’s IP address, port, codec, and bandwidth information.
After exchanging the SDP Offer and the SDP Answer through INVITE and 183 Session Progress
messages, the PCF is triggered to start establishing the QoS flows in the 5G network for the media
flow. This is not shown in the following diagram and will be analyzed in the following section.
The next message that is sent is the Provisional Response Acknowledgement (PRACK), which is a
confirmation message to tell the called party that the calling party received the previous 183 Session
Progress message. In response to that, the called party sends a 200 OK message to confirm that it
received the PRACK.
As mentioned before, the 5G networks for the calling and called party will be busy setting up the
resources required for the media flow, and there is a technique used in VoLTE and VoNR called
preconditions. Fundamentally, a precondition is an agreement between the calling and called party
devices that before the called party is even alerted that somebody is ringing them, the calling and
called party start to establish their media bearers. That’s exactly what is happening in this flow. The
called party is not ringing at this point. The idea is to make sure that the correct QoS for the media
flow resources and additional media QoS flows are in place in the respective 5G networks for the
calling and the called party before the called party is alerted. So, UPDATE (SDP Offer) and 200 OK
(SDP Answer) in the signaling exchange are used to set up the preconditions and establish QoS flows.
Once the preconditions are met, it is now time to alert the subscriber. So, the called party device sends
back the 180 Ringing message to say that the called party device is now ringing. So, at this point, the
ringing tone will be heard by the calling party. When the called party answers the phone, a 200 OK
message is sent to the original INVITE message by the called party. Now, the call is in place, and the
last thing to do is just to acknowledge the called party with an ACK message.
VoNR call procedures 183
This is the high-level SIP signaling message exchange in a typical VoNR call establishment. It can be
more complicated, and several iterations of the UPDATE message can be transferred to manipulate
the codecs or other information.
In step 1, the called party passes the SIP invite with SDP to the network and in response, it gets the
183 Session Progress message coming back from the called party. At this stage, P-CSCF in the IMS
analyzes the SPD Offer and SDP Answer, and it knows the full description of the media bearer, IP
address, ports, codecs, and bandwidth requirements.
In step 2, the information from the SDP is extracted and placed into Diameter to describe the media
bearer and be passed up to the PCF.
In step 3, the PCF generates a policy rule and sends it to the SMF. A policy rule describes the required
information, such as the following:
In step 4, the SMF conducts a relevant message exchange with both the Access and Mobility Management
Function (AMF) and the UPF to modify the current PDU session with the PDU Session Modification
procedure. The result of the PDU Session Modification is the establishment of additional QoS flows
to carry voice packets. This procedure happens separately for both the calling and called parties.
The following diagram shows the procedure for tearing down the call:
In step 1, the P-CSCF analyzes the SIP BYE and 200 OK messages, and in step 2, it sends an indication
based on Diameter to the PCF that the VoNR session is ended. Therefore, in step 3, the PCF sends
an instruction to the SMF to remove the policy rule associated with the media flow. Consequently,
in step 4, the SMF will do another PDU Session Modification to tear down the QoS flow. Hence, the
QoS flow is removed for the voice packets, and all that remains is the QoS flow for SIP signaling.
Subsequently, the call is now torn down.
In the rollout of each new technology, there exist some coverage gaps in RANs. So, in these coverage
gaps, the subscribers need to hand over to other technologies for connectivity continuity. This is also
valid for 5G rollouts. As the 5G networks roll out, there will be some coverage gaps that affect the
VoNR subscribers in terms of call continuity. Therefore, some handover techniques from 5G to legacy
networks, such as 4G or 3G, are required.
Finally, interworking might be required due to the utilization of other radio technologies such as
Wi-Fi calling.
The MGCF is responsible for the conversion of SIP signaling to Signaling System No 7 (SS7) or
Bearer-Independent Call Control (BICC) messages that are used by the CS domain networks. IM
MGW is responsible for converting RTP-based voice packets to Time-Division Multiplexing (TDM)
based delivery under the supervision of MGCF.
between the 5GC and 4G core network Evolved Package System (EPS), which requires interworking
between the AMF of 5G and the Mobility Management Entity (MME) of 4G. This interworking is
coordinated by the N26 interface between the AMF and the MME; hence, it needs to be provisioned
in the network.
EPS fallback
Service providers may choose not to carry conversational voice with VoNR in the early 5G standalone
(SA) deployments, even if they have already deployed IMS for VoLTE services. One of the main
reasons for this is the patchy coverage of the 5G network in the initial phase of 5G SA deployments.
Therefore, they choose to continue to provide voice services with VoLTE even if the 5G device is
connected to 5GC. One way of achieving this requires IMS connectivity to both 5GC and the EPS.
IMS connectivity for 5GC is just required for SIP signaling between the 5G device and the IMS. The
following diagram depicts a sample network architecture for EPS fallback. EPS fallback allows fallback
to 4G and conducts a VoLTE call instead of a VoNR call.
In this architecture, the user equipment (UE) is connected to 5GC through 5G RAN, and it has the
default QoS flow for SIP signaling towards the IMS. When the UE initiates an IMS voice call, it will
be released to 4G RAN by gNB with RRC Release with Redirection or with Inter-System Handover.
When the UE attaches to the 4G network, the IMS voice call setup procedure for VoLTE continues.
In this architecture, a similar procedure to EPS fallback is in place. When the UE is connected to 5GC
through 5G RAN, it has the default QoS flow for SIP signaling towards the IMS. When the UE initiates
an IMS voice call, it will be released to 4G RAN by gNB with RRC Release with Redirection or with
Inter System Handover. When the UE attaches the 4G RAN, the IMS voice call setup procedure for
VoLTE continues. In this case, both RATs are utilizing the same 5GC.
Wi-Fi calling
In many VoLTE networks, Wi-Fi calling is already available. This is also called Voice over Wi-Fi
(VoWi-Fi). Therefore, there is no reason for the service providers to deploy Wi-Fi calling together
with their VoNR services by utilizing the common IMS.
All traffic is anchored in the UPF regardless of the RAN that the UE is using. This RAN can be 5G
NR or Wi-Fi. In the VoNR case, the UE utilizes the PDU session and the appropriate QoS flows for
the transmission of SIP signaling and RTP-based voice packets toward the UPF. However, the Wi-Fi
network, which includes the Access Point (AP), must connect to a Non-3GPP Interworking Function
(N3IWF) for security purposes. N3IWF provides direct connectivity to the UPF. Therefore, even
though the UE is on a Wi-Fi network, it can still set up VoWi-Fi call connectivity to the common IMS.
Similar to VoNR, bearers can carry out SIP signaling and voice packets as appropriate.
190 Voice over New Radio (VoNR)
In this section, we have analyzed the necessity of interworking between VoNR-capable networks and
other legacy networks. We’ve seen that the necessity of this interworking is due to legacy subscribers,
coverage gaps, and utilization of other radio technologies.
Summary
In summary, we have looked at some of the key concepts and drivers behind VoNR. Circuit-switched
networks are slowly being phased out and replaced with voice networks supported by IMS call control.
The voice requirements for the 5G system have been defined, so the standard bodies, specifically the
3GPP, have already been looking at what the 5G system needs to support with respect to voice. There
is already a great deal of interest in ultra-high-definition voice services.
We have also looked at VoNR’s high-level system architecture. It is comprised of three elements: the
5G access network, the IMS, and Policy and Charging Control (PCC). With respect to the 5G access
network, we have looked at some key elements such as the gNB, UPF, AMF, SMF, and UDM. Regarding
IMS, we have seen there are elements such as CSCFs, HSS, SCC, and TAS.
We have also analyzed VoNR’s initial procedures. Before making and receiving calls, the VoNR
subscribers must conduct these initial procedures, which include establishing resources in the 5G
network and registering with the IMS. The result of the overall procedure is the establishment of a
PDU session. In that PDU session, we have a QoS flow used to carry SIP signaling to the IMS.
We have seen that the 5G access network, the IMS, and PCC are required for the VoNR call procedures.
We have discussed voice packets being carried within the RTP, and the payload of that RTP being
the adaptive multi-rate codec or the enhanced voice services codec. Then we looked at the SIP
signaling exchange. We have seen that the INVITE and the 183 Session Progress messages need to
be exchanged so that we can swap the SDP Offer and SDP Answer. We have also analyzed INVITE,
Summary 191
PRACK, UPDATE, 180 Ringing, and 200 OK messages. Moreover, removing the QoS flows at each
leg of the call has been covered.
Finally, we have discovered the fact that interworking needs to occur with the PSTN or 2G-3G voice
networks and even for VoLTE. We have analyzed interworking with legacy voice networks, PS handover
from 5G to 4G, SRVCC, EPS, RAT fallbacks, and Wi-Fi calling.
In the next chapter, we are going to learn about different deployment scenarios of 5G networks. We
are going to discuss different architecture options for SA and NSA networks, which are mainly options
2, 3, 4, 5, and 7. We are also going to discuss different strategies for how Mobile Network Operators
(MNOs) can make the transition from Non-Standalone (NSA) to Standalone (SA) networks.
Part 2:
5G Network Design,
Deployment Models, and
Advanced Use Cases
This part of the book will cover the deployment options that are best suited for particular use cases, as
well as various applications of 5G technology. Next, it will glance at the operational and maintenance
aspects of these 5G networks and how they work with fixed wireline and satellite technologies. This
part of the book brings together the theoretical and practical aspects of 5G, enabling you to use it as
a handbook for deploying a 5G network with a range of enterprise applications.
This part of the book comprises the following chapters:
NSA deployments help MNOs provide an Enhanced Mobile Broadband (eMBB) service, which
delivers high data bandwidth and reliable connectivity. With the help of NSA architecture, 5G
networks can be quickly deployed with Next Generation NodeBs (gNBs) by utilizing the existing 4G
infrastructure. NSA basically allows MNOs to offer 5G speeds with the 4G EPC without the need for
the 5GC. Therefore, NSA deployments have been a popular choice within many 5G rollouts so far:
The second deployment approach is the SA architecture. The SA architecture consists of only one
generation of radio access technology used, with only one core network at the same time. The mobile
is either connected to the 4G RAN with the 4G EPC, which is the existing 4G deployment, or it is
connected to the 5G RAN with 5GC. In this architecture, there is only one generation of radio access
technology connected to a core network via both the control plane and the user plane. From hereon,
we will evaluate SA architecture in the context of the 5G deployments.
In 5G SA architecture, the mobile doesn’t depend on the 4G infrastructure as NSA does, where it
depends on 4G from the control plane. Moreover, with the employment of 5GC, SA architecture supports
all three use cases of IMT-2020, which are eMBB, Ultra-Reliable Low-Latency Communications
(URLLC), and Massive Machine Type Communications (mMTC). Therefore, 5G SA architecture
is the target architecture for MNOs in the long term.
5G network deployment architectures 197
The following is a general comparison of the 5G radio access and core networks (https://www.
gsma.com/futurenetworks/wp-content/uploads/2018/04/Road-to-5G-
Introduction-and-Migration_FINAL.pdf):
Let’s talk more about those two architectures and focus on the main advantages and disadvantages
of each one in a bit more detail.
Now, let’s talk a little bit more about this dual connectivity concept.
Dual connectivity is also called Multi-Radio Access Technology Dual Connectivity (MR-DC). The
technical details of MR-DC can be seen in 3GPP’s TS 37.340. MR-DC is a functionality for which
multiple Receivers (Rx) or Transmitters (Tx) for mobile are configured to use radio resources from
two radio access technologies. With MR-DC, the radio resources are scheduled for the mobile by two
different schedulers, one from the eNB and the other from the gNB. In this architecture, the eNB is
the master node that provides access to the control and user planes between the mobile and the core
network, whereas the gNB is the secondary node and only provides access to the user plane. Both the
gNB and eNB should be connected by a network interface, which is usually X2 in an NSA configuration.
This interface carries the control plane between the gNB and eNB since in the NSA configuration 5G
mobiles are not connected to the gNB for control signaling. So, these are the conditions required to
make dual connectivity work properly in the NSA mode.
To sum up, mobiles get connectivity and access the user plane from two different network nodes,
getting LTE access from the eNB and NR access from the gNB. So far, we talked about the network
perspective. Note that dual connectivity must be supported by mobiles as well.
5G network deployment architectures 199
SA network architecture
So, what about the SA network architecture? SA refers to having an independent network and consists
of only one generation of radio access technology, so mobile users can either use the 4G RAN and the
EPC, or can use 5G NR and 5GC. In the case of 5G SA architecture, the connection to the 5G network
does not rely on the 4G network as is the case with NSA architecture. 5G SA architecture provides
both the control plane and the user plane for 5G mobiles.
The following figure depicts 4G and 5G SA structures. As can be seen on the left, the mobile is
connected to the EPC via the eNB with the control and user planes whereas, on the right, the mobile
is connected to 5GC via the gNB with the control and user planes:
In 5G, we have a new air interface, which is 5G NR, and we have a new cloud-native 5G core network,
so the 5G SA setup is a simplified RAN architecture. The SA architecture is the target solution for 5G
and it is a simple solution for MNOs to manage. 5G SA architecture, coupled with the cloud-native
5GC, will help MNOs support IMT-2020 use cases such as eMBB, URLCC, and mMTC while providing
a better end-to-end user experience. However, for this target, we need 5GC and we need to have good
5G coverage for an uninterrupted connection experience.
So far, we have examined the general structure of SA and NSA architectures. Within those two
architectures, there are different options defined by 3GPP that belong to either SA or NSA. Let’s have
a look at those options.
200 5G Deployment Options
So these are the main differences – we will not go deep into the details of the other differences between
these architectures. Let’s now have a better view of the options from the SA and NSA perspectives.
SA options
There are three main variations of SA options within the 3GPP 5G deployment options. Firstly, Option
1, which wasn’t mentioned previously, uses an eNB and the EPC. This is the existing LTE network and
it is an SA architecture. Option 2 uses 5GC with a gNB:
The different 5G deployment options defined by 3GPP 201
Note that this is the target architecture for 5G deployments as an SA option, considering there will
be enough 5G coverage. The last main SA architecture is Option 5, which uses 5GC together with
an ng-eNB.
NSA options
Option 3 (with 3a and 3x) is one of the most popular NSA options for 5G deployments, as we discussed
already. Option 3 utilizes the EPC as the core network, and it consists of the eNB as the master node and
the gNB as the secondary node. The importance of this option is that it helps MNOs to quickly deploy
and commercialize 5G with smaller CAPEX compared to an end-to-end 5G network deployment. The
drawback of this option is that it limits the IMT-2020 use cases to eMBB only. However, MNOs have
the opportunity to exploit a broad bandwidth range of 5G, some NR features, and massive Multiple
Input Multiple Output (MIMO) capabilities, which result in greater user throughput in total.
So, let’s move to the next option, which is Option 7 (with 7a and 7x). So, with this option, 5GC is
introduced and connected to both the ng-eNB and gNB. Note that here, we don’t use a regular eNB –
rather, we need to use an ng-eNB, which supports the 5GC protocols. With this option, the ng-eNB
is the master node and it provides access to the control plane and user plane. The secondary node is
the gNB, which is connected to 5GC for the user plane only.
The last NSA option is Option 4 (with 4a) and it is an evolution of Option 7. With this option, we
also have 5GC as we have in Option 7. The main difference between Option 7 and Option 4 is that
in Option 4, the gNB is the master node and the ng-eNB is the secondary node. Remember that the
master node provides access to the control and user plane while the secondary node only pertains
to the control plane:
The most important plane is the control plane because control plane signaling is a prerequisite for
mobiles to attach to the network. If the mobile does not achieve control plane signaling, then there
will be no user plane. Therefore, whether an MNO should opt for Option 7 or Option 4 depends
on the existing 5G coverage. Remember that the master node in Option 4 is the gNB, which means
gNBs are responsible for providing access to the control and user plane whereas, in Option 7, the
ng-eNB is the master node responsible for the control and user plane. Therefore, there should be wide
5G coverage for an MNO to opt for Option 4. If this is not the case and the MNO has a mature 4G
network, Option 7 would be a better choice.
As can be seen from the table, Option 3 and Option 7 are the choices for the transition to Option 2.
With Options 3 and 7, core network interworking is not required. However, forward compatibility
with SA architectures and with Release 16 onward is low or medium for Options 3 and 7, which also
makes these options temporary network architectures to pave the way to Option 2.
In this table, we can see that Option 3 is the low-cost deployment option for MNOs to quickly
commercialize 5G networks. With Option 7, the cost is high compared to Option 3 due to the
implementation of 5GC.
So far, we have examined SA and NSA network architectures. Let’s now move on to the possible
migration strategies for MNOs to move from 4G to 5G and from which options they should migrate
first to ensure to fully exploit the 5G capabilities and use cases.
4G to 5G migration strategies
The evolution from 4G to 5G can vary depending on an MNO’s existing network status and strategy.
First, remember that the control plane and UE signaling are managed by the master node, the eNB in
NSA architecture with Option 3, while it is managed by the gNB in SA mode with Option 2. Since 5G
coverage is very limited in the initial stage of 5G rollouts, the control plane is managed by eNBs with
nationwide 4G coverage, and as the 5G coverage expands, the control plane can then be managed by
gNBs. So, this is the essential consideration behind the 4G to 5G transition and migration strategy
from an MNO’s perspective:
204 5G Deployment Options
Before introducing 5G, we assume that an MNO has an existing 4G network, covered by Option 1,
which comprises an eNB and EPC. As discussed previously, Option 3 can be quickly deployed by
upgrading the existing 4G nodes and deploying 5G gNBs, so the introduction of 5G with Option 3
helps MNOs quickly commercialize 5G with a quick time-to-market and low CAPEX. However, since
there is no utilization of 5GC, MNOs are limited to only providing eMBB services to their customers,
but they will still provide very high user throughput due to the wide range of bandwidth for 5G and
NR features.
The next step for an MNO can be to switch to Option 7 by utilizing 5GC. As we have discussed
previously, with Option 7, ng-eNBs are the master nodes providing access to the control and user
planes. That means if you do not manage the control plane with gNBs, then you cannot fully exploit
all the use cases even if you deploy 5GC. For instance, the URLCC use case has stringent network
delay requirements. That means that to meet this requirement, you need to carry the control plane on
gNBs and not on ng-eNBs because Option 7 requires the control plane carried by the ng-eNBs and
forwarded to gNBs, which causes additional delays.
So, the question is why would an MNO prefer Option 7 then? There are two reasons:
• The first one is there is still not enough 5G coverage nationwide and the MNO just wants to
boost the user throughput and experience in hot-spot areas with 5G.
• The second one is the device ecosystem. More 5G SA devices and mobiles will be released day
by day and MNOs should improve the customer experience with improved 5G services related
to a 5GC deployment.
4G to 5G migration strategies 205
The other option for an MNO is to deploy Option 2 only for local use cases with good 5G coverage and
with 5GC to fully exploit 5G use cases. For instance, the MNO can deploy 5G SA options in stadiums
to provide different 5G services, such as augmented and virtual reality. As another example, it could
be a smart factory where the URLLC use case is fully exploited.
The next migration exists by stepping into Option 4 when there is nationwide NR coverage. With
this option, gNBs will be the master nodes managing the control and user plane. Therefore, 5G use
cases and features such as URLLC, network slicing, or mMTC services would be fully exploited. The
advantage of Option 4 here is to support 4G mobiles and devices as well.
As a very long-term strategy, MNOs can switch to Option 2 solely nationwide and start releasing
the 4G network step by step. This very long-term strategy depends on the existing frequencies and
bandwidths that MNOs are working with. There are two things to consider here when releasing 4G
networks. First, how will nationwide coverage be provided? As we already know, 5G networks are
usually deployed on mid-bands and mmWave. To provide nationwide coverage, MNOs need to utilize
low 4G FDD frequencies for 5G or deploy numerous mmWave sites, which results in a high level of cell
densification and therefore a high level of energy consumption. The second thing to consider is there
will still be solely 4G-supported devices around many years from now, as we still have 2G phones in
use today. So, even if MNOs switch to Option 2 for 5G with nationwide coverage, they will still need
to have 4G networks to support their customers.
The following table is a high-level overview of the analysis of different migration steps – what we
have discussed so far with a few additions (https://www.gsma.com/futurenetworks/
wp-content/uploads/2018/04/Road-to-5G-Introduction-and-Migration_
FINAL.pdf):
Now, we have evaluated the different network deployment options. We either referred to the 4G core
as the EPC or 5GC for 5G. In the next section, we will cover some of the motivations for the evolution
of the EPC to 5GC at a high level and will compare the main differences between the EPC and 5GC.
Figure 9.12 – The main differences between the EPC and 5GC
In this comparison table, we can see that leveraging the EPC as a core network is just a temporary
solution for MNOs to quickly deploy a 5G network. However, in this case, the 5G services provided
will be limited to eMBB services. For instance, with EPC, there will be limited support for network
slicing, which is a crucial concept in 5G deployments.
208 5G Deployment Options
Summary
In this chapter, we discussed two different 5G network deployment architectures, which are called NSA
and SA. We’ve also seen different deployment options that were determined by 3GPP by comparing
the architectures of the networks and the differences between the nodes utilized from the perspective
of the control plane and user plane.
With the knowledge we gained, we made some suggestions for MNOs on what the possible migration
strategies from 4G to 5G could be in the future.
We finalized the chapter by analyzing the evolution of the EPC to 5GC with the main comparison
between them made from the perspective of 5G deployments and IMT-2020 use cases.
In the following chapters, we will analyze the NSA and SA network architectures in more technical detail.
10
5G Non-Standalone Networks
The initial trials for 5G networks started as early as 2018, and by 2019, many tier-one operators already
had some presence of 5G in their networks. Therefore, the race among service providers to introduce
a 5G presence was substantial. The 3GPP standards body already anticipated this; hence specifications
were written to enable an architecture that would ensure faster rollouts of 5G. This provision was in
the form of 5G Non-Standalone (NSA) networks.
In this chapter, we will dig into the details of what an NSA network really means and ask, how is an
NSA network designed? What are the various technical aspects of this architecture and what are the
various types of NSA networks?
In this chapter, we’re going to cover the following main topics:
This diagram shows what a typical deployment of NSA looks like. There is an existing Long-Term
Evolution (LTE) evolved NodeB (eNB), which is connected to an existing 4G Evolved Packet Core
(EPC) core network. Now, this is augmented by 5G gNodeB (gNB) New Radio (NR) coverage.
Another way to look at this scenario is that in a service provider’s existing LTE coverage area, a new
5G NR is introduced to increase capacity. This 5G radio is controlled by a master 4G eNB, which in
turn is connected to the 4G core network EPC depicted by the dotted line. There is no 5G core network
involved here. All the control plane signaling from EPC to gNB NR is handled by the master eNB.
Hence the secondary gNB is completely managed by the master eNB, so it cannot stand alone, thus
the name NSA. Since there are two radios involved, the connectivity is also called dual connectivity
(E-UTRA NR-Dual Connectivity (EN-DC)).
Therefore NR is only a secondary node that is completely controlled by the master eNB. The data
plane, however, can be tunneled via S1-U directly from the Serving Gateway (SGW) in the EPC gNB.
When User Equipment (UE) is in the coverage area of this gNB, it is connected to a 5G radio, but at
the backend, the 4G core network is still leveraged.
The other two options of the same flavor are options 3 and 3a, as shown in the following diagrams:
The last item in the preceding list brings us to another new concept of split bearers, which answers
the question of how data is split to go to the gNB and eNB.
This brings us to the introduction of a few new terms:
Let’s define each of the terms from the diagram one by one:
• MCG bearer: The Master Cell Group (MCG) bearer in DC is a bearer whose radio protocol
stack is only located in master nodeB and only uses the master nodeB resources. The S1-U
connection to the SGW is terminated in the master node itself; the secondary node is not
involved in the direct transport of data to the EPC.
• SCG bearer: The Secondary Cell Group (SCG) bearer in DC is a bearer whose radio protocol
stack is only located in the secondary node to use secondary nodeB resources. In this case,
there is an S1-U connection from the secondary node to the SGW; hence there is a direct path
for data to pass to the EPC from the secondary nodeB.
• Split bearer: This is a combination of the previous two bearers, in which the bearer’s radio
protocol stack is located in both the master and the secondary nodeB.
This pictorial representation of these split bearers will help to further enhance our understanding:
A deep dive into NSA networks 213
One practical use case of this scenario is the implementation of voice and data networks in a particular
coverage area. This can be implemented using option 3x because the lightweight voice (Voice over LTE
(VoLTE)) traffic can leverage 4G eNB and the heavy-weight data service is provided by the 5G NR.
In this section, we were introduced to the basic concept of NSA networks and the terms related to it.
In the next section, we will see the various options for NSA and Standalone (SA) networks.
Network Type Connectivity Core Network Master RAT Secondary RAT 3GPP Term
Option
Standalone Option 1 EPC LTE - LTE
Standalone Option 2 5GC NR - NR
Non-Standalone Option 3 EPC LTE NR EN-DC
Non-Standalone Option 4 5GC NR eLTE NE-DC
Standalone Option 5 5GC eLTE - eLTE
Non-Standalone Option 7 5GC eLTE NR NGEN-DC
We can see that 5G can be rolled out in various combinations of cores and radios; some of them are
SA options (which we will explore in the next chapter), and some of them are NSA options:
• Option 1 is an SA option that denotes a 4G network, comprising 4G RAN and 4G packet core
with no secondary radio.
214 5G Non-Standalone Networks
• Option 2 is an SA option comprising a 5G core and 5G radio. This is also a popular deployment
option across service providers. This also does not have a secondary radio, hence SA.
• Option 3 is an NSA option. This comprises a 4G packet core connected to a 4G radio as the master
node and a secondary 5G radio. This is a popular NSA deployment choice among operators.
• Option 4 is an NSA option with a 5G packet core connected to a 5G radio as master and a
secondary enhanced LTE eNB, which is an eNB that can connect to a 5G core; it is primarily
used to serve a 5G device over 4G radio.
• Option 5 is an SA option with a 5G core connected to an enhanced LTE radio.
• Option 7 is an NSA option with a 5G core connected to a master enhanced LTE radio and a
secondary NR node.
• Option 4, option 5, and option 7 benefit the service providers and their subscribers to continue
using legacy 4G equipment while connecting to 5GC.
Next, we will review one of the most popular NSA network architectures.
When considering the requirements to implement an option 3-based NSA design, the following are
some key aspects to take into account:
• 5G option 3 capable UE
• An existing 4G packet core
• A 4G master eNB
• A 5G secondary NR
• X2-C denotes the signaling interface between the master and secondary radios
• X2-U denotes the data interface between the master and secondary radios
• S1-U is the data path between the radio and EPC
• S1-MME is the signaling path between the radio and EPC
One of the benefits of the preceding architecture is that it would be capable of servicing both 5G and
4G customers using the same infrastructure. As noted in the first bullet, to access a 5G network, an
appropriate 5G device is needed. Hence when an operator rolls out a 5G network, it would need to
wait for its subscribers to procure a 5G-capable device to be able to connect to the network.
Higher data rates of multiple Gbps per UE can be supported. Use cases such as fixed wireless and
mobile broadband can be implemented via this deployment option. Millimeter wave (24-52 Ghz)
frequencies can be supported, which would result in very high peak data rates.
Consider a scenario using the preceding diagram; the UE denoted here is a 5G UE, the blue area
shows 4G coverage by eNB, and the yellow area shows 5G coverage. When the UE is in the blue area
on the left, it detects a strong 4G signal and latches onto the 4G radio, and connects to the 4G packet
core in the backend. However, when the UE moves to the yellow area denoting 5G coverage, the UE
gets a strong 5G signal and latches onto the gNB, which is connected to the same EPC. Hence the UE
can use 5G radio using the same existing packet core. This substantially reduces the time to market
for operators to launch 5G.
It should be noted that the NSA network is capable of supporting only a subset of use cases. Mission-
critical use cases cannot be supported by this option.
It is important to consider another two aspects of network evolution as we move to 5G (not mandatory
for option 3 NSA, but good to have):
The tendency has been to move toward a Control and User Plane Separation (CUPS)-based network.
What that essentially means is the separation of control and data plane across the network in the
various nodes. The key nodes here are the SGW and Packet Network Data Gateway (PGW) in the
216 5G Non-Standalone Networks
EPC, to be split into SGW-c, SGW-u, PGW-c, and PGW-u. Similarly, on the radio side, CUPS can be
achieved. The reason behind this design choice is to make more processing power available to support
faster data rates by decoupling control plane responsibilities, hence resulting in a faster speed.
Virtualization has been key in network function implementation since the beginning of the last decade.
It was successfully adopted in later deployments of 4G networks where the appliance-based network
elements were migrated to virtualized ones. This not only reduced the CAPEX but also increased
capacity in the network, as deployments were now commercially available off the shelf, as compared
to the earlier expensive custom appliance-based deployments, but it also reduced the time to market
as it adopted advanced orchestration and network automation techniques for deployment.
Now, considering the favorite choice of operators has been to start with option 3 for initial rollouts
of 5G, let us go over the various migration paths available to them, as shown in the following table:
EPS to NSA option 3 Limited support for 5G use cases • Leverage existing
LTE network
• Rapid time to market
• Features limited to 4G
core, hence advancements
of 5G core are absent
• Procedures are based
on EPC
• Voice can be
supported by existing
VoLTE infrastructure
A deep dive into NSA networks 217
NSA option 3 to NSA All 5G use cases can be supported • Migration of core network
option 4/SA option 5 should be accounted for
• 5G core benefits can
be leveraged
• EPC needs to be retained
• Wide area NR can
be supported
• IMS voice can
be supported
• No CS interworking
from 5GS
NSA option 3 to SA Full set of 5G use cases can • Packet core migration
option 2 be supported needs to be accounted for
• EPC needs to be retained
• Wide area NR can
be supported
• IMS voice can
be supported
• No CS interworking
from 5GS
NSA option 3 to NSA Full set of 5G use cases supported • Core migration needs to
option 4/SA option 2 be accounted for
• Initially limited use
cases until 5GC is
fully operational
• Impact on NR and LTE
during migration
• IMS voice supported
• No CS interworking
with 5GS
The following diagram shows 5G deployment options mapping into spectrum bands:
218 5G Non-Standalone Networks
The current 4G deployments leverage low bands of the spectrum, which are sub-1 GHz and 1–3 GHz, as
shown in the preceding figure. Then comes 5G NR, which is deployed in the mid bands of 3.5–8 GHz;
this greatly augments the capacity of the network and can support higher data rates and low-latency
use cases. NR in mmWave, along with existing wide area LTE RAN, ensures both good coverage and
high throughput and serves subscribers with both 4G and 5G UEs. High-band NR (mmWave) with
a 24–40 GHz downlink can be leveraged to further add capacity.
With the deployment of a 5G core, option 2 comes into play. This is initially the case, in the mmWave
spectrum and mid bands for fixed access, but later, when the LTE spectrum can be re-farmed, it can be
extended to cover wider areas. In this case, tight interworking with LTE can ensure seamless handover
between 4G and 5G during UE mobility.
1. Consider DC-capable UE that moves into the coverage area of a 5G NR radio; the UE sends an
Attach Request message to the master eNB, and the Packet Data Network (PDN) connectivity
request has a UE Network Capability field with a Dual-Connectivity with New Radio
(DCNR) flag on.
2. Since all signaling is handled by the master eNB, it sends the S1 initial UE message to the
Mobility Management Entity (MME), which contains the Attach Request and PDN Connectivity
Request with the DCNR bit on.
3. After a successful authentication procedure, a Diameter Update Location Answer message
is sent to the Home Subscriber Server (HSS) by the MME. This message contains the NR as
Secondary RAT field, which indicates the intention of the UE to leverage the 5G NR.
220 5G Non-Standalone Networks
4. The HSS responds positively as the UE has the plan for 5G use and also sends the bitrates. Note
that for 5G use, additional fields called the extended max bit rate have been included, which
support Gbps bitrates.
5. The GTPv2 Create Session Request is sent from the MME to the SAEGW-C (a combination
of SGW and PGW control plane nodes). This request also includes the DCNR field.
6. The SAEGW-C then sends the Diameter Credit Control Request-Initial (CCR-I) message to
the Policy and Charging Resource Function (PCRF). This message contains the request for
Extended APN-AMBR values needed to support higher 5G speeds.
7. The PCRF responds with a Diameter Credit Control Answer-Initial (CCA-I) message with
the necessary policies in addition to the 5G AMBR values.
8. In this step, the SAEGW-C sends a PFCP Session Establishment Request to the SAEGW-U.
This message is relevant here as it depicts a CUPs-based architecture with control and user
plane functions separated in the SGW and PGW. The PFCP Session Establishment Request
message is used to inform the user plane about the parameters and packet handling rules of this
particular session for this UE so that the user plane is able to handle the packets accordingly.
The user plane function responds with a PFCP session establishment response; this message
contains a success code or an error code in case any of the rules have failed to apply.
9. The PFCP Session Modification Procedure is then carried out and the SAEGW-C sends a
PFCP: Session Modification Request with the SAEGW-U. Any earlier rule can be updated
or removed during this procedure.
10. The Create Session Response is then sent from the SAEGW-C to the MME, which contains an
acknowledgment of the successful or unsuccessful session setup with an appropriate response
code. This also contains the 5G-like APN-AMBR values.
11. The MME then sends an Initial Context Setup Request with the NAS container with Attach
Accept to the master eNB. This again contains the new 5G parameters of Extended UE Aggregate
Bit Rate Uplink and Downlink.
5G NSA – option 3 call flows 221
12. The Attach Accept is then sent to the UE from the master eNB.
13. The MME then sends an Initial Context Setup Response containing the F-TEID of master
node eNB.
14. The UE sends a NAS message with Attach Complete and Activate Default Bearer Accept to
the eNB, which is carried transparently to the MME.
15. The MME then sends a Modify Bearer Request; this message contains the F-TEID information
received from the eNB in the Initial Context Setup Response message:
222 5G Non-Standalone Networks
16. The SAEGW-C then sends the PFCP: Session Modification Request message to the SAEGW-
U. This message contains the F-TEID information received from the eNB. The user plane then
sends the PFCP: Session Modification Response with the F-TEID of the user plane.
17. The SAEGW-C then sends the Modify Bearer Response to the MME with the F-TEID
information, which is sent to the radio.
18. Once the tunnel information is exchanged, the data path is set up and the UE can access it.
The following call flow indicates the addition of a 5G secondary node.
19. The master eNB sends an RRC Connection Reconfiguration message to the UE. This message
assigns radio resources to the UE:
5G NSA – option 3 call flows 223
224 5G Non-Standalone Networks
20. The UE extracts NR information from the LTE RRC Connection Reconfiguration message.
The UE also extracts the NR RACH configuration information and C-RNTI for 5G access. It
then prepares the RRC Connection Reconfiguration Complete message and sends it to the
master eNB. This message also contains the NR RRC Reconfiguration Complete message
meant for the secondary gNB.
21. The master eNB then sends the NR RRC Reconfiguration message received from the UE to
the secondary gNB via the X2AP SgNB Reconfiguration Complete message. At this point,
the eNB starts copying data to the gNB.
22. The master eNB informs the gNB about the PDCP sequence number and the HFN for all the
bearers, which are transferred to the 5G NR gNB.
23. The SGW can now send data to the MN-eNB. The master eNB keeps forwarding the data to
the secondary NR gNB.
24. Since the UE has not yet established the data path, the gNB is buffering the data it receives
from the packet core.
25. The master eNB then sends an S1AP E-RAB Modification Indication request to the MME,
which notifies the MME that the data bearer is being switched from 4G-eNB to 5G-NR.
26. The MME updates this information with the SGW via a modify bearer request. The data path
is now switched from the eNB to the gNB.
Advantages and shortcomings 225
27. The response is then sent to the MME indicating a successful or an unsuccessful path switch.
28. The master eNB then sends an End Marker Packet to the eNB. This marks the end of the
transmission to the secondary 4G-eNB. All packets henceforth will be handled by the 5G-NR-gNB.
29. MME sends an E-RAB Modification Confirmation message to the master eNB.
30. Data now flows to the secondary 5G-gNB.
This concludes a typical option 3-based call flow. It is crucial to understand the details of these
procedures to be able to design and implement an NSA network.
Similarly, there are further details available in the specifications for specific call flows for the other
deployment options, which can be referenced for further reading.
Summary
We have seen by now that the push for NSA networks comes from the strong desire of the industry
to accelerate the standardization of NR architecture so that the time to market can be cut down. The
greatest advantage is the ability to leverage existing legacy network infrastructure.
NSA access was standardized in 3GPP Release 15 in December 2017.
In this chapter, we have covered a typical NSA network in detail. We have discussed the different
bearers such as MCG, SCG, and split bearers. We have also explored the other available deployment
options and their key features.
We explored the various migration paths from the EPS network to 5G and finally, we delved into
a detailed 5G-NSA call flow. We concluded the chapter by briefly discussing the advantages and
disadvantages of the NSA network.
In the next chapter, we will learn about the design and implementation of a typical 5G SA network
and delve into the details of its procedures.
11
5G Standalone Networks
In this chapter, we will understand the essentials of a standard 5G Standalone (5G SA) network’s
design and deployment.
We will go through the specifics of designing a 5G SA network from scratch, as well as understand the
requirements for implementing a standalone network and the use cases that can be realized with it.
We will also go over the adoption of 5G SA options in private (non-public) networks and the design
considerations involved.
In a nutshell, we will cover the following topics:
and so on. The standalone architecture is completely free of the baggage of legacy telecom networks.
It is a fully virtualized service-based architecture, cloud-native, and built for scale, resilience, and
speed. This new microservice-based infrastructure ushers in the scope of automation in deployment,
operations, and maintenance. This, in turn, results in speedy deployment of the network and ease of
maintenance. Automation also comes in handy to onboard new use cases tailored to suit an enterprise’s
needs while at the same time driving down costs significantly.
As the 3GPP has standardized the cloud-native approach of 5G SA networks, this has provided room
for innovation and for open source communities to thrive, thus helping advance the unprecedented
pace of network enhancements.
The following illustration shows what a commercial 5G macro network would look like:
This model of deployment also opened up possibilities for mobile network operators to choose between
a variety of options, ranging from an on-prem private cloud-based model to a public cloud or hybrid
model that meets both options halfway.
In this section, we have been introduced to the 5G SA network. In the upcoming sections, we will
delve into details of the fundamentals of designing such a network.
enhancements in the routing domain that have reduced the latency of such carrier backhaul networks
immensely. Two such examples are the emergence of segment routing and the SD-WAN networks.
These highly intelligent and programmable networks can transport large volumes of data with minimum
delay and high accuracy.
Essential precursors
In this section, we will go over the most important considerations to keep in mind when designing
a network. As the 5G technology provides unprecedented levels of flexibility in design, it also brings
in the chance to overbuild or underbuild the network, or to build a network that is not suitable for
its intended purpose. For example, if a network does not need support for edge use cases, there is no
point in investing in an edge data center.
To begin with, the following are some of the fundamental questions that should be answered to build
a network that would be built-to-purpose, robust, and resilient. These questions are usually answered
in a requirements-gathering workshop between the mobile network operator architecture teams and
sometimes include the various vendors supplying the necessary components:
The preceding figure explains a few possible ways of laying out a data center. For example, in
a large macro 5G network, the mobile network operator may choose to host certain analytics
engines, automation engines, and more in a public cloud. Then, for a large geography, the
service provider network can be further subdivided into national data centers, regional data
centers, near-edge data centers, and far-edge data centers. The national data center can host
control plane functions centrally, especially the ones that are not sensitive to latency. Then,
regional data centers can have user planes that can cater to low-latency requirements. Near-
edge data centers can host centralized components of the distributed RAN and far-edge data
centers can host the radio heads. Though it is completely possible to co-locate most of these
data centers, it’s a best practice to segregate them. This will help in building the capabilities of
geo-redundancy as multiple data centers of each kind can serve as backup servers in case of
one data center failure.
• Does roaming need to be supported?
Roaming is a need for macro networks deployed by service providers as an end subscriber
coming in from another location may need access to the network. However, it is not necessary
to have a roaming design for enterprise networks such as an IoT network or a factory floor
as there won’t be a possibility of device mobility outside of the region. Hence, the investment
in SEPP that may be necessary for supporting a robust roaming architecture can be avoided.
• Does it need to support enterprise networks?
Most service providers have a requirement to support enterprise networks. The most important
concern for enterprises is their data security and isolation. Hence, while planning support for
enterprise networks in a macro environment, considerations should be made about how to
implement a VPN and how to separate the traffic of each enterprise not only in the routing
domain but also end-to-end in the data center.
• Does it need to interact with legacy networks?
Interworking is a key aspect of network design. If the network needs to support seamless
handover between 4G and 5G, considerations can be made about implementing an N26 interface
between MME and AMF, which would lead to faster handovers while increasing the complexity
of the network greatly in terms of configuration, call flows, debuggability, and maintenance.
• Does it need to interwork with Wi-Fi?
Wi-Fi is a great augmenting technology as it takes the load off a mobile network operator.
Voice and video calls over Wi-Fi have been supported widely since 4G networks. However, to
interwork seamlessly with Wi-Fi, an interworking function needs to be introduced that would
act as the gateway between Wi-Fi and mobile network traffic, also translating the control plane
signaling between the two for compatibility.
• Does it need to support network slicing?
Network slicing is a great feature introduced in 5G. It has caused a lot of excitement in enterprises,
many of which are requesting a separate slice for their traffic.
232 5G Standalone Networks
Now, supporting network slicing not only requires the necessary software in the NFs but also
a whole new level of investment in automating the slicing mechanism and implementing the
slicing architecture. Hence, the service provider would also need to invest in slicing software
(automation) in addition to the regular network function it needs to run a 5G network.
• What is the current capacity of the IP backhaul?
All the data that is sent from the gNBs to the user plane function and the internet would need
to go through some kind of IP backhaul. An increase in user traffic would need a larger capacity
of that backhaul network. Hence, the mobile network operators would need to invest greatly in
increasing the capacity of the network and also onboarding newer technologies such as segment
routing and SD-WAN for intelligent and faster convergence of the network.
• What is the nature of the geographic area that needs to be covered?
The geography and population distribution in a region determine the design of the data center.
A thickly populated region would need more compute muscle than a thinly populated region.
For example, if a country has north, south, east, and west zones and for some reason, the north
zone has only one-fourth the population of the east zone, there is no use building a similarly
sized data center in the north and east. A better design would be to concentrate the computer
power in the east and keep the north region a lightweight one.
• What is the projected data usage and type of network data consumed for the particular
geographic area?
The type of data consumed is also very important. Various data profiles such as video streaming,
voice/video, and file transfers have different requirements from the network. For example, while
packets per second are high for video calls, the data size of each packet is small. However, for a
file download, the size of each packet would be high and the packets per second would be low.
The higher packets per second will demand a higher tax on the CPU, so the number of CPUs
in a server should be scaled accordingly.
• What are the redundancy and failure requirements? What is the maximum tolerable limit for
a data outage in case of a network component failure?
For any network, one of the key aspects of it being usable is that it must be reliable. Most
networks guarantee five 9’s in terms of availability, which means a network targets to attain
99.999% availability. In addition to this, it is important to understand what the maximum
duration of an outage is tolerable in case of failure; in that case, a redundancy design can be
made. Geo-redundancies are slower but sometimes more cost-effective compared to building
local redundancy at each data center, which has many times faster convergence time.
• How is the network going to be monitored?
Once a network has been deployed, the major task is to monitor the network for failures. The
larger the network, the more complex it can be as there would be thousands of alarms every
second, ranging from minor to critical ones that can cause revenue loss. Hence, it is a good
5G SA network design fundamentals 233
idea to build intelligence to correlate alarms and flag only the ones that can cause a loss in
revenue; the others can be addressed in time. Many operators have built-in software that can
automatically check the contents of the alarm and automatically raise tickets with the concerned
vendor. Such systems enhance the manageability of the network greatly.
• How is the network going to be maintained and upgraded?
Once a large network has been deployed, the next concern is its maintainability. Upgrades on one
component can adversely affect the functioning of another and can cause service loss. Hence, it
is important to create a dependency chart and automate the feasibility analysis of an upgrade.
• How are faults going to be reported?
Reporting faults is critical to the performance of the network. If faults are reported promptly and
acted upon in time, it can save outages. A lot of third-party software is available that processes
logs and alarm data to prune out the potential issues that can cause an outage predictively.
• How is the network going to be scaled in or out?
Network scaling is largely an automated task nowadays. It is possible to automate a network
controller that can proactively determine the usage of each of the network applications and
hardware, and when the usage is above a certain threshold, it can spawn new nodes. At the
same time, if a certain application is underutilized, it can scale down to free up computes.
Hence, scaling in and out can be an on-the-fly operation with some added manual inputs from
operators in the final stages.
• How is the network going to be tested?
It is a valuable investment to onboard a network-testing framework right from the time of an
early proof of concept or lab testing. Such a testing framework can not only test the individual
network component but the entire network as a whole. Performance and regression tests can
be scheduled at predefined intervals so that defects can be caught well before they are found
in production.
The answers to these questions will certainly iron out most of the design requirements.
Next, we will go over the basic components needed to complete a call in a 5G SA network and how
they interact with each other to register a device and establish a Protocol Data Unit (PDU) 5G session.
In the preceding figure, we have depicted two mobile phone users, John and Jane. Both have the
latest 5G handsets and are ready to make a call to each other. In Chapter 2, End-to-End Architecture
Components, Concepts, Security, and Transport, we learned about the functionality of each of these
NFs in detail. Now, let us go over the high-level steps that will take us through the procedure of a data
call after the UE has been powered on.
The UE registration process is the way the UE gains access to the network. It is the way the UE and
the network mutually authenticate each other, and the network authorizes the UE to use the network
resources according to its subscription or mobile plan:
5G SA network design fundamentals 235
1. The UE sends the Random Access Preamble to the gNB. This preamble is referenced with the
help of a Random Access Preamble ID. This preamble is derived from a Zadoff-Chu sequence.
2. The gNB sends a Random Access Response to the UE with an assigned temporary C-RNTI value.
3. Then, the UE sends an RRC Connection Request Message to the gNB, which contains the UE
identity and the establishment cause.
4. The gNB responds with an RRC connection setup, which is sent to signaling radio bearer1 (SRB1).
The message contains the radio bearer configuration and master cell group information elements.
5. The UE sends an RRC Connection Setup Complete dedicated NAS message stating registration
request to the gNB, which is intended to be sent to the AMF.
236 5G Standalone Networks
6. The gNB then sends an initial UE message to the selected AMF (AMF selection is explained
in detail in the 3GPP specification 23.501 section 6.3.5). This message carries the Registration
Request message that was sent to the AMF from the UE via the gNB. This message also contains
the RAN UE NGAP ID and the RRC establishment cause.
7. The AMF sends the UE authentication request to the AUSF to receive the authentication vectors
and algorithm information.
8. The AUSF sends an Authentication Request to the UDM to get the vectors for authentication.
9. The UDM generates authentication vectors and sends them to the AUSF (SUPI, R, AUTN,
Kausf, and XRES*).
10. The AUSF sends the master key to the AMF, which is used by the AMF to derive the other
security-related keys (r, auth, and xhres*). The SUPI is also returned to the AMF.
11. The AMF sends a downlink NAS Transport Message to the gNB carrying the NAS
authentication request.
12. The NAS message is transported to the UE by the gNB. The UE checks the AUTN and generates
the RES* and Kausf.
13. The Uplink Information message is sent to the gnB from the UE, which carries the RES*
computed by the UE.
14. The AMF computes the HRES* and compares HRES* with HXRES*. The Uplink NAS transport
message carries the RES* to the AMF.
15. The AMF sends an authentication request to the AUSF and sends the RES* that was received
from the UE. The AUSF compares RES* with XRES* and verifies the identity.
16. The AUSF sends an authentication response with SUPI and Kseaf to the AMF. The AMF sends
Kamf from Kseaf.
17. The AUSF sends authentication confirmation to UDM on successful verification.
18. The UDM responds with an acknowledgment to the AUSF.
238 5G Standalone Networks
19. A DL NAS Transport message is then sent from the AMF to the gNB.
20. The NAS message carrying the selected security algorithm, UE security capability, and more
are sent to the UE.
21. A UL Information Transport Message is then sent to the gNB to be sent to the AMF; this
contains the Security mode command Accept message.
22. The UL NAS transport message is sent to the AMF and the DL Cipher starts. The AMF selects
the UDM.
23. The AMF sends the UE_CM registration request to the UDM. This contains the SUPI, AMF
3GPP Access, and AMF ID. The UDM checks the UE authentication.
24. The UDM sends the UE_CM registration response to the AMF.
25. The AMF sends a UE subscriber Data Management GET message to the UDM.
26. The UDM responds with Access and Mobility Subscription Data and SMF selection
Subscription Data.
27. The AMF sends a Subscribe to change notifications message to the UDM.
28. The UDM sends an acknowledgment for the subscribe to change notifications message.
29. The AMF sends a DL NAS transport message to the gNB.
30. The gNB sends the NAS message requesting the IMEI to the UE.
31. The UE sends the IMEI using the UL information Transport Message to the gNB.
32. The gNB sends the UL NAS transport message containing the IMEI to the AMF.
33. The AMF uses the IMEI for the equipment identity check procedure with the Equipment
Identity Repository (EIR).
34. The EIR acknowledges the request:
240 5G Standalone Networks
35. The AMF may then send AM Policy Association Request to the Policy Control Function (PCF).
36. The PCF sends a Data Repository query to the UDR using SUPI as the key to retrieve Access
and MM Policies.
37. The UDR sends an acknowledgment to the PCF and returns the requested Access and MM policies.
38. The AM PCF then sends a Data Repository Subscribe message to the UDR, requesting
notifications for any policy changes.
39. The UDR acknowledges this.
40. The PCF then acknowledges the completed AM policy association to the AMF and sends it to
the policies and triggers it has received from the UDR.
41. The AMF sends a NAS Registration Accept message to the gNB to be sent to the UE.
42. The gNB transfers the NAS message to the UE.
43. The UE responds with a UL Info Transport message carrying the NAS Registration
Complete message.
5G SA network design fundamentals 241
44. The NAS Registration Complete message is then transported to the AMF via the gNB:
45. The AMF then sends a UE Policy Association Create message to the AM PCF. This sequence
is very similar to the AM Policy association sequence noted previously.
46. The AM PCF then sends the Data Repository Query to the UDR.
242 5G Standalone Networks
This marks the end of the UE registration procedure. Here, we have seen that UE is authenticated
and authorized, the security procedures are completed, and the various UE policies for access and
mobility are obtained. The UE is now ready for the next step, which is to establish a PDU session.
Following the PDU session establishment procedure, the UE can access the network. A PDU Session
establishment can be of the following types:
Once the PDU session has been established, the UE can access the data network (or VoNR network
as applicable).
Let us go over the various steps in a 5G PDU session establishment procedure. This procedure assumes
that the UE has already registered with the AMF:
5G SA network design fundamentals 243
1. The UE sends a PDU Session Establishment Request to the AMF; this is transported via the
gNB. The NAS message containing the PDU Session Establishment Request within the N1
SM container is sent to the AMF. This container includes information about the PDU session
ID, Requested PDU Session Type, Requested SSC mode, 5GSM Capability PCO, SM PDU
DN Request Container, and the number of packet filters. When the request type is “Initial
Request,” it is a request to establish a new PDU Session. If the request type is “Existing PDU
Session,” it means that it is referring to an existing PDU Session that is switching between
3GPP and non-3GPP access, or a handover from a 4G EPC network. The third type is that of
an “Emergency Request,” which is used to request a PDU Session to access emergency services.
In this example, we will assume the first type – that is, “Initial Request.”
2. The AMF selects an SMF. It may use the NRF to discover SMF instances unless SMF information
is available by local configuration.
3. The AMF receives the PDU Session Establishment Request and looks into the “Request Type.”
In this case, it indicates an “Initial Request” and determines that the PDU session ID is unique
and unused for any other. Next, it determines the DNN that the UE is attempting to connect
to with the help of the information in the request message; the AMF sends the Create SM
context Request message to the selected SMF. This Create SM context Request message contains
information such as the SUPI, DNN, nSSAI, PDU Session ID, Serving network, and request
type, among others.
4. If the SMF has not registered with a UDM for this PDU Session ID, it will now do so using
Nudm_UECM_Registration (SUPI, DNN, and PDU Session ID). The SMF sends a UDM
Registration Request. The UDM will store the information it has received from the SMF, such
as the SUPI, SMF identity, SMF address, and the associated DNN and PDU Session ID. The
UDM then responds with a UDM registration response if Session Management Subscription
data for the particular SUPI, DNN, and S-NSSAI combination is not available locally. SMF
then retrieves it using Nudm_SDM_Get (SUPI, Session Management Subscription data,
DNN, and S-NSSAI) and also subscribes to be notified whenever a modification is made to
this subscription. The subscription data contains information about the Allowed PDU Session
Type, Allowed SSC modes, default 5QI, ARP, and Session-AMBR, all of which can be used to
determine the characteristics of the session that has been initiated.
5. The SMF then sends a PDU Session Create SM Context Response to the AMF, which includes
a cause field and the context ID. The cause field will contain either an accept or a reject cause.
The accepted scenario will contain the aforementioned context ID. The cause also determines
the fate of the transaction so far as being successful or unsuccessful.
6. Optional: secondary authorization and authentication. If this step is needed, then an AAA
server is needed for the transaction to complete the authorization and authentication process.
7. PCF selection is undertaken by the SMF. This can happen with the PCF ID provided by the AMF,
or the PCF retrieved by querying the NRF or by local configuration. The SM Policy Association
5G SA network design fundamentals 245
Establishment procedure is then undertaken by the SMF to get the default PCC rules from the
PCF, which will be used by the PDU Session that is going to be established.
8. Since the request type is “Initial Request,” the SMF selects an SSC mode for the PDU session
and also selects UPFs accordingly. At this stage, the SMF also allocates an IP address to the UE.
9. The SMF performs the SM Policy Association Modification procedure, which can contain
information about the policy control trigger conditions that have been met. Most importantly,
it informs the PCF of the IP address prefix that it allocated to the UE in the previous step.
10. The SMF then initiates an N4 Session Establishment/Modification Request to the UPF. This
is the message that provides details about the packet detection, enforcement, and reporting
rules that the UPF will install for this particular PDU Session. The UPF acknowledges the
message sent by SMF and provides the installation status of each rule that was sent by SMF to
be installed on the UPF.
11. The SMF then sends a Namf_Communication_N1N2MessageTransfer message to AMF. This
message carries information for the consumption of the AMF and also some information that
will be sent further to the RAN(N2) and UE(N1).
Some of the information that SMF sends across to the AMF and GNB is as follows:
PDU Session ID
QFI(s)
QoS Profile(s)
CN Tunnel Info
S-NSSAI from the Allowed NSSAI
Session-AMBR
PDU Session Type
User Plane Security Enforcement information
UE Integrity Protection Maximum Data Rate
The following is some of the information to be carried to the UE:
PDU Session Establishment Accept
QoS Rule(s)
QoS flow level
Selected SSC mode
S-NSSAI(s)
DNN
246 5G Standalone Networks
12. The AMF sends the N2 PDU Session Request to RAN. This contains the information it received
from the SMF.
13. The gNB then sends the UE the important information the SMF has sent, such as its IP address
in the PDU Session Establishment Accept message and the other details mentioned in Step 11.
14. The gNB then sends an N2 PDU Session Response to the AMF. This message will also contain
the N3 tunnel information that will be used by the UPF to send data traffic.
15. The AMF sends a PDU Session Update SM Context Request to SMF. It sends the information
it received from the RAN previously.
16. The SMF will initiate an N4 Session Modification Procedure to the UPF, where the N3 tunnel
information is conveyed to the UPF. The UPF sends an N4 Session Modification Response to
the SMF as a response. At this time, the downlink path for data traffic to flow is established.
17. The SMF then sends a PDU Session Update SM Context Response to the AMF as an
acknowledgment of Step 15.
18. The SMF may send an optional PDU Session SM Context Status Notify (release). If any of the
steps after Step 5 have failed, the SMF informs the AMF and tells it that it has released any
resources that it had allocated to the UE PDU session.
19. The SMF sends an IPv6 Router Advertisement to the UE via the UPF in case the Session type
is IPv6 or IPv4v6. After this step, the uplink path of the traffic is established.
20. If the PDU Session establishment fails after Step 4, the SMF will unsubscribe from notifications
about modifications to the UDM and will also deregister the given PDU Session.
This concludes the PDU establishment procedure. After this procedure, the user device can access
the network resources, browse data, and surf the internet. We learned about the different types of
PDU Establishment procedures in detail in Chapter 6, which showed us not only how a UE attaches
for data calls but also voice calls and Wi-Fi. All these messages are transported over HTTP/S and
TCP. Hence, the underlying IP backbone network must be built robustly. If there is a delay or loss of
packets in the backbone, messages would be retransmitted and timeouts in the TCP window would
occur. This might lead to a signaling storm and high call failure rates.
5G SA network design fundamentals 247
• Data center design: One of the most defining aspects of the usability and reliability of a network
is its data center design. There are many ways to design a data center. One of the popular high-
level design templates is shown here:
In the preceding diagram, the geographic area where the network is supposed to be laid out
is divided into five zones: north, south, east, west, and central. The central data center can
host the management, orchestration, testing, analytics framework, and some control plane
NFs. The regional data centers can host the user-plane functions and latency-sensitive control
plane functions. Each regional data center can have a co-located redundant data center, which
is most likely in an active-active configuration with 50% of traffic going to each one. If one of
the regional data centers fails, the other one in the same zone can take over.
Geo-redundancy can be planned across zones. For example, the north and west zones can be
geo-redundant. Geo-redundancy helps when both data centers in a zone fail – for example,
in the event of a natural disaster. In this case, the standby zone picks up the traffic. Also, note
that for a geo-redundant pair, traffic should be sized so that at any point in time there is, at
248 5G Standalone Networks
most, 50% usage so that in the event of a region failure, the standby zone can cater to not only
its local traffic but also the traffic coming from the failed zone.
The regional data centers feed in traffic from the edge data centers or the radio units.
• Radio access planning: Radio surveys and planning are an important aspect of laying out the
base stations in the network. There is a significant impact on the placement of radio heads and
the tilt of antennae. The terrain and obstacles are closely studied to select the most appropriate
position to place a radio unit that has maximum coverage and minimum interference.
• IP core – backhaul design: The IP core design is another prime aspect of network design.
With the advancement in radio and core technology and the explosion in data speeds, the total
carrying capacity of the backhaul network had to also be expanded greatly and built to tolerate
faults and outages. Note that a network will have a mix of legacy and new routers. This is why
planning an architecture to enhance capacity and performance using both legacy and new routers
and routing technologies is very challenging; security and isolation must also be kept in mind.
• Packet core design: The packet core design should be aligned to the use cases planned, the
transactions per second, the user throughput, latency, and the quality of service requirements.
Based on the data center design selected, the packet core can be distributed or centralized. It
is possible to have a centralized control plane and distributed user plane functions. It is also
possible to have distributed data and control plane functions that are collocated in regional
data centers. Since the control plane transactions are all HTTP-based and transported via TCP,
latency can cause retransmissions, which, in turn, causes a huge signaling overhead. Hence,
it is also important to tune the timers so that unnecessary retransmissions can be avoided.
• Scaling: After the network has been built initially, it is just a matter of time before it will need to
be scaled. Hence, it is important to bear in mind the future scope of expansion while planning a
network. This headroom for expansion should be accommodated in every stage and component
of the network, from the rack space and power requirements in the data center to the server’s
routers/switches and IP allocation.
Automation comes in handy for scaling applications in or out as 5G cloud-native design tasks
such as orchestrating and configuring servers and network functions can be done at the click
of a button.
• Test framework design: A robust test framework that can easily onboard test cases and scenarios
goes a long way when building a robust and resilient network. Tests should aim to verify the
functionality and test the performance of each network function, as well as test failure scenarios
such as reboot or server replacement scenarios, test other component failure scenarios, and
test geo-redundancy, latency, performance under load conditions, border scenarios, alarm
testing, upgrades, KPI dashboard verification, and so on. Hence, each aspect of the network,
including its functionality, performance, operations, and maintenance, should be tested. It is
also highly desirable to have a test suite that runs nightly to catch regression issues and perform
network health checks.
5G SA network design fundamentals 249
In this section, we delved into the details of designing a macro or a public network. In the next section,
we will delve into the details of designing a private (non-public) network, which is expected to be
extremely popular with enterprises.
In some cases, an unlicensed CBRS spectrum can be used; this is a more popular approach in the
USA. If an unlicensed spectrum is used, then the allotment of the same is done by a Spectrum Access
System (SAS) provider.
Several deployment options can be adopted by the enterprise. Firstly, the enterprise can choose to
deploy its private network on its own. In this case, the enterprise adopts the end-to-end responsibility
of deploying and maintaining a network. There is another common alternative that enterprises go for,
which is to have a mobile network operator provide the enterprise network. This way, the responsibility
of maintaining the network is largely on the network operator.
Next, let us go over the various types of private network options:
Next, we will go over a list of industry use cases that leverage private networks:
In the preceding figure, we can see the enterprise-focused use cases for which private networks can be
implemented. One of the sectors is Industry 4.0, including tools and parts inventory control, remote
maintenance, and collaborative autonomous robots.
Private networks can be widely deployed in the transport and utilities sector and consumer-focused IoT.
With that, we have gone over the design considerations and use cases of a private network. Another
important part of the design is the stability and resilience of the network against failures. We will
examine this in the next section.
The idea behind failure design is to have an alternative path along which traffic can flow in case of a
single component failure. Most networks are expected to experience no impact from a single failure;
some highly resilient networks have tolerances for more than one failure. Let us go into the details of
the various redundancies built into the network shown in the preceding diagram:
• Data center redundancy: Every data center should have another data center in a geographically
separate site as a standby – this is known as geo-redundancy. In the preceding figure, Site 1 and
Site 2 are geo-redundant. Hence, if there is a complete failure of Site 1 for some reason, Site 2
will be fully equipped to carry the traffic seamlessly.
• Rack redundancy: Every cluster that comprises an application should span more than one
rack. If there is an issue and there is damage to the rack, the servers in the cluster from the
other rack would be able to service the traffic.
• Power source redundancy: There should be more than one power source for each rack and
server. If there is an issue with one power supply, the other one should take over.
• Server redundancy: Server issues are most common in the network as each server has multiple
components in it, such as memory, storage, CPUs, and network interface cards that can become
faulty over a certain period. Hence, it is always advisable to spread an application over a cluster
spanning multiple servers, preferably in separate racks.
• Router and switch redundancy: There should at least be two instances of each router/switch
so that, in case of a failure, there is an alternative path along which traffic can flow.
• NF redundancy: At each site, there should be two instances of the same NF, preferably in different
clusters so that a software or hardware issue on one does not cause a service interruption.
Similarly, a geo-redundant instance of an NF should be planned so that it has enough capacity
to deal with the failover traffic in addition to the local data center traffic.
It is best to avoid a single point of failure at every level of design. Keeping these points in mind, a
resilient network can be designed that can deal with single failures seamlessly.
Network failures are one of the key reasons for network performance and the network Key Performance
Indicators (KPIs) to dip. In the upcoming section, we will delve into network performance analysis.
• Single UE test: A single UE is attached in a cell with no other devices in that cell and tested
for maximum throughput. This test will give the maximum throughput that can be attained
in that particular 5G cell.
254 5G Standalone Networks
• Single UE test in busy conditions: A single UE test in busy conditions gives us an idea of how
the network performs in peak hours.
• Maximum aggregate throughput test: This test is conducted on a user plane function to
determine its capacity.
• Load tests: These can also be performed to test the capacity of the backbone IP network.
• Maximum number of subscribers: This test specifies the maximum number of subscribers
that can be processed by a site and can be tested.
• Maximum site-wise throughput.
• Single-component failure: This can be tested to check the impact and convergence in the
failure duration.
In addition to this, KPI dashboards are used to specify the health of the network. These dashboards
typically look like this:
The following figure depicts a typical 5G KPI dashboard at the network operator. Here, you can see
various statistics, such as the 5G PDU session setup rate, the 5G PDU session release rate, handovers,
and more. Hence, this gives us a high-level idea of what rate devices are connecting to the network,
as well as their states:
Network performance analysis 255
The following dashboard is another example of how network operators might want to see their alarms.
Note that each alarm is assigned a category of critical, major, or minor, as per the degree of disruption
it will likely cause to the network. Here, five critical alarms must be addressed by the network operator:
In this section, we saw a variety of KPI dashboards that give us an idea about the current performance,
active alarms, and health of the network.
Summary
In this chapter, we learned about the main design principles of a 5G SA network. First, we understood
the requirements that need to be established before the start of the design phase. To do so, we looked
at how to design a 5G SA network, including a standard call flow. We also looked at the design aspects
and deployment options for private networks. Finally, we enlisted the design tenets of a failure-resilient
network and reviewed how to monitor and dashboard a network.
At this point, we know how to design a 5G SA network, both private and public. We also know how
to analyze requirements to build a high-performing robust network.
In the next chapter, we will learn about 5G and autonomous vehicles.
12
5G Infrastructure Design
In this chapter, we will focus on the infrastructure design required to successfully implement the
network foundation for 5G. We will look at the changes and evolution in the infrastructure as the
industry evolves from the prior generation to standalone 5G. In addition, we will look at the impact
of the maturity of cloud computing in Information Technology (IT) and its impact on the operators.
Here, we’ll cover the following main topics:
• Understanding NFV
• MEC-C-RAN (centralized/cloud RAN)
• O-RAN
• Using hybrid clouds
Understanding NFV
Network Functional Virtualization (NFV) borrows several concepts from enterprise IT to utilize
server virtualization. This alleviates the need for custom hardware systems and appliances for various
network functionalities. The goal of NFV is to decouple the hardware from the software stack for 5G.
This reduces the dependence on custom-built hardware. In Figure 12.1, we show the high-level 5G
core architecture to illustrate the relationship between the different concepts covered in this chapter.
NFV provides a great deal of flexibility to network operators to improve and enhance the capabilities
of their network. This includes the ability to adopt virtualization for software applications. This allows
independence from custom-built and expensive hardware in the form of specific physical appliances as
part of the main network architecture. Companies such as Ericsson are driving the thought leadership
around NFV: https://www.ericsson.com/en/nfv.
The adoption of NFV makes it easier to load-balance, scale up and down, and move functions across
distributed hardware resources. With continual updates, operators can keep things running on the
latest software without interruption to their customers. So, let us understand the role of the building
blocks of NFV.
258 5G Infrastructure Design
Virtual Network Functions (VNFs) are a software category that can provide essential network
services on commonly used computing hardware without the need for purpose-built appliances. See
Figure 12.1 for the high-level NFV architecture:
Let us gain a basic understanding of the NFV architecture to appreciate why this is very popular in
the industry today and how it can promote agility and automation to rapidly deploy 5G network
infrastructure. The NFV architecture includes the following elements:
NFV makes the architecture very modular. Some typical advantages of NFV include the following:
Next, let us look at the role of NVF and related concepts and their inter-relationships. Figure 12.2
shows the 5G architecture at a very high level and where NFV fits:
Understanding NFV 259
The NVFI utilizes Intel x86 or generic computing hardware, which is easy to obtain and maintain as
organizations' IT departments are well versed in it. The software stack includes the following elements:
• Hypervisors
• Virtual Machines (VMs)
• Virtual Infrastructure Managers
This provides the physical and virtual network layers for 5G. Together it creates the layer of the
physical hardware stack for the compute, storage, and network. This is the software foundation for
the deployment and management of VNFs.
The NVFI facilitates the virtualization layer over the hardware layer. In other words, the NVFI provides
an abstraction layer of the x86 hardware servers. It allows logical partitioning and provisioning for
the VNFs to operate smoothly. In addition, the NFVI helps to expand the geographical span over the
prior-generation network architectures.
Next, let us look at Software-Defined Networking (SDN).
fulfill the need for different requirements, such as smartphones, Internet of Things (IoT) devices,
and emerging needs of autonomous vehicles or drones.
Cisco defines SDN as the ability to program the network and drive automation. SDN can also be
considered as creating the physical separation of the network/user plane from the control plane. A
commonly used protocol for SDN is OpenFlow, which provides communication between the control
layer and the infrastructure layer. Other protocols often used are NETCONF, Border Gateway
Protocol Link-State (BGP-LS), Simple Network Management Protocol (SNMP), or Application
Policy Infrastructure Controller Enterprise Module (APIC-EM). VMware NSX can be considered
an overlay SDN implementation. Here, a network layer overlays a physical network. This adds agility
to the software systems to quickly bring up the network layer with much less dependence on the
hardware layer. SDN is also often interchangeably used with the term Software-Defined Wide Area
Network (SD-WAN). Figure 12.3 shows the high-level architecture of SDN:
Bare-metal switching, which allows the use of Linux in the switches, is also often discussed in the
context of SDN. Facebook (now part of Meta) also makes bare-metal switches running open OSs.
Switches running Linux as the OS are a good example of SDN. The actual definition of SDN depends
on the vendor you ask. However, at the core of SDN is easy network programmability and network
automation. The Open Networking Foundation is one of the relevant bodies in the context of SDN.
Understanding MEC C-RAN 261
As shown in Figure 12.3, in SDN architecture, the Northbound Interface (NBI) is used by business
applications for appropriate communications with the controller. The Southbound Interface (SBI)
facilitates communication with the devices that are part of the infrastructure layer or the data plane.
In the three-tier SDN architecture in the preceding figure, the business applications are written
by different vendors and third parties. Such applications are architected using the NBI to enable
communication with the controllers. This helps to promote interoperability in the SDN architecture.
In the prior section, we looked at the role of SDN in 5G and how it adds flexibility to the
infrastructure architecture.
Next, let us look at Multi-access Edge Computing (MEC) Cloud Radio Access Network (C-RAN).
Historically, a RAN’s radio and baseband processing capability has resided in a base station. In
C-RAN, we decouple the base station capabilities and processing power into Remote Radio Heads
(RRHs), which exist in a distributed fashion at the cell site and the central Baseband Units (BBUs).
The connectivity between the BBU and the RRH is managed via the fronthaul network.
Over time, the Common Public Radio Interface (CPRI) standards have evolved. They are standards
for interfacing the Radio Equipment Control (REC) with radio equipment. A group of companies,
including Ericsson AB, Nokia, NEC Corporation, and Huawei Technologies, are working to refine
the CPRI standards. C-RAN takes advantage of the latest CPRI standards. In addition, C-RAN uses
the benefits of low-cost Coarse or Dense Wavelength Division Multiplexing (CWDM/DWDM)
technology. Finally, it uses millimeter Wave (mmWave) to enable the transmission of baseband
signals over long distances. This allows C-RAN to deploy centralized base stations on a massive scale.
Furthermore, C-RAN uses the data center network technology that is already well adopted in enterprise
IT. This brings the following benefits:
• Lower cost/TCO
• Improved reliability
262 5G Infrastructure Design
• Lower latency
• A high-bandwidth interconnect network in BBU pooling
• Software virtualization in a vendor-agnostic manner
• Dynamic resource sharing
Let us also look at the gradual move from C-RAN to Virtual-RAN (vRAN) and the adoption of the
term C-RAN. Under vRAN, the baseband capabilities are handled using software functions, which
can be hosted on a general-purpose IT server, as opposed to custom hardware for this purpose. As a
result, vRAN improves the support for multi-vendor 5G ecosystems and avoids vendor lock-in. This
helps to reduce network costs and accelerates the rollout of innovative services.
Let us review the C-RAN architecture to understand its benefits. We must first understand two concepts,
BBU and RRH, and how they are part of the C-RAN architecture. BBU pooling or the Base Station
Hotels (BSHs) facilitate the creation of the master base stations. The RRH, on the other hand, permits
the 5G operator to have many network access points. In some ways, this is like the hub-and-spoke
paradigm, as shown in Figure 12.4:
As we try to increase the density of devices in 5G, especially in places with a lot of users, such as an
airport or a large office complex, mall, or sports stadium, it stresses the Base Transceiver Station
(BTS) to its maximum extent. It is expensive to keep adding more BTSs, which increases the risk
of signal interference in the network. One solution is to separate the base station into two parts: the
BBU and the RRH. This enables the 5G network operators to support a larger number of network
access points and leverage the master base station to centralize the baseband functionality. With the
use of such a master or C-RAN base station, the overall management and infrastructure of the radio
resources are simplified in otherwise possibly complex 5G environments. (See: https://www.
artizanetworks.com/resources/tutorials/cran.html).
Let us look at how C-RAN helps with the cost efficiency of 5G network infrastructure. An average
5G base station can cost as much as three times the cost of 4G, with an even smaller coverage area.
Historically, the RAN costs contributed to 80% of CAPEX and about 60% of OPEX. With added
cost pressure where the revenues per telecom subscriber are going down, it is important to look for
innovations such as C-RAN for cost efficiencies. The TCO of BTS includes the equipment and the
site, power supply, battery backup, cooling, and security costs. These are the capital costs or one-time
investments. In addition, there are operating costs, including service and maintenance activities.
Understanding MEC C-RAN 263
However, BBU pooling creates economies of scale here. The cost of each BTS infrastructure can be
reduced by co-locating some of the baseband functionality at the C-RAN base station. This reduces
idle or extra capacity at the BTS that may not always be optimally utilized. This cost efficiency is often
referred to as the pooling gain. The wider adoption of cloud computing allows a shift to a pay-as-
you-go model, which is quite common in the public cloud computing space. The big providers of
public clouds include the following:
Many public cloud providers also have edge clouds to supplement the use cases where the cloud has too
high a latency for the specific scenario. We will see in the later Using hybrid cloud section how such edge
offerings from cloud providers play an important role in the hybrid cloud-based infrastructure of 5G.
NFV makes it possible for core network processing to be done in a virtualized computing environment,
achieving hardware independence to a great extent. Coupled with the mainstream use of public cloud
in enterprise computing, it sets the stage for the emergence of the RAN-as-a-Service (RANaaS) model.
Next, let us look at how C-RAN helps to reduce signal interference. Having a large number of BTSs
in a single geographical area can lead to signal interference. However, BBU pooling allows you to
centralize some of the baseband functionality in a single master base station. The centralization of the
baseband functionality allows better coordination of the transmission between the different types of
cells, as shown in Figure 12.5. This also lays the foundation of carrier aggregation:
Carrier aggregation
Carrier Aggregation (CA) allows the co-existence of the 4G and 5G networks. CA allows the
mixing of multiple frequency bands, leading to improved cell coverage. Ericsson is considered one
of the industry leaders when it comes to CA. To understand CA fully, let us look at the 5G spectrum,
consisting of the following elements:
• Low-band: This provides national-level coverage and can be used indoors below 7 GHz using
Frequency Division Duplex (FDD).
• Mid-band: This is a metro band in the range of 1 GHz to 6 GHz and can penetrate walls and
provide fast throughput speeds and enhanced capacity using Time Division Duplex (TDD).
• High-band: Also referred to as mmWave for higher-density localized services above 24 GHz.
It requires smaller antennas, provides dense coverage, and is more secure.
See Figure 12.6 for this concept of the three bands in 5G:
Ericsson developed Advanced RAN Coordination for low-latency coordination between the two
different RAN compute basebands. (See: https://www.ericsson.com/en/blog/2021/6/
what-why-how-5g-carrier-aggregation).
Figure 12.7 provides a comprehensive view of the C-RAN architecture, built upon the foundations we
covered here. Such a comprehensive C-RAN architecture lays the foundation of the RANaaS, which
aligns with the public cloud computing concept.
Understanding O-RAN 265
C-RAN facilitates rapid deployment of high-density RAN infrastructures. China Mobile first proposed
C-RAN architecture in 2009 to move from Distributed RAN (D-RAN) to C-RAN. Both China Mobile
and China Unicom were early adopters of C-RAN. On the global stage, C-RAN architecture-related
equipment crossed $5 billion in market share as early as 2015 (https://www.fiercewireless.
com/tech/ihs-china-fuels-5b-c-ran-market). AT&T adopted C-RAN at a later stage,
in preparation for mmWave and 5G (https://www.fiercewireless.com/wireless/
at-t-lays-c-ran-foundation-preparation-for-5g). In Europe, Nokia and Ericsson
drove the adoption of C-RAN starting in 2015. Globally speaking, Huawei and Samsung are the other
two large companies adopting C-RAN. As a result, global revenues related to C-RAN exceeded $12
billion by 2020.
In summary, the adoption of C-RAN can lead to a higher density of cell services under 5G, reduced
CAPEX and open costs by using BBU pooling, and reduced energy consumption, leading to improved
Environmental, Social, and Governance (ESG) outcomes for companies.
In the next section, we will look at O-RAN.
Understanding O-RAN
Open RAN or O-RAN is a vastly popular term in the 5G network world. It deals with the interoperability
of open hardware, software, and interfaces for cellular wireless networks. The goal is to allow the use of
Commercial Off-The-Shelf (COTS) servers and network equipment as opposed to customer hardware
similar to those used in the base stations. In other words, O-RAN is a movement to standardize and
allow for the interoperability of RAN’s building blocks (https://www.viavisolutions.com/
en-us/solutions/o-ran).
266 5G Infrastructure Design
O-RAN provides flexibility for operators to mix and match vendor equipment and not get locked into
particular propriety hardware, software, and interfaces. See Figure 12.8:
O-RAN promotes a more vibrant supply chain ecosystem for 5G compared to its predecessors due
to the use of open standards for communication. This adds agility to the innovation process for the
network and its applications.
Let us take an example of legacy RAN deployment and show how the O-RAN concept applies there.
See Figure 12.9:
From the bottom up, the layer consists of the RAN hardware and software. In legacy deployments, the
use of propriety hardware from a specific vendor dictated the use of the same hardware for the full
deployment over the life cycle. Likewise, this locked the operator into using corresponding proprietary
software, shown as SW Vendor 1. With the emergence of O-RAN, as new hardware appears on the
market with enhanced capabilities, mixing and matching is possible. Additionally, the loose coupling
between the RAN hardware and software provides more flexibility to adopt these solutions over the life
cycle of the RAN. This is absolutely critical in the era of massive supply chain disruptions during the
COVID-19 period, such as from 2020 to 2022. Furthermore, the global semiconductor crisis would
have aggravated the problem further if no concept such as O-RAN was applied to 5G infrastructure,
as the initial rollouts corresponded with this time period in several parts of the globe.
Figure 12.10 shows how O-RAN allows the adoption of hardware from different vendors when new
features are released in similar hardware from different vendors allowing mixing and matching at
the O-RAN hardware layer:
Figure 12.10 – A deployment based on O-RAN swapping hardware vendor [image credit: Sanya]
Figure 12.11 shows similar flexibility at the O-RAN software layer allowing swapping of the RAN
software stack in the RAN deployment life cycle:
268 5G Infrastructure Design
Figure 12.11 – A deployment based on O-RAN swapping RAN software vendor [image credit: Sanya]
Figure 12.12 and Figure 12.13 further illustrate this concept, where O-RAN allows tremendous flexibility
due to the ability to swap out hardware and software vendors.
Figure 12.12 – A deployment based on O-RAN with central and distributed units [image credit: Sanya]
Understanding O-RAN 269
Figure 12.13 illustrates how the integrators manage the O-RAN infrastructure. This adds further
flexibility for managing O-RAN deployments:
Figure 12.13 – A deployment based on O-RAN integration models [image credit: Sanya]
This model can swap out elements as improved parts or replacements are needed due to the global
supply chain crisis during the pandemic. AT&T openly shared the impact of the semiconductor
industry delays and the resulting impact on RAN equipment, as can be read here: https://www.
sdxcentral.com/articles/news/att-ceo-a-little-skittish-about-5g-
ran-supply-chain/2021/04/.
Next, let us look at the O-RAN infrastructure management and operating cost models.
Next, we look at the full view of the O-RAN architecture in Figure 12.15 (see https://www.o-
ran.org). The O-RAN architecture comprises the following elements:
• Service Management & Orchestrator (SMO): SMO governs the orchestration, management,
and automation of RAN elements and supports O1, A1, and O2 interfaces.
• Non-real-time RAN Intelligent Controller (Non-RT RIC): Non-RT RIC allows non-real-time
control and optimization of RAN elements and resources. It facilitates Artificial Intelligence
(AI) and Machine Learning (ML) capabilities for training and updating the models.
• Near-real-time RAN Intelligent Controller (Near-RT RIC): Near-RT RIC enables near-real-time
control and optimization of O-RAN elements and supports the E2 interface for the collection of
fine-grained data and actions. It helps to optimize and enrich the control function of the RAN.
• O-RAN Central Unit (O-CU): O-CU consists of O-RAN Central Unit – Control Plane
(O-CU-CP) and O-RAN Central Unit – User Plane (O-CU-UP). O-CU also hosts the Radio
Resource Control (RRC), Service Data Adaptation Protocol (SDAP), and Packet Data
Convergence Protocol (PDCP) protocols.
• O-RAN Distributed Unit (O-DU): O-DU hosts Radio Link Control (RLC)/Medium Access
Control (MAC)/high-PHY layers, where PHY is the physical and electrical characteristics of
the network.
• O-RAN Radio Unit (O-RU): O-RU hosts the low-PHY layer and Radio Frequency (RF)
processing layers.
Understanding O-RAN 271
Together these components provide the full range of network functionality of O-RAN:
In the previous section, we looked at O-RAN and how its core principles help to optimize 5G networks
from the service provider’s perspective.
In the next section, we will look at the emergence of hybrid cloud and its role for 5G operators.
272 5G Infrastructure Design
• The NSA 5G phase is the first phase, where a 5G New Radio (5G NR) access network is used
with the existing 4G Long-Term Evolution (LTE) network core to deliver the service.
• The SA 5G phase involves the use of a 5G NR access network with the newly introduced 5G
network core. This is important for delivering innovation use cases and the full promise of 5G
to the user community.
For operators, though, the maturity curve of 5G deployments calls for flexibility in infrastructure
models. This is where hybrid cloud provides several opportunities to grow and tailor 5G infrastructure
deployments. This is the concept of composable networks, where 5G is treated like a wireless fabric.
(See: https://www.sdxcentral.com/articles/news/composable-5g-networks-
its-a-thing-liqid-ceo-says/2019/09/)
The functional split of RAN, as shown in Figure 12.15, opens up the opportunity to use the public
cloud and, when appropriate, leverage the hybrid cloud features for 5G infrastructure:
The communication between the Distributed Unit (DU) and Radio Unit (RU) requires low latency.
The enhanced Common Public Radio Interface (eCPRI) is the emerging standard for interfaces to
Using hybrid cloud 273
connect the RU with the DU, often referred to as fronthaul, to ensure the stringent low-latency needs
(sub 100 microseconds). The DU serving the RU is a one-to-many relationship, and RUs can often
be far away. (See: https://www.rcrwireless.com/20200708/open_ran/open-ran-
101-ru-du-cu-reader-forum).
Next, we will look at how the telecom cloud plays a role here in adding flexibility to the 5G infrastructure.
Figure 12.17 – Splitting functionality in 5G to break the monolith [image credit: Sanya]
Sometimes multiple cloud providers work with partners to provide support for multi-cloud solutions.
Figure 12.18 shows one such example where OCI and AWS come together with their partner Equinix
to help eliminate the complexities for operators in building the NFV deployment architecture while
leveraging the OPEX models of the public cloud:
274 5G Infrastructure Design
In the preceding section, we looked at the emergence of the public and hybrid clouds in the context
of 5G infrastructure design. This has provided opportunities for the public cloud providers such as
AWS, Microsoft Azure, GCP, and OCI to become part of the 5G ecosystem. Google announced that it
joined the O-RAN alliance in June 2021 (See: https://cloud.google.com/blog/topics/
telecommunications/google-cloud-joins-o-ran-alliance).
Now, Communication Service Providers (CSPs) can embrace the public cloud for both IT and network
transformation. Based on the latency and data residency issues, the hybrid cloud offerings provide
great flexibility while taking advantage of the OPEX model from a financial perspective. Given that
5G NSA infrastructure can cost in the range of $1 million for 50,000 subscribers, the flexibility of the
financing model is key here (see: https://www.lightreading.com/open-ran/heres-
how-much-5g-wireless-network-really-costs/d/d-id/769114):
The preceding table summarizes the comparison between C-RAN, vRAN, and O-RAN, using
deployment type, vendor, and cost.
Summary 275
Summary
In this chapter, we learned about the infrastructure required to support 5G networks. We looked at
NFV, C-RAN, vRAN, and O-RAN, as well as the use of hybrid clouds for 5G networks. A thorough
understanding of the infrastructure allows the development of a composable network over the life
cycle of 5G.
In the next chapter, we will introduce the concept and architecture of network slicing for 5G. We will
understand how network slicing acts as a differentiator for 5G. We will look at several use cases for
slicing to better understand its applications.
13
5G Network Slicing
This chapter will focus on the purpose and architecture of 5G network slicing. Traditional methods of
mobile network management cannot unleash the full potential of 5G. Network slicing helps to make
an infrastructure intelligent and reduces the dependence on applications for efficiency and latency.
Network slicing allows the connectivity to be fine-tuned to end-customer devices and use cases, both
for enterprise and retail customers. Overall, network slicing is a key differentiator between 5G and
prior generations of mobile technologies.
In this chapter, we will cover the following topics:
In network slicing, each slice can be configured for its own performance and throughput. Let us look
at the importance of Control and User Plane Separation (CUPS). This helps to improve the efficiency
Understanding network slicing 279
and performance of the 5G network. As a result, the control plane and user plane serve as two different
network components used to handle different kinds of network traffic.
The control plane manages the network and maintains the communication between devices. The
control plane sets up and tears down connections, routes traffic, and manages resource allocation.
The user plane carries the user data, including payloads such as voice and video. Independent scaling
of the control plane and user plane can be done using CUPS.
CUPS, along with Software-Defined Networking (SDN), facilitates network slicing in 5G. SDN
manages and controls the allocation of resources to different network slices. This allows sufficient
allocation of capacity and features required by each slice to serve the supported application. The use
of SDN allows network operators to respond quickly to customer demands and usage of network
slicing. Overall, SDN makes the management and operation of the 5G network easier, allowing
flexibility in offering network slicing (for more details, visit https://5ghub.us/5g-end-to-
end-network-slicing/).
End-to-end network slicing is the ability to create and manage multiple logical networks, or slices, that
span an entire network. This goes from a user’s device all the way to the core of a 5G network. Each
network slice acts like a fully independent network. It is tailored to meet the specific requirements of
different types of users and applications.
SDN and Network Function Virtualization (NFV) technologies are used to create and manage the
different end-to-end network slices. An operator will define the characteristics and capabilities of each
slice, such as the bandwidth, latency, and reliability requirements, and use SDN and NFV to allocate
resources and configure the network accordingly.
When end users connect to a network, they are automatically connected to the appropriate network
slice. This selection depends on the requirements of their device and applications in use. The network
is then able to route the user’s traffic through the appropriate network slice. In this process, the desired
performance and Quality of Service (QoS) are met.
Let us look at a simple analogy to network slicing. Let us say there are two large cities – City A and
City B. The operator is responsible for creating roads between the two cities. The traffic between these
two cities consists mainly of cars, motorbikes, and trucks. Historically, all three have shared the same
road and have not been happy with their experience on the road, due to accidents and delays. The
operator now has two choices:
• Build three different highways and assign one for trucks, one for cars, and one for motorbikes.
In this approach, it needs three times the investment to build three separate roads between
City A and City B.
• Build several lanes on a single multi-lane highway and segment them into three groups of lanes
in either direction, in such a way that traffic cannot switch from one group of lanes to another
except at designated exits. Different speed limits and toll levels can be set up for each set of
lanes, independent of the others.
280 5G Network Slicing
The second approach here is like the network slicing approach, where the same physical network or
general-purpose multi-lane highway caters to different specific needs and provides sufficient isolation
for each set of users.
Network slicing essentially helps to extend the concept of virtualization, which is quite prevalent in
enterprise IT, to customer premises and devices, through the connectivity layer. In 4G, virtualization
was possible in the core of the mobile platform. Network slicing in 5G extends this capability to
the radio access part of the network. With network slicing, it is easy to cater to applications that
have low-latency and high-bandwidth needs, such as Augmented Reality (AR), for optimal user
experience. On the other hand, a network slice for a low-power sensor network can be created for
IoT asset-tracking purposes.
Figure 13.2 provides a simplified view of the concept of network slicing in 5G. On one hand, we have
public and shared capabilities from previous generations, which come with lower costs and higher
flexibility. On the other hand are the private and isolated networks, often adopted by large enterprises,
such as for port operations with poor coverage of a public network.
Network slicing helps to bridge the gap between the two extremes, as shown in Figure 13.2, by
providing the following:
In 2021, Deloitte conducted a global study that surveyed over 400 executives about 5G. The study
indicated that 76% of those surveyed believed that over the next 3 years, 5G would be essential for
their business. The low-latency and near-fiber speeds unleashed by 5G would be the key enablers for
business outcomes.
Understanding network slicing 281
As enterprises are exploring their paths to profitability, they are looking to adopt 5G to drive new
channels of productivity and revenue, in the following ways:
• Building their own 5G private wireless networks to address their specific needs for bandwidth,
latency, and Service-Level Agreements (SLAs) with their users
• Evaluating the network slicing provided by their Communications Service Provider (CSP)
as a slice provider to slice the enterprise tenants, under rigid SLAs
The expected share of the 5G private network is about three times the network slicing market, as per
the recent forecasts from ABI Research. However, the sheer size of the predicted total market growth
by 2030 creates a large stake in network-slicing services. Small and medium businesses are likely to
adopt network slicing services more than large enterprises, gradually (https://www.nokia.com/
blog/enabling-advanced-use-cases-with-5g-network-slicing/). However,
making network slicing commercially viable for CSPs will require careful planning and prioritization
of investments in a network infrastructure.
Some CSPs will adopt a hybrid model in the near future. The hybrid model of network operations
combines elements of both SDN and traditional networks. Some parts of a network use traditional
networking protocols and hardware, while other parts use software and virtualization for management
and control.
Network slicing will not apply in every scenario. Let us look at a case study covering the decision-making
process – in this case, a smart warehouse solution for a large manufacturing company (https://
www2.deloitte.com/us/en/pages/consulting/articles/private-5g-network-
support-smart-warehouse-applications.html).
In this case, Deloitte and a large manufacturing company designed a smart warehousing solution for a
45,000-square-feet facility, leveraging 5G. The solution included a precision location tracking system,
autonomous robots and forklifts, a computer vision and sensing system, and AR/VR capabilities. In
this case, the best option was a private 5G network rather than network slicing for the QoS required.
The private network also allowed the use of Zero Trust Architecture (ZTA), increasing the security
and compliance of the network in the warehouse. This example goes on to prove that both private
networks and network slices have their own advantages and disadvantages and have to be carefully
selected for the specific scenario.
Ericsson and Far EasTone Telecommunications (FET) from Taiwan demonstrated a solution where
smartphone applications interact with different network slices, based on the QoS requirements. Here,
dynamic network slice selection provides an added level of flexibility in the mobile application design
and architecture, as shown in Figure 13.3.
282 5G Network Slicing
This type of solution allows policy-based selection of a network slice that is most optimal for an
application. For instance, a smartphone user may use the generic broadband slice for regular mobile
services and a different slice for gaming applications. However, the same smartphone device could
be used for enterprise applications. In this case, a highly secure network slice is used for enterprise
applications such as secure video conferences with a field technician. In this case, the user experience
and reliability of the enterprise applications on a smartphone are improved via network slicing. Such
a use case is becoming increasingly important, due to the increasing use of Bring Your Own Device
(BYOD) policies in the corporate world as well as remote work, as a result of the COVID-19 pandemic.
Network slicing provides a capability bridge between public network flexibility and the benefits of
standalone networks.
In order to capitalize on the opportunities provided by 5G network slicing, CSPs have to look at their
priorities for investments. These priorities will be dictated by the type of demand they see in their
customer base. Figure 13.4 shows how the adoption of 5G and its use cases will grow. CSPs have to
look at the opportunities in the near future for monetization while keeping long-term growth in mind.
Initially, a few slices may suffice for meeting the near-term requirements of its enterprise customers.
However, planning has to be done to allow the introduction of other slices when the remaining use
cases mature in the industry or their specific customer base.
Understanding network slicing 283
In the next section, let us look at the practical challenges that network slicing may pose to CSPs.
1. Select the target industry, in their customer base today, or industries to be targeted in the near
future. This is key to a focused approach to investments.
2. Identify network capability gaps to address in the early slices planned for deployment.
3. Create a business plan based on prioritized near-term opportunities by use case.
284 5G Network Slicing
4. Rinse and repeat – this is an iterative process, in the initial years, until there is widespread
adoption of 5G in the industry.
With a phased approach based on prioritization of the industry, segments, and use cases, CSPs can
try to overcome the network slicing challenges and reduce their risk exposure. See Figure 13.6 for the
suggested phased approach. The investments increase with the phases, but the initial phase helps to
get started with network slicing-based services.
As the CSPs mature with the slicing Lifecycle Management (LCM), they will need to ensure they
have Network Functions Virtualization Infrastructure (NFVI) and capacity in a physical network.
This requirement includes adequate radio coverage as well. Hence, to support automated network
slicing LCM functionality, CSPs must overall be sufficiently competent with the network capabilities.
The CSPs also must invest in the ecosystem, as 5G devices will continue to evolve in the first few years.
Network slicing’s ability to invoke reliability, redundancy, and ultra-low latency in an end-to-end
fashion is key. Such capabilities allow network slicing to facilitate a plethora of use cases, such as drone
Understanding network slicing 285
streaming videos, live sports coverage, AR/VR, and emerging use cases, as conversations about the
metaverse increase. In a blog post, Ericsson has tried to explain the relationship between the metaverse
and 5G (https://www.ericsson.com/en/blog/2022/4/why-metaverse-needs-5g).
Access to the virtual world of the metaverse is enabled by 3D eXtended Reality (XR) devices.
According to Ericsson, XR refers to technology that lets human users experience and interact beyond
their immediate physical space and reality by sight, touch, or sound. Today, XR is loosely used as the
umbrella term for AR, VR, mixed reality, and merged reality. Some of the applications of XR can include
remote working with co-workers from different locations, remote learning, shopping, or even hanging
out with a friend in a cafe in a very immersive manner. The largest aircraft manufacturer Boeing has
discussed its intentions to design its next aircraft in the metaverse (https://www.reuters.com/
technology/boeing-wants-build-its-next-airplane-metaverse-2021-12-17/).
Metaverse
Gartner defines a metaverse as a collective virtual shared space, created by the convergence of
virtually enhanced physical and digital reality. It is persistent, providing enhanced immersive
experiences as well as device independence and accessibility through any type of device, from
tablets to head-mounted displays (https://www.gartner.com/en/articles/
what-is-a-metaverse).
For an acceptable user experience, large amounts of data have to be transmitted between the AR/
VR devices, such as Microsoft HoloLens, and the edge cloud within milliseconds, with tight latency
requirements. Today, 5G is the most suitable wireless technology to facilitate connectivity for XR
applications. Network slicing makes 5G commercially feasible in such Metaverse scenarios.
• Hackers can gain access to one slice and exploit it to access sensitive data from other slices.
They could also disrupt the services provided by the other slices.
• If the underlying physical infrastructure is compromised, then potentially all the slices can be
disrupted. To prevent this, the infrastructure has to be hardened and limited to administrators.
• Hackers could initiate a Denial of Service (DOS) attack from a slice, which can then paralyze
an entire network infrastructure.
“Improper network slice management may allow malicious actors to access data from different network
slices or deny access to prioritized users.” This is according to a paper published by the National
Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the
286 5G Network Slicing
Office of the Director of National Intelligence (ODNI). (For more information, visit https://
www.bleepingcomputer.com/news/security/nsa-shares-tips-on-mitigating-
5g-network-slicing-threats/.)
To safeguard from security challenges, it is important to ensure Confidentiality, Integrity, and
Availability (CIA) for 5G network slicing protection. Advanced migration strategies can include
the following:
A detailed description of these security techniques is beyond this chapter and book.
In this section, we looked at a description of 5G network slicing as well as its challenges. Let us next
look at the architecture and design of network slicing.
• Enhanced Mobile Broadband (eMBB): eMBB is a 5G service category that assures a minimum
data transfer rate level. It is geared toward high data rates and high traffic volumes.
• Ultra-Reliable and Low-Latency Communications (URLLC): URLLC caters to the need for
ultra-low latency (such as below 1 ms each way) as well as very high reliability. It serves well
in factory automation scenarios and the control of robots, remote surgery, and Vehicle to
Everything (V2X) communication.
• Massive Machine-Type Communication (mMTC): This is best suited for IoT devices and
sensors that are often low-power but have a high density (defined by the number of devices
per square area). These devices are often low-cost, transmit small packets infrequently, and
are often delay-tolerant.
Next, let us look at how the 5G network slices use the preceding paradigm to enable the different
services according to their requirements. Figure 13.8 shows the network layer, network slice layer,
and services layer. Further, it shows how network slicing facilitates different types of services, all over
the same physical 5G network.
288 5G Network Slicing
Let us look at the high-level architecture view shown in Figure 13.9. Here, we show three network
slices with one user each. In the top slice for voice and mobility, where a user could be watching a
video on a smartphone in a restaurant, the mobility management is done in the core cloud. This will
suffice for a relatively static user while streaming video on the phone. However, on the connected
automobile, the middle slice, the mobility management is moved to the edge cloud, along with the
session management. This accounts for automobiles that are often on the move. In the bottom slice,
geared toward IoT devices, mMTC allows for very high connection densities. Usually, the data rate
may be low from such IoT devices. Mobility management is not needed for this slice.
Let us next look at the 3GPP architecture for 5G network slicing. We will list out the relevant
acronyms here:
Figure 13.10 shows how the common network functions, and those unique to each of the two slices,
are invoked to create two DNs with unique network characteristics.
Figure 13.10 shows the power of network slicing and its ability to work with DNs best suited for the
use case.
Figure 13.11 shows the architecture as swim lanes for eMBB, URLLC, and mMTC. Each network lane
here is architected for latency, throughput, and security. This eventually helps us to manage the budget
and commercial viability of the architecture, both for the network operator and users – enterprise
or consumer. The diagram shows that each slice traverses unique and common network elements.
The task of the operators is somewhat challenging, since the 3GPP standards for 5G are still in the early
stages of evolution. Automobile companies such as Telsa and Zoox are working toward autonomous
cars. Cellular Vehicle-to-Everything (C-V2X) technology will rely on network slicing and will likely
be deployed on a URLLC slice to provide ultra-low latency. As 3GPP standards mature over time,
operators will add more capabilities, leading to more commercially viable enterprise use cases in both
B2B and B2B2C scenarios.
Let us next look at Figure 13.12, which shows 3PGG 5G network architecture for a non-roaming
scenario. Note NSSF as part of this architecture.
Network slicing architecture and design 291
NSSF is a network function that is responsible for selecting the appropriate network slice for a
particular device or application. It is based on the requirements and the capabilities of the available
slices. NSSF plays a key role in enabling network slicing. When a device connects to a 5G network,
NSSF is responsible for evaluating the device’s requirements and the capabilities of the available slices,
and for selecting the most appropriate slice for the device. NSSF can also be responsible for negotiating
the terms of service for the slice, such as the bandwidth and latency requirements, and for managing
the allocation of resources to the slice.
In the context of 5G networks, AMF and SMF are responsible for managing and controlling the
different slices that have been created on top of the shared physical infrastructure. AMF is responsible
for managing access to the network and enabling devices to move between different slices and coverage
areas. SMF is responsible for managing the establishment, maintenance, and teardown of sessions
between devices and the network.
Both AMF and SMF use information from NSSF to determine the appropriate slice for a particular
device or application, based on its requirements and the capabilities of the available slices. AMF
and SMF also work with other network functions, such as the UPF and the PCF, to ensure that the
appropriate resources are allocated to the slices and that they are able to meet the performance and
QoS requirements for the devices and applications they are serving.
The gNodeB (gNB), which is a type of base station, is responsible for managing and controlling the
RAN. It manages the connection between devices and a network, and enables devices to communicate
with each other and other network elements. For network slicing, gNB is responsible for routing
traffic to and from the appropriate slice, based on the requirements of the devices and applications
it is serving. It also works with other network functions, such as AMF and SMF, to ensure that the
appropriate resources are allocated to the slices and that they are able to meet the performance and
QoS requirements of the devices and applications they are serving.
Network Slice Instance (NSI) is defined as a collection of network function instances and the necessary
compute, storage, and networking resources to create a deployed network slice. The life cycle management
of NSI is governed by the 3GPP Technical Report (TR) 28.801. Figure 13.13 shows the LCM of NSI.
292 5G Network Slicing
In this section, we looked at the architecture of network slicing in depth. We also looked at how
standards bodies such as 3GPP influence the evolution of the technical specifications and standards
of 5G and network slicing.
Let us next do a deep dive into the various use cases of network slicing.
All the preceding are good candidates for network slicing. Let us take remote surgery. The need for this
use case has two main drivers. Expert surgeons may not be locally available in many remote locations or
certain countries and cities. Furthermore, since the COVID-19 pandemic, the movement of healthcare
Use cases of network slicing 293
professionals has been restricted. Robotic arms can often perform surgery with the surgeon being in
a different location. In February 2019, the first known 5G-enabled remote surgery was performed by
Dr Antonio de Lacy in Spain. The 5G network had a 0.01-second lag. If 4G was used, this would be
0.27 seconds. Network slicing is a key enabler for this level of superior network performance to be
entrusted for remote surgeries (see https://www.openet.com/wp-content/uploads/
Openet_WP_5G_3GPP_Release_16__5G_monetisation-1.pdf).
A TM Forum report looked into the monetization of 5G. It found that network slicing-enabled B2B
services would have a significant positive impact on enterprises (see https://inform.tmforum.
org/research-and-analysis/reports/5g-future-business-models-for-
monetization/). Some of the high-value business use cases are shown in Figure 13.14.
The business use cases shown in Figure 13.14 are the key enterprise drivers for network slicing revenues
for CSPs. Next, let us try to quantify some of these revenue potentials for CSPs to justify their initial
investment in network-slicing technology.
294 5G Network Slicing
Figure 13.15 shows that a revenue opportunity of around $200 billion is available for CSPs, based on
global digitalization efforts (see https://www.5gnetworkarchitecture.com/network-
slicing-in-5g/). This figure shows the four-step calculation of how this number is arrived at.
The numbers are in billions of USD.
Figure 13.15 – The potential revenues for CSPs from network slicing
A further industry sector-wise distribution of the CSP’s revenue is shown in Figure 13.16. Healthcare
shows the largest share, followed by Government or the public sector.
The source for Figure 13.15 and Figure 13.16 is Network slicing: A go-to-market guide to capture the
high revenue potential by Ericsson and Arthur D. Little.
Next, we will look at plotting these use cases using a network slicing triangle. Figure 13.17 shows the
network requirements versus the enablers for network slicing. This provides a simple view for CSPs
as they plan their phased investment approach to the buildout of the network slicing capabilities.
In this section, we looked at 5G use cases where network slicing will facilitate widespread adoption in
the industry. We looked at how these use cases create large revenue potential for CSPs and how they
can align their strategy to industry-wise use cases, trying to capture these revenue streams over time.
296 5G Network Slicing
Summary
In this chapter, we learned about 5G network slicing. We provided a simplified definition of network
slicing. Then, we looked at the architecture of network slicing. Finally, we looked at the use cases that
are enabled by it. Overall, 5G network slicing creates multiple revenue opportunities for its operators.
It can serve multiple industry use cases without large upfront and speculative investments.
In the next chapter, we will look at connected and autonomous vehicles and the role of 5G. We will cover
the concepts and the background of autonomous vehicles and the different levels of autonomy. Finally,
we will cover different applications related to driver assistance, leading to enhanced safety in driving.
14
5G and Autonomous Vehicles
This chapter will focus on the use of 5G technologies for Autonomous Vehicles (AVs). We will cover
general concepts of Connected and Autonomous Vehicles (CAVs), as well as the 5G Vehicle-to-
Everything (V2X) technology. We will look at the high-level architecture for it. We will look at the
underlying concepts and network procedures that enable AVs to communicate with other vehicles
and the infrastructure.
The introduction of V2X will improve road safety, traffic efficiency, and the conservation of energy.
The US National Highway Traffic Safety Administration (NHTSA) has estimated that Vehicle-to-
Vehicle (V2V) systems will help to eliminate about 13% of traffic accidents. This will prevent about
439,000 auto crashes and save up to 1,000 lives in the US each year (see https://www.nhtsa.
gov/sites/nhtsa.gov/files/documents/v2v_pria_12-12-16_clean.pdf).
The maximum benefit will be seen when almost all vehicles can communicate with each other, and
the system eliminates human errors. To get to that state, government bodies such as the NHTSA, the
automobile industry, and the technology and telecommunication industry will have to work together,
along with consumers. Eventually, even cyclists and pedestrians may be able to use and benefit from
similar technology.
In this chapter, we will cover the following topics:
The connectivity can be through 5G or prior generations. General Motors (GM) and AT&T are working
together to provide 5G-equipped automobiles by 2024 (see https://www.fiercewireless.
com/5g/at-t-marks-first-5g-connected-car-deal-gm).
There were an estimated 236 million connected cars on the road as of 2021 (source: https://www.
statista.com/statistics/1155517/global-connected-car-fleet-by-market/).
A CAV can enhance safety, reliability, and security, as well as offering improved infotainment options.
In a CAV, the driver has ultimate control over the vehicle. The 5G network provides much-needed
low-latency connectivity to CAVs. 5G will facilitate the use of network slices to this end. 5G will also
allow the deployment of appropriate private mobile networks in industrial and commercial complexes.
Let us look at the details of V2V communication. It can provide the driver with awareness of 360
degrees around the vehicle and warn them about a potential crash before it happens, thereby preventing
it. V2V allows an automobile to communicate within about 300 meters, or almost 1,000 feet, with
similarly enabled vehicles.
Personal privacy is considered in V2V technology, so only required information is shared. At
intersections, it can provide a driver with assistance and guidance for safely entering an intersection.
It can provide the emergency application of brakes and warnings when it is not safe to pass a slow-
moving vehicle. V2V can adequately cover vehicles’ traditional blind spots. V2V uses a wireless protocol
called Dedicated Short-Range Communication (DSRC). DSRC, along with GPS, is what enables
V2V communications. Vehicles may broadcast their speed, acceleration, direction, GPS location, path,
and other information related to the steering wheel and transmission system.
In Figure 14.1, we can see how forward obstacle detection and avoidance and approaching emergency
vehicle warnings work with DSRC (see https://cecas.clemson.edu/cvel/auto/
systems/DSRC.html):
The DSRC protocol can be potentially used for any applications, such as collision avoidance at an
intersection, automatic vehicle safety inspection, electronic toll collection, parking payments, and
rail intersection warnings. As shown in Figure 14.2, DSRC can be used for Cooperative Adaptive
Cruise Control (CACC). This capability is useful when the other car may not be in the line of sight
and regular ACC is not sufficient.
Next, we will look at bike collision avoidance with DSRC, as shown in Figure 14.3. Through the use
of a DSRC-enabled smartphone, the position of a pedestrian or cyclist can be determined, and timely
alerts can be provided to prevent potential collisions.
We have looked at a couple of scenarios that can use DSRC to improve traffic safety. Next, we will
investigate the details of the DSRC protocol, as shown in Figure 14.4:
This DSRC protocol diagram in Figure 14.4 caters to both safety and non-safety (or general) applications.
It depicts the related IEEE protocols such as the following:
• IEEE 1609.2
• IEEE 1609.3
• IEEE 1609.4
• IEEE 802.11p
The proper use of the DSRC protocol is likely to significantly drop the number of collisions and
casualties on the road by promoting the use of data transmission for V2V scenarios. There is a new
proposal by the US NHSTA for cars to broadcast a Basic Safety Message (BSM) every tenth of a
second. The BSM will include a vehicle’s position, speed, direction, acceleration, path history, and so
on. While critics of this proposal are worried about the privacy aspects of this, if approved, this will
reduce automobile robberies through its increased ability to track them (https://freedom-
to-tinker.com/2017/06/21/killing-car-privacy-by-federal-mandate/).
A background on CAVs and their concepts 301
In the next section, we will look at the levels of driving automation and the standardization around it.
Levels of automation
Next, let us look into the details of AVs. An AV uses a combination of technologies to achieve various
degrees of autonomy and respond to external road, traffic, and weather conditions, similar to what a
human driver would do when driving a car. Figure 14.5 shows the different levels of automation for
an AV:
• LEVEL 0: No driving automation and the human driver is fully responsible for driving
• LEVEL 1: Driving assistance is provided to the human driver – e.g., ACC
• LEVEL 2: Partial automation to help the human driver – e.g., highway driving assistance
• LEVEL 3: Conditional automation in which the system can drive in some situations but
may occasionally need the human driver to step in when the system cannot handle it – e.g.,
moving off-ramp
• LEVEL 4: A high level of automation in which the system can do all the driving under certain
conditions without any human attention
• LEVEL 5: Full automation, where the system can drive the car in all situations that a human can
Audi A8 planned Level 3 (L3) automation, but it was later canceled due to the lack of industry
regulations around it. However, Mercedes-Benz Drive Pilot is considered the world’s first L3 autonomous
driving system and was first made available in Germany in May 2022. It is available as an option for
Mercedes-Benz S-Class and EQS models. The Drive Pilot feature adds about $5-10K to the cost of
302 5G and Autonomous Vehicles
We will continue to see the maturity of these pilots and limited production launches for AVs in the
near future. 5G will play a key role in these autonomous solutions due to its ability to support very
low latency, in the order of one millisecond. This enables the use of 5G in mission-critical applications
and end devices, such as ambulances leveraging smart car technology. The use of 5G, in convergence
with autonomous driving, will also facilitate the delivery of rich content to the passengers in the
car. The aviation industry is working with the automotive industry to explore flying cars. These are
commonly known as Electric, Vertical, Takeoff, and Landing (eVTOL) aircraft. eVTOL aircraft will
also use 5G for 3D navigation (https://www.frontiersin.org/articles/10.3389/
frcmn.2021.689881/full). Uber and AT&T are collaborating in this area. 5G uses the
massive Three-Dimensional Multiple-Input and Multiple-Output (3D MIMO) technology. This
5G technology will be very useful to provide the required eVTOL aerial coverage. Aerial ride-sharing
experiments are expected to begin in 2023 (https://gizmodo.com/uber-claims-aerial-
ridesharing-on-track-to-be-more-e-1835435983).
Next, let us look at the role of 5G-related associations and organizations.
Figure 14.6 – The 5GAA: the union of the automotive and telecommunications industries
In Figure 14.8, we show a full view of V2X communication and how the PC5 interface is part of
that architecture.
The high-level architecture of AVs 305
Bodies such as the 5GAA are working to drive the necessary consensus between different stakeholders
to ensure homogeneity and interoperability across the ecosystem surrounding the autonomous
automobile industry. The 5GAA advocates for a deployment band configuration for the C-V2X industry.
The 5GAA believes that a formal agreement is required for the use of specific channels to deploy
C-V2X in the 5.9 GHz band.
Next, let us look at the CAV architecture.
• An enterprise view
• A functional view
• The physical view
• The communications view
This architectural approach facilitates the design and life cycle management of Intelligent Transportation
Systems (ITSs) such as AVs. It provides a common terminology for architects, design engineers, and
306 5G and Autonomous Vehicles
The ARC-IT, in its prior form, was first developed in 1996. It provides guidelines for transportation
professionals as they devise new systems, including AVs powered by 5G. The ARC-IT provides four
views, as well as service packages, which are used to provide different service applications around
connected vehicles. Traffic Signal Control (TSC) is an example of a service package. The service
packages are grouped into 12 categories:
• Sustainable Travel
• Traffic Management
• Traveler Information
• Vehicle Safety
• Weather
In summary, the ARC-IT helps to provide a common framework and set of standards for connected
systems and ITSs.
Next, let us look at the role of public cloud providers.
5G operators are under pressure to quickly deliver the new network capabilities to both consumer
and enterprise customers. The integration of a 5G service-based architecture with hyper-scale cloud
providers such as Microsoft Azure and similar services unleashes the availability of a pool of cloud
application development talent. In other words, a massive software development pool is potentially
available to help accelerate the 5G mobile network development as well in some capacity, and the
cloud platform helps to bridge the gap.
The global developer population is 24.5 million in 2020, according to Statistica (see https://
www.statista.com/statistics/627312/worldwide-developer-population/).
SlashData estimates the global developer population to exceed 45 million by 2030 (https://
slash.co/articles/people-behind-your-tech-how-many-developers-are-
there-in-the-world/). The majority of these developers focus on public cloud technologies
these days. In summary, the convergence of 5G networks and the public cloud opens up the talent
pool for network software development.
AT&T is working on the following as part of its collaboration with Microsoft Azure:
• Testing Azure Operator Distributed Services, which will bring hybrid network support to
hosted network functions
• The development of a private 5G edge service for areas such as robotics in manufacturing, sales
support in car dealerships, and video health sensors in hospitals or clinics
• Trials of Azure public Multi-Access Edge Computing (MEC)
(See https://news.microsoft.com/2021/06/30/att-to-run-its-mobility-
network-on-microsofts-azure-for-operators-cloud-delivering-cost-
efficient-5g-services-at-scale/.)
AT&T’s private 5G edge service will be able to provide support for applications such as the use of
robotics in factories for manufacturing or latency-sensitive hospital applications. Telecommunication
companies such as AT&T and Singtel are piloting this service.
(See https://azure.microsoft.com/en-us/blog/new-azure-for-operators-
solutions-and-services-built-for-the-future-of-telecommunications/.)
Next, we will look at AV intercommunication.
AV intercommunication
The ability of a vehicle to communicate using technology such as 5G is the key enabler for AVs. Let
us look at different types of vehicle intercommunication.
AV intercommunication 309
• V2V
• Vehicle-to-Pedestrian (V2P)
• Vehicle-to-Network (V2N)
• Vehicle-to-Infrastructure (V2I)
An AV can generate as much as 4 terabytes of data per day. The 5G network comes in handy to move
such large volumes of data and use it to make timely decisions. Apart from the ability to act as a huge
data pipe, 5G acts as the vital glue between the vehicle, the driver, the Advanced Driver-Assistance
Systems (ADAS), other vehicles – both autonomous and others – cyclists, pedestrians, law enforcement,
and other infrastructure fixtures such as traffic lights or toll machines.
Let us look at how ADAS works.
ADAS
Next, we will look at the working of ADAS. Since many traffic accidents are caused by human
error, ADAS can help to prevent traffic accidents and their serious impacts on us. ADAS enables
applications such as blind spot detection, lane departure warnings, automatic emergency braking,
and pedestrian detection. Additional ADAS capabilities include automatic parking, ACC, and night
vision. Figure 14.12 shows how ADAS works (https://www.synopsys.com/automotive/
what-is-adas.html):
310 5G and Autonomous Vehicles
Figure 14.12 explains how each of the major ADAS capabilities comes into play for a stationary
vehicle or one moving on the road. These ADAS capabilities are enabled by a combination of sensing
technologies based on radar, LIDAR, cameras, and ultrasound. Purpose-built semiconductor chips,
SOCs, and electronics hardware are being developed to support these activities.
Next, let us look at the role of 5G here.
V2X and 5G
The ability of 5G to communicate with low latency is vital for these vehicle technologies. 5G networks
benefit from features such as Software-Defined Networks (SDNs) and network slicing. This allows
5G to provide latency about five times lower than 4G networks.
Bodies such as the 5GAA are driving the cross-sector consensus to enhance traffic safety and
efficiency in the transportation system for AVs. The 5GAA is fostering the convergence of autonomous
driving and mobile networks to help drive standardization. 5G acts as the vital glue between
vehicles, pedestrians, cyclists, ADAS, and AVs. The image and sound data collected by sensing the
environment and communicated between vehicles goes through machine learning tasks (see https://
embeddedcomputing.com/application/networking-5g/5g-is-paving-the-
way-for-autonomous-cars for more details).
The use of low bands such as 600 MHz for 5G can help connect vehicles as they move to remote areas
away from city centers. This is a big advantage for SOS-type calls over 5G requests for assistance in
emergencies made by drivers. On the other hand, high bands, using the millimeter wave frequencies
(24 GHz to 100 GHz), can provide high bandwidth and a higher level of user experience for both
drivers and passengers in these areas of coverage. High bands can support as much as a 10 Gbps data
rate over 5G.
AV intercommunication 311
Panasonic Connect Co. is also working with the city of Yokohama, Japan, to build out the preceding concept.
In the next section, we will investigate the role of network slicing in V2X.
• Low-latency applications: AVs can utilize 5G network slicing with low latency for real-time
and near real-time communication with the network to make critical decisions.
• High-reliability applications: To ensure the safety and prevention of auto accidents, AVs
need access to a very high degree of reliability in communications. A network slice with high
reliability and redundancy can meet this need.
• High-bandwidth applications: Applications such as infotainment in AVs are examples of a
need for high bandwidth. A network slice with high bandwidth can fulfill this need.
Thus, we can see that by properly utilizing 5G network slicing, we can serve the diverse requirements
of AVs, such as low latency, high reliability, and high bandwidth.
Let us look at a high-level architecture for network slicing in the context of V2X. According to the
European Telecommunications Standards Institute (ETSI), the end-to-end latency for V2X is about
100 milliseconds for about 1,600 bytes of messaging, with the desired reliability of 99.999%. This is
used for vehicle safety messages, such as location, kinematics, cooperative cruise control, and collision
warnings (see https://ieeexplore.ieee.org/abstract/document/8385521).
Some of the seminal ideas for the use cases for network slicing in V2X communication are included
in the Mobile and wireless communications Enablers for the Twenty-twenty Information Society
(METIS) deliverable D 7.3, published in June 2017 (to download this publication, see https://
metis-ii.5g-ppp.eu/wp-content/uploads/deliverables/METIS-II_D7.3_
V1.0.pdf).
Figure 14.13 shows the high-level architecture for network slicing for V2X applications, such as
autonomous driving slicing and infotainment slicing over the same physical network. This in principle
is not very different from the separation of critical messaging, such as the Aircraft Communications
Addressing and Reporting System (ACARS) for aircraft when they are in flight, and infotainment,
which may include movies on demand, television, or internet browsing:
312 5G and Autonomous Vehicles
In Figure 14.13, the autonomous driving slice is responsible for the reliable exchange of safety messages
in V2X, and the infotainment slice provides video and other non-critical services to the driver or
passengers. Other slices could be created for vehicle remote diagnostics and management. Likewise,
a network slice can support teleoperated driving and ensure ultra-low latency and high reliability
between the vehicle being controlled by a remote operator. For teleoperated driving, an end-to-end
latency of 20 ms is desired, with 99.999% reliability for V2N. For remote diagnostics that use V2I and
V2N, latency, data rate, and reliability are not a concern. However, for infotainment that uses V2N,
a bandwidth of a few Mbps may be needed for high-quality video streaming.
In prior generations, such as the legacy LTE-A network for connected vehicles, the Road Side Unit
(RSU) was responsible for providing different vehicle services. With the new approach, the RSU only
provides infotainment services. The virtual RSUs or access points provide reliable communication on
V2X now. This approach prevents the RSU as the single chokepoint for V2X communication.
Let us look at the network slicing of the RAN in V2X. It includes the following:
• Radio Access Technology (RAT) selection – This can be pure 5G or a mashup of other 3GPP
or non-3GPP access services. Often, multiple RATs may be configured to improve the V2I
capacity of the vehicle for different applications, such as infotainment or teleoperated driving.
• Radio Access Network (RAN) selection – Through the use of Cloud-RAN (C-RAN), often,
V2X network slicing can support the on-demand deployment of RAN functions. In this scenario,
the radio and baseband processing functionalities are split and the Baseband Unit (BBU) pool
runs in the cloud. These resources can be dynamically allocated to Evolved NodeBs (eNBs)
to meet the vehicles’ demands.
• Communication mode and primitive selection – The V2X slice configuration is mapped
to a communication mode such as sidelink or cellular communication. Likewise, a primitive
5G V2X 313
such as unicast, multicast, or broadcast can be used. A network slice for autonomous driving
may mostly use sidelink communications for localized interactions. Applications such as the
platooning of trucks may use unicast for V2I and V2N. However, multicast may be used for
accident or traffic jam warnings.
• Radio resource allocation – The 3GPP-recommended dynamic scheduling scheme adaptively
allocates radio resources based on the buffer status of UE and works well for vehicular infotainment
slices. An autonomous driving network slice may rely on semi-persistent scheduling.
• Numerology – Using different time/frequency numerology, 5G can support V2X communications.
This takes care of Doppler effects due to the high-speed movement of vehicles.
We have reviewed network slicing in the RAN. Next, we will look at network slicing of the Core
Network (CN) for V2X. This involves the following:
• Mobility Management Entity (MME) – The MME’s role in the CN is to manage the mobility,
session, and auth (authentication and authorization) procedures. A good and flexible design
principle is to enable multiple MME instances as Virtualized Network Functions (VNFs).
These interconnected MMEs can then meet the different V2X requirements.
• Evolved Multimedia Broadcast and Multicast Services (eMBMS) – This helps with the
quick dissemination of vehicle safety data in case of an accident or another emergency. The
autonomous driving network slice can be activated on the fly for multicast flows for these
safety-critical messages.
• Application servers – Traditionally, application servers run in the cloud or data centers. With
MEC, the V2X application servers can run at the eNodeB location. This allows for a reduction
in latency for V2X-related services.
After looking at the network slicing of the RAN, let us look at the slicing of the UE. On vehicular
devices, network slicing may impact certain configurations. In some cases, vehicular UE may even host
a V2X application server as a container. In these cases, a slice should be able to support the vehicular
UE to act as a storage unit for other UE nearby – for example, a pedestrian using a smartphone.
Now that we have looked at the network slicing considerations for V2X, in the next section, we will
deep-dive into V2X.
5G V2X
As we learned in the preceding sections, V2X refers to highly reliable communication between the
major components of intelligent transportation and traffic systems and their sensors. V2X requires
low-latency and high-bandwidth capabilities such as those provided by 5G.
Let us explore V2X further.
314 5G and Autonomous Vehicles
V2X technology
V2X is often used as the umbrella term for connected vehicles and the communications around
them. Figure 14.14 shows V2X communications (see https://www.autoweek.com/news/
technology/a36190311/v2x-technology/ for more details):
In Figure 14.14, we can see the interplay of V2X with V2V, V2P, V2I, and V2N. In order to foster
interoperability, there are multiple standards around V2X. 5G communications allow fast-moving
vehicles to act like a smart cluster rather than individual cars (https://www.ericsson.com/
en/news/2019/9/5g-and-v2x).
Let us look at the V2X standards next.
• IEEE 1609.11: Over-the-Air Electronic Payment Data Exchange Protocol for Intelligent
Transport Systems (ITS)
• IEEE 1609.12: Identifiers
These WAVE standards enable secure and reliable V2X communications (see https://www.
standards.its.dot.gov/Factsheets/Factsheet/80), and are meant for use by the
automotive industry, namely their engineers, as well as by transportation and traffic engineers. In
addition, the telecommunication industry must be aware of these standards to maximize the use of
5G for intelligent driving applications. The WAVE standard also applies to onboard vehicle systems
and any roadside devices, including traffic systems.
IEEE 802.11p is another important standard and it is the amendment to the 802.11 standards to
facilitate WAVE (see https://standards.ieee.org/ieee/802.11/10548/).
The IEEE 802.11 task group developed this amendment to improve upon Vehicular Ad Hoc Networks
(VANETs), which are mainly for broadcasting warning messages to nearby vehicles, such as in
emergencies or traffic congestion.
IEEE 802.11p defines how the V2X data interchange between high-speed automobiles, as well as
between automobiles and roadside infrastructure, should happen. It uses the licensed ITS band of 5.9
GHz (5.85–5.925 GHz) for communication. IEEE 802.11p deals with and improves upon the Medium
Access Control (MAC) and Physical (PHY) layers of the VANET.
In Figure 14.15, we look at the various V2X communication use cases:
As we can see in Figure 14.15, as automobiles become electric, Electric Vehicles (EVs) will require
Vehicle-to-Grid (V2G) communication. For the full potential of the V2X application, High-Definition
(HD) mapping is required, which needs 5G due to the data rate requirements.
Let us look at other applications of V2X, such as platooning trucks.
Platooning
Platooning is the collective and synchronized movement of a group of vehicles, such as a number of
trucks on the highway traveling between two cities. Figure 14.16 shows how V2V and V2I allow the
platooning of the trucks on a highway. Platooning requires semi-AVs or AVs to share a lane, with goals
such as reduced fuel use and the reduced need for braking, thereby reducing the carbon footprint and
improving overall safety in transportation. When the front truck – the Platoon Leader (PL) – brakes
or accelerates, all the remaining ones – Platoon Members (PMs) – do the same in a synchronized
fashion. With platooning, only the front truck may need an experienced driver or autonomous system
and the rest of the trucks can couple with it in a train-like fashion (https://www.ncbi.nlm.
nih.gov/pmc/articles/PMC5981612/):
Here, we saw a good application of 5G C-V2X communication. This utilizes the 3GPP specification
for communications over the sidelink by leveraging eNodeBs. Furthermore, platooning uses ACC and
its enhancement, CACC, to facilitate sensing across the whole platoon and not just the single truck
ahead. Figure 14.17 shows how C-V2X facilitates the control of the different trucks in the platoon:
5G V2X 317
In this section, we looked at the intersection of cellular technologies such as 5G and V2X communication
to drive the latest advances toward AVs. We looked at specific examples such as platooning.
We saw how in the context of V2X communication, 5G network slicing can be used to create dedicated
and optimized slices for V2X communication to meet the specific requirements of connected vehicles.
Network slicing can support different slices for different types of V2X communication, such as V2V,
V2I, and V2P.
Next, let us see how cloud computing enables V2X.
CSPs are building a vehicular cloud to support C-V2X applications. Besides traffic-related applications,
the adoption of in-vehicle mobile commerce, powered by 5G, will create new sources of revenue
for different stakeholders in the C-V2X ecosystem (https://www.forbes.com/sites/
googlecloud/2021/11/01/car-talk-how-5g-mobile-and-cloud-are-
transforming-the-automobile/). Infotainment system in the cars will get a facelift with
5G; electric cars such as Tesla support 5G today (https://www.tesla.com/support/
infotainment).
Summary
In this chapter, we learned about the convergence of 5G and AVs. We looked at the different levels of
AVs. We then looked at how V2X communication is key for AVs. We looked at C-V2X and how 5G
is an integral part of it. We looked at intelligent applications such as the platooning of trucks, which
utilizes C-V2X.
Overall, this chapter covered the foundations of AVs and their detailed architecture. We looked at
the intercommunications of AVs. Finally, we looked at the emerging applications built on top of
V2V capabilities.
In Chapter 15, we will cover 5G fixed-mobile convergence. This capability allows for the seamless use
of 5G communication wirelessly or over wire.
15
5G Fixed Mobile Convergence
This chapter will focus on 5G Fixed Mobile Convergence (FMC), which enables 5G for broadband
networks. We will look at the drivers of and challenges for 5G FMC and the architecture that facilitates
the convergence. We will discuss the initial procedures that Residential Gateways (RGs) perform to
gain access to 5G services. We will explore how 5G FMC can be made secure.
Gartner describes FMC as a “Device and infrastructure technology trend that enables the transparent
use of voice and data applications across the fixed and mobile access points” (see https://www.
gartner.com/en/information-technology/glossary/fmc-fixed-mobile-
convergence).
This chapter will discuss the considerations for the convergence technology for 5G. It will go
into the system architecture used to facilitate FMC. We will discuss structural and functional
convergence. Furthermore, we will explore the details of FMC, such as the role of Protocol Data
Unit (PDU) sessions (see https://datatracker.ietf.org/doc/draft-allan-5g-
fmc-encapsulation/08/).
In this chapter, we will cover the following topics:
• Introduction to FMC in 5G
• FMC architecture
• FMC security considerations
Introduction to FMC in 5G
FMC blurs the line between fixed and wireless mobile networks. Its goal is to create a seamless consumer
experience by leveraging the best of fixed broadband and wireless networks. With FMC, a voice call
can be transferred between a mobile or cellular network and fixed or broadband network without
any interruption for the end user. Such services are also referred to as network-agnostic services. The
biggest benefit of FMC to the consumer is convenience. It allows reaching a person by using a single
phone number, irrespective of where that person is. For businesses, it helps to improve customer
320 5G Fixed Mobile Convergence
experience. Businesses can bring their point of presence closer to the target market. Wireless 5G
provides agility, and FMC offers enterprise-grade capabilities that are traditionally limited to wired
access. Some of the common FMC use cases are listed here:
• Initiating a phone call from a home phone and then continuing the call on your smartphone
as you walk to the grocery store
• Starting a streamed movie on your home TV and then viewing it on your smartphone at a
nearby park
• Searching for a new restaurant on your home computer and then sending directions to it to
your car’s navigation system
• Having a basketball finals game watch party with your friends, who can watch the same game
at the same time and discuss it on the phone while at different locations
• Bank Automated Teller Machines (ATMs)
• Temporary offices, such as at a construction site
• A small business kiosk bringing its own network access in a large mall
• A taco truck that operates at different locations close to its customers
• Vaccination centers (mainly during the COVID-19 pandemic)
• Internet of Things (IoT) devices in a large warehouse complex
The US retail chain Dollar General used LTE-based Fixed Wireless Access (FWA) to connect 2,000 of
its 13,000 stores to the internet. This connectivity simplified technology management for these stores.
To cater to such always-on experiences and use cases, FMC requires session redirection without any
explicit intervention by the end user. While FMC focuses on the convergence of fixed and mobile
networks, we have seen similar convergence between voice and data through VoIP services, and
between home entertainment systems and audio/video content via Internet Protocol Television
(IPTV). Hence, convergence is inevitable. One oversimplified way to look at FMC from the consumer’s
perspective is that it entails one phone service, one phone number, and one phone bill every month,
for postpaid service.
FMC also has its challenges, though, and not all of them are resolved yet. Many countries allow
number portability, with separate options for mobile number portability and fixed number portability.
However, portability between fixed and mobile networks is not easily workable. Likewise, seamless
phone directory services have limitations too. Other commonly used terms for FMC are FWA and
Global Wireless Access (GWA). Verizon started 5G FWA services in four US metros, namely Los
Angeles, Sacramento, Houston, and Indianapolis, in October 2018 (see https://www.verizon.
com/business/resources/events/fixed-wireless-access-webinars/).
According to Verizon, the demand for FWC is expected to grow at an annualized rate of 73% till 2026,
globally. Often, wireless routers have cellular modems built into them. That’s handy for implementing
FMC. Many companies are working together to make the hardware requirements for FMC easier
Introduction to FMC in 5G 321
to manage for their end customers. One such example is Verizon working with Cradlepoint on the
wireband adapter (see https://cradlepoint.com/press-release/verizon-boosts-
5g-fixed-wireless-access-strategy-with-new-cradlepoint-wideband-
adapter/).
Some of the technology enablers for FMC lie in services and protocols (https://vdocument.
in/fixed-mobile-convergence-fmc.html?page=7):
SIP helps to control the communications for services such as voice calls. The user agent in Figure 15.1
might be a smartphone or a softphone. SIP can run over Transmission Control Protocol (TCP),
User Datagram Protocol (UDP), and Stream Control Transmission Protocol (SCTP), which are
common protocols for the transport layer. A SIP INVITE request method can be used to invite
another party to a call session. More details about SIP functions can be found here: https://www.
extrahop.com/company/blog/2016/sip-protocol/.
Figure 15.2 shows how RTP facilitates data transfer while control signals can leverage RTCP between
the senders and receivers.
IP Multimedia Subsystem
IMS plays a key role in the unification of broadband and fixed/wireless networks. IMS is also the glue
between FMC and traditional voice services. A simplified view of IMS is shown in Figure 15.3. In
summary, IMS is an open standard for facilitating voice and multimedia communications over packet-
based IP networks. Therefore, it plays a key role in network convergence. IMS is maintained by 3GPP.
Introduction to FMC in 5G 323
IMS often uses the IETF SIP protocol. According to 3GPP, IMS is key for FMC. Voice over LTE (VoLTE)
is based on IMS. IMS also supports roaming and internetworking with existing network services,
such as Public Switched Telephone Network (PSTN). Service-level convergence is provided by IMS.
In this section, we looked at the enabler technologies for FMC. Let us look at a simplified view of FMC
in Figure 15.5. It shows the logical convergence of the network, device, and services.
In Figure 15.5, the bottom left refers to wireless mobile networks and the right-hand side refers to
fixed broadband access. Together, these network infrastructures facilitate services such as voice, data,
audio, and video streaming, as well as home entertainment services such as IPTV.
Introduction to FMC in 5G 325
Let us next look at the regulatory bodies and organizations that have played an active role in the
FMC space.
• British Telecom
• NTT
• Rogers Wireless
• Brasil Telecom
• Korea Telecom
• Swisscom
The purpose of this alliance was to encourage the seamless integration of mobile and fixed telephone
services (technological convergence). To this end, the FMCA started working closely with Standards
Development Organizations (SDOs) and other similar organizations, such as these:
The FMCA did not focus on standards development for FMC; rather, they focused on advocating for
the adoption of convergence and related technologies. However, the demand for its services declined
and the FMCA stopped functioning in 2010.
Let us next look at the Broadband Forum.
pandemic. The convergence of voice communication with 5G is part of this. The Broadband Forum
works closely with 3GPP to facilitate functional network convergence.
To drive WWC, the Broadband Forum works with 3GPP on how fixed access can integrate 5G core
(see https://www.nokia.com/networks/core/5g-core/#WhatIsSA5GC).
5G Core includes functionalities such as the following:
Broadband Network Gateway (BNG) allows an operator to converge wireline and fixed-wireless
access. BNG acts as an access point for network subscribers and allows them to connect and consume
broadband services. BNG permits an operator to deliver a better subscriber experience, adding reliability,
affordability, and seamless customer experience. Figure 15.6 shows how multi-access BNG works.
Single-access technology often falls short of providing the right connectivity to users. FMC helps to
overcome this problem. Control and User Plane Separation (CUPS) is a good standard to follow
for multi-access. It allows the integration of wireless broadband and wireline services with 5G Core.
Residential services have evolved over time from dial-up internet to Digital Subscriber Lines (DSLs).
Solutions such as Nokia’s BNG help operators provide a range of services, including gigabit internet,
High-Definition (HD) video streaming, IPTV online gaming, and social media.
Introduction to FMC in 5G 327
Fixed wireless convergence using multi-access edge helps to overcome the last-mile problem. The
last-mile problem refers to the gulf between the network provider’s infrastructure and the consumer
or business infrastructure, such as the home or office where the service is consumed. Often the last
mile is a greater challenge outside of major metropolitan areas. It is not feasible or cost effective to
lay fiber to every home or office where the service is required. Figure 15.7 illustrates the last-mile
problem, including the Optical Network Termination (ONT). The backbone of the internet is often
a fiber network.
Often, it is not cost effective to lay fiber to every building and replace the older copper or similar cables.
A Fixed-Wireless Access Gateway (FWAG) often becomes an alternative in such cases.
Today, telecommunications providers want to offer their subscribers services that can leverage both
the fixed network, whether it is DSL or cable internet, and mobile or cellular networks. Today, an
average US household uses more than 10x the amount of data over their fixed network than over their
mobile network. The consumption of broadband data has increased during the COVID pandemic, due
to the work from home phenomenon. Conservative estimates describe a 30% increase in broadband
use per average US household over the pandemic (https://www.consumeraffairs.com/
news/americans-increased-broadband-use-by-30-percent-during-the-
pandemic-040821.html). The use of web conferencing services such as Zoom and associated
data increased 300% in some cases.
We envision that 5G Core will become integral to the convergence of fixed network and cellular services
over time (https://techblog.comsoc.org/2021/12/04/mobile-experts-on-
the-state-of-fixed-mobile-convergence-in-the-u-s-telecommunications-
market/). In the US market, the three major mobile wireless providers are Verizon, AT&T, and
T-Mobile, each with an estimate of over 100 million subscribers. The top fixed broadband providers are
328 5G Fixed Mobile Convergence
Comcast and Charter Communications (which includes Spectrum Cable). However, AT&T, Verizon,
and T-Mobile also have sizable fixed broadband market shares. Hence, the convergence of services is
imminent. Some of the advantages of convergence are these:
• Standard interfaces
• Unified authentication
• Unified resource management
FMC will allow the 5G Core network to function independently and be decoupled from access
modes. FMC will enable users to be authenticated by a single operator. Overall, it will simplify
resource management (see https://www.zte.com.cn/global/about/magazine/
zte-technologies/2018/5-en/Special-Topic/1.html).
FMC is not limited to 5G; rather, it is available with LTE. However, with 5G, the convergence of cloud
networks, Virtual Network Functions (VNFs), and service functions allows FMC to provide diverse
applications to the consumer. Figure 15.8 provides a broader view of FMC.
In this section, we looked at why FMC is needed and how it helps to bridge the last-mile gap in network
services. Let us look at FMC’s architecture next.
FMC’s architecture
Figure 15.9 shows FMC’s architecture. This figure highlights the separation of CPs and UPs, or the
concept of CUPS. This helps to improve manageability for providers.
The architecture shown in Figure 15.9 supports the centralization of the Control Plane (CP) and the
use of cloud infrastructure for scaling. This architecture allows a distributed User Plane (UP). Overall,
CUPS enables the use of both virtualized and physical infrastructure for CP and UP functionality.
It also gives us the flexibility to independently deploy and maintain the CP and UP functions, often
referred to as CPFs and UPFs, respectively. This composability allows flexibility in the upgrading of
the hardware and software infrastructure and loosely couples the CP and UP.
The Broadband Forum’s specification TR-459 provides details on how to separate the UPFs and CPFs. It
describes three interfaces for this purpose (https://onestore.nokia.com/asset/210510):
Next, we will look at how the separation of the CPFs and UPFs works, along with the disaggregation
of the UP (as in the use of physical and virtualized infrastructure). For more details, see Figure 15.10:
Figure 15.10 supports off-loading broadband internet and video traffic from 5G Core. This will facilitate
infrastructure scalability for fixed-wireless and mobile gateway network functionality.
Let us next look at the need for the 5G Residential Gateway (5G-RG). The 5G-RG is needed to
realize the full range of benefits of 5G for wireline. It can help to implement Quality of Service
(QoS) and improve overall reliability. The 5G-RG can be used to steer network traffic among access
technologies based on Key Performance Indicators (KPIs). These KPIs can be latency or throughput.
During the COVID-19 pandemic, the demand for home broadband increased. As a result, residential
customers' expectations of network operators have increased, and they now have to provide increased
reliability (https://www.broadband-forum.org/why-residential-gateways-are-
essential-for-wireless-wireline-convergence?cn-reloaded=1).
The use of the 5G-RG allows network operators to deliver an enhanced user experience to residential
customers, as shown in Figure 15.11.
FMC’s architecture 331
The 5G-RG can also enhance the security of a system. In combination with 5G Core, it can facilitate
a secure and separate session for device management. However, depending on the industry sector,
enterprise customers may have to look at the regulatory compliance that applies to them. Two examples
of such industry compliance are Payment Card Industry (PCI), which applies to the handling of
credit card information, and Health Insurance Portability and Accountability Act (HIPAA), which
applies to medical and health records. Enterprise users of FMC may need an additional end-to-end
security model to ensure their industry-specific regulatory compliance.
Since 5G enables the availability of an access-neutral service, it can be seamlessly made available over
5G New Radio (3GPP access) or Wi-Fi and other wireline access networks (non-3GPP access). This
non-3GPP access can take the following forms:
• Untrusted non-3GPP access networks: This uses Non-3GPP InterWorking Function (N3IWF)
• Trusted Non-3GPP Access Networks (TNANs): This uses Trusted Non-3GPP Gateway
Function (TNGF)
• Wireline access networks: This uses the RG and the Wireline Access Gateway Function (W-AGF)
In this section, we looked at the architectural considerations for FMC. In the next section, let us look
at the security considerations for FMC.
332 5G Fixed Mobile Convergence
SIP security
SIP is vulnerable to cybersecurity attacks if not properly secured. SIP security is based on the following:
• Authentication
• Confidentiality
• Other security functions
Defense-in-depth
This is a cybersecurity concept where several independent layers are used to strengthen overall
security. National Institute of Standards and Technology (NIST) defines it as an “Information
security strategy integrating people, technology, and operation capabilities to establish variable
barriers across multiple layers and missions of the organization.”
Source: https://csrc.nist.gov/glossary/term/defense_in_depth
Secure SIP is one way of securing SIP communication and was first described in SIP RFC 3261
(https://www.ietf.org/rfc/rfc3261.txt). This helps to secure the sending of SIP
messages through a Transport Layer Security (TLS) encrypted channel. TLS is commonly used for
the security of HTTP sessions. TLS can be used to protect SIP session communications. It can prevent
eavesdropping or tampering with SIP messages. Hence, one way to secure SIP communication is to
limit the use of SIP devices that support secure SIP. This will improve the overall security of VoIP
networks and FMC.
FMC security considerations 333
One way to enhance secure SIP communication is to mandate the use of Message Digest (MD5)
authentication by all UAs and SIP proxy servers. This hardens the handshake between the SIP proxy
server and the SIP UA by adding an authentication challenge.
Figure 15.12 shows authentication and proxy-based security. A single security certificate can be used
to encrypt and sign a message for a related group of clients, for example, members of an organization,
to make it more efficient. The SIP proxy takes the role of signing and encrypting SIP messages. The
private key for security will reside centrally on the proxy server. This works well for a call center
relying on FMC.
In addition, the use of Secure Multipurpose Internet Mail Extensions (S/MIME) to encrypt information
with an SIP message is another effective way to secure it. See https://learn.microsoft.
com/en-us/exchange/security-and-compliance/smime-exo/smime-exo for
more information on S/MIME and how Microsoft uses it for email security.
Figure 15.13 shows the S/MIME-based security paradigm.
The sending UA (Alice) creates multipart/signed S/MIME SIP messages. The UA uses the private
key to sign the body of the MIME message. The receiving UA (Bob) decomposes the message to
get the public key and validate the authenticity of the message. If there are signs of tampering in the
message, then remedial actions can be taken and a cybersecurity breach can be prevented. More
details about securing SIP can be found in this research paper: https://www.researchgate.
net/publication/41392312_Towards_Public_Key_Infrastructure_less_
authentication_in_Session_Initiation_Protocol.
By using a combination of SIP security mechanisms, we can implement defense-in-depth.
Next, we will look at UMA security.
UMA security
The security concerns of UMA are broadly as follows:
• Authentication
• Encryption
UMA authentication has to rely on Subscriber Identity Module (SIM) or Universal SIM (USIM).
SIM uses the A3/A5/A8 algorithms for security. USIM supports the F8/F9 (KASUMI) and MILENAGE
algorithms as well. For encryption, UMA relies on Wi-Fi security and IPSec (https://www.3gpp.
org/specifications/60-confidentiality-algorithms).
A security gateway helps to overcome some of the security challenges of UMA. A security gateway
provides the required confidentiality and data security for subscribers of FMA. The security gateway
does this by using IPSec tunnels to encapsulate the call and its signaling data. When the user’s handset
roams between wireless and 5G, the security gateway assists in the authentication and registration of
the user and their privileges.
Next, we will look at some UMA-security-related work done by Cisco several years ago along these
lines. See https://www.cisco.com/cdc_content_elements/flash/mobile_sols/
partners_site/pdfs/partners/kineto/CTIA_Tear_Sheet.pdf.
Figure 15.14 shows how Cisco secured their UMA architecture using a security gateway.
FMC security considerations 335
Cisco provides an enhanced UMA security gateway to offer a layered defense-in-depth approach that
protects VoIP communication.
• IP TLS
• The policy and control layers
• The application/service layer
336 5G Fixed Mobile Convergence
FMC relies on the multi-layer security paradigm. Threats could be external, such as SQL injections,
viruses, worms, Trojans, and zero-day vulnerabilities, or they could be internal to the organization.
Let us look at the security of the different layers.
IP TLS
Here we will mainly look at the security of the data plane and network protocols. Securing the data
plane prevents spoofing, and the use of Access Control Lists (ACLs) allows the dropping of all traffic
from a suspicious IP address range. In addition, IP fragment filtering can help to block fragmented
IP packets. This helps to prevent Denial of Service (DoS) attacks.
Network protocol security covers Border Gateway Protocol (BGP), Secure File Transfer Protocol
(SFTP), Secure Shell (SSH), and more.
Using stateless firewalls, an FWA provider can ensure that packet header inspection can take place
and decide whether a packet is allowed into the network. Stateful firewalls can be deployed to monitor
and control traffic. Packets that are not permitted can be dropped according to stateful firewall rules.
Firewalls should be SIP-protocol-aware to provide additional security in FWA. The use of VPNs with
IPSec can further enhance security. SIP firewalls can prevent man-in-the-middle attacks and prevent
authorized users from accessing voice mailboxes, call logs, directory services, and so on. Billing fraud
attacks have to be prevented as well.
(See https://benunetworks.com/cloud-native-bng-integrates-sase-and-
5g-agf/.)
In this section, we looked at the security considerations for FMC. We looked at how to create robust
security for FMC.
Summary
In this chapter, we looked at the factors driving the need for FMC. We looked at how FMC works and
the industry standards around it. Then, we looked at the architectural details for FMC. Finally, we
looked at the security concerns of FMC and how to overcome some of those concerns.
In the next chapter, we will learn about 5G and satellite communications. We will learn about recent
developments in non-terrestrial networks that can be used to improve the overall capabilities of
5G networks.
16
5G and Satellite
Communications
This chapter will focus on 5G and Satellite Communications (SATCOM). The rapid growth of 5G
services over the next few years will lead to advances in many complementary services. Terrestrial
mobile networks include 5G wireless services as well as fixed mobile convergence, which we studied
in Chapter 15. We are now seeing the capabilities of Non-Terrestrial Networks (NTNs), which can
extend and augment 5G cellular networks. This is enabled by SATCOM.
The coverage of satellite communications has increased in recent years and the cost has gone down.
This allows unique capabilities through the integration of satellite communications with Terrestrial
Networks (TNs) such as 5G cellular technology. Some recent developments include announcements by
Apple such as the emergency service for iPhone 14, internet service in Ukraine using Starlink systems,
as well as major 5G service providers announcing or already providing satellite-based coverage to
their subscribers. About 5 billion people have internet access today (https://datareportal.
com/global-digital-overview), which implies over another 3 billion could be connected.
For this purpose, the extension of 5G by using satellite communication on smartphones will be key.
In this chapter, we will cover the following topics:
The increasing connectivity of consumers also leads to the greater use of social media as well as mobile
commerce. About 60% of users in the age group 16 to 64 with internet access make online purchases
weekly. The amount of mobile purchases is increasing. In 2021, online purchases of consumer goods
exceeded $3.8 trillion in the US.
The United Nations (UN) has a goal of connecting 90% of the global population to the internet by
2050 (https://transhumanica.com/asts). Such efforts could be accelerated by making all
or the majority of smartphones satellite phones. This could help to overcome the growing cost of cell
towers as well as issues with geo-political boundaries and hard-to-access terrains. The Iridium and
Starlink systems are pioneering efforts in this direction. However, the cost of these systems has to
come down to allow mass adoption. If regular smartphones can be easily adapted to utilize a satellite
communication system, it will be a breakthrough on this front.
AST SpaceMobile is working on the BlueBird satellite program, toward this goal (https://
spacenews.com/operational-ast-spacemobile-satellites-could-proceed-
without-prototype/). Their proposed approach uses large satellites with a modular design that
can allow smartphones to directly communicate with a satellite-based cellular system. The Federal
Communications Commission (FCC) granted AST a license for their experiment, in May 2022, to
test out BlueWalker 3 services in Texas and Hawaii.
Lynk (https://lynk.world) and Société Européenne des Satellites (SES) are working toward
similar goals of connecting smartphones with satellite communication. SES had about 50 Geostationary
Equatorial Orbit (GEO) and 20 Medium Earth Orbit (MEO) satellites in 2022. Figure 16.2 shows
the O03 MEO satellite system.
Introduction to satellite communications 341
Lynk started working on this idea after they saw the need to connect front-line health workers in
Africa during the Ebola outbreak. They started working on the universal mobile broadband initiative
in 2014. They realized that only 25% of the earth’s landmass had cell coverage. Besides, oceans had no
cell tower coverage. The use of dedicated satellite phones, which have bulky antennas and a large power
supply but no LTE or 5G coverage, has proved that consumer-grade satellite communication is feasible.
However, the next landmark is the convergence of smartphones and satellite phones. See Figure 16.3.
On December 1, 2022, Apple iPhone Emergency SOS via satellite was put to use, helping to rescue
a person stranded in snow in Alaska. The Apple emergency response center alerted the proper local
authorities, the Alaska State Troopers, in a timely fashion, when the person in a snowmobile was lost
in an isolated area. The “accuracy and the completeness” of the satellite-driven alert from the iPhone
was impressive and shows that the convergence of 5G and satellite communication is already working.
This service was launched by Apple on November 15, 2022. This is clear evidence that we are ready
to put NTN systems to work with smartphones and make such services available to consumers (see
https://9to5mac.com/2022/12/02/use-of-emergency-sos/ for more details).
342 5G and Satellite Communications
The Apple website provides details of how this service works on iPhone (see https://support.
apple.com/en-us/HT213426). Figure 16.4 shows the screenshots of the SOS (which is derived
from the phrase Save Our Ship) steps.
Let us see, in Figure 16.5, the high-level architecture of the satellite-based SOS system. The Apple
iPhone 14 model includes the hardware component and required antenna to communicate with 48
Low Earth Orbit (LEO) satellites from a company called Globalstar. The first 2 years of this service
are free to consumers.
Figure 16.5 shows the high-level approach.
Introduction to satellite communications 343
In Figure 16.6, we look at the next level of architectural details for this solution. We can see that the
Gateway (GW) to the Globalstar LEO satellite uses C-band, while the satellite-to-device connection
uses S-band and L-band for communication.
• Control segment
• Space segment
• User segment
Introduction to satellite communications 345
The control segment is the earth-based system that manages the satellite communication system. The
space segment is a Geosynchronous Equatorial Orbiting (GEO) satellite that goes around the earth.
The user segment is the GPS device in the car or, going forward, the smartphone.
The GEO satellite orbits about 35.8 kilometers above the earth and the propagation delay for the round
trip is about half a second. While for location services, a 0.5-second delay may be acceptable, it may be
too much latency for other services typically supported by a smartphone. LEO satellites significantly
reduce the latency to below 50 milliseconds.
In the context of the positioning system, we often reference the Global Navigation Satellite System
(GNSS). GNSS consists of a constellation of satellites, around the earth. This collection of satellites
transmits a signal with positioning and timing data to GNSS receivers. This information is used to
determine the precise location on the earth (https://www.euspa.europa.eu/european-
space/eu-space-programme/what-gnss).
A nice video explaining GNSS can be found here: https://www.youtube.com/
watch?v=gffG5sTegT4&t=157s
Next, we’ll look at considerations for satellite communication in 5G.
346 5G and Satellite Communications
Satellite communication in 5G
Satellite communication adds the satellite network to the network infrastructure of 5G. Since satellites
have a global reach, they can be used for the following:
The backhaul segment of the 5G network can utilize satellite services. Smartphones such as Apple
iPhone 14 having the ability to directly communicate as a user terminal opens many other possibilities.
Figure 16.8 provides a high-level vision for the future of communication systems leveraging satellites
over urban, rural, and remote areas of the earth.
Next, let us look at the organizations that influence 5G and satellite communication.
The 3rd Generation Partnership Project (3GPP), which is the umbrella term for Standards
Development Organizations (SDOs) related to mobile telecommunications, refers to NTNs and
satellite communications in its Release 17 (Rel-17) and Release 18 (Rel-18) (https://www.3gpp.
org/news-events/partner-news/ntn-rel17).
The Rel-17 NTN topics are of general interest to both mobile- and space-related companies as well as
chipset and hardware system manufacturers. The 3GPP specifications target satellites in GEO, MEO,
and LEO, as shown in Figure 16.9.
The 3GPP Rel-17 specification targets use cases such as the following:
NB-IoT is for lower data rates and infrequent IoT device communication. eMTC allows higher data rates
and more overall throughput, including MIoT use cases in industry domains such as transportation,
supply chain and logistics, and even smart agriculture. There were some competing features in NB-IoT
and eMTC. In June 2017, 3GPP Rel-15 reached a consensus and resolved those issues.
The initial work for NTN started with Release-15 in 3GPP RAN Working Group 1 (WG1) in June
2017. It stated that NTNs will be integral to 5G service deployment by doing the following:
• Enabling ubiquitous connectivity to public safety and IoT devices where the 5G terrestrial
network is lacking
348 5G and Satellite Communications
• Adding resistance to natural disaster impact to cell services and towers, such as during
earthquakes, fires, hurricanes, flooding, and tsunamis
• Enabling 5G-RAN connectivity
• Enabling 5G services in aircraft, hot air balloons, and drones, as well as mid-ocean ships
• Enabling scenarios that involve terrestrial and in-flight objects
These things together help to add a) service ubiquity, b) service continuity, and c) service scalability
to 5G networks.
Next, let us look at the contributions of 5G Americas.
5G Americas
5G Americas, formerly called 3G Americas and 4G Americas, is an industry association involved in the
development of 5G and related standards for the Americas (https://www.5gamericas.org/).
In its white paper on the future of mobile communications, 5G Americas states that satellites and
NTNs will extend interconnections to a three-dimensional space (https://www.5gamericas.
org/mobile-communications-toward-2030/). This will support very dense device
connections. Apart from GEO, MEO, and LEO satellites, balloons, drones, and aircraft may also help
to extend NTNs’ connectivity, in the long run. Likewise, future quantum communications may also
be facilitated by NTNs.
In its publication titled 5G and Non-Terrestrial Networks, 5G Americas discusses how 5G services will
help to bridge the digital divide by leveraging satellite-based communication in conjunction with the
communication infrastructure in place (https://www.5gamericas.org/5g-and-non-
terrestrial-networks/).
Next, let us look at the ITU and its role.
The ITU
The International Telecommunication Union (ITU) works toward the enablement of the digital
economy and has over 900 members (https://www.itu.int/en/about/Pages/default.
aspx).
The ITU is a UN-specialized agency with a focus on IT and communications strategies. The ITU was
founded in 1865, with the goal of facilitating connectivity in communication networks globally. The
ITU’s goal is to connect everyone around the world to the internet. The ITU Academy also offers
advanced training in the area of 5G (https://academy.itu.int/training-courses/
full-catalogue/5g-advanced-mobile-broadband-internet-and-new-services).
The ITU has championed the affordability of smartphones globally. According to its publication, a 10%
increase in access to mobile broadband would lead to a 1.5% increase in the Gross Domestic Product
Introduction to satellite communications 349
(GDP) (https://www.broadbandcommission.org/working-groups/smartphone-
access/). Satellite communication will be key in the additional reach of mobile broadband. The
Broadband Commission for Sustainable Development is working to reduce the price of entry-level
smartphones to make them more affordable.
The availability of 5G services opens up opportunities for Mission-Critical Services (MCSs). The
types of applications supported by 5G and their availability in remote areas can include the following:
These are some examples of how the intersection of 5G and satellite communication will contribute
to economic growth in many parts of the world through the adoption and availability of superior
technology. This will generate better employment opportunities as well. This ties into the UN’s
Sustainable Development Goal 9 well, which relates to building resilient infrastructure and promoting
inclusive and sustainable industrialization, as well as fostering innovation (https://sdgs.
un.org/2030agenda). The 5G and satellite communication network would fall under the resilient
infrastructure that would promote industrialization.
The article by the ITU titled Space for change: satellites in the service of digital transformation paints
a picture of a satellite-enabled future and their role in connecting smartphones to drive digital
transformation (https://digital-world.itu.int/space-for-change-satellites-
in-the-service-of-digital-transformation/).
Next, we’ll look at TM Forum.
TM Forum
TeleManagement Forum (TM Forum) is an alliance of over 850 companies promoting technology
services and breaking down technological and cultural barriers. TM Forum helps communication
service providers by connecting them to the broader ecosystem, enabling them to capitalize on new
opportunities such as 5G and satellite communications (https://www.tmforum.org/about-
tm-forum/).
TM Forum provides a 5G monetization and Return on Investment (ROI) toolkit for its members.
TM Forum published an article about Ericsson, Qualcomm, and Thales testing satellite technology for
different aspects of 5G NTNs in France (https://inform.tmforum.org/features-and-
opinion/will-5g-trial-be-a-game-changer-for-satellite-connectivity/).
One of the goals of the previously mentioned experimentation is to ensure that not only can 5G NTNs
provide a backup to disruption to regular 5G networks but they can also be regularly used for specific
350 5G and Satellite Communications
purposes such as for national security and critical public services. In addition, support for global
roaming services for IoT devices is being investigated. The cost of satellites and Customer-Premise
Equipment (CPE) remains a concern today.
Let us next look at ATIS.
ATIS
The Alliance for Telecommunications Industry Solutions (ATIS) has over 150 member companies
that work together to advance 5G-related standards, robocall mitigation, IoT, smart cities, cybersecurity,
and so on. ATIS is one of the seven SDOs affiliated with 3GPP (https://www.atis.org/
wp-content/uploads/2022/03/2022-Overview.pdf).
ATIS focuses on open programmable 5G, as well as research on Artificial Intelligence (AI) and
Machine Learning (ML) in 5G. ATIS has a group called 5GORR, or the 5G Operational and
Regulatory Requirements group. 5GORR is looking into non-public or private 5G networks that
can operate in factories, wind turbine farms, oil rigs, university campuses, and other public facilities.
Often, these non-public locations may need to use satellite communication to connect between
different locations. ATIS also facilitates 5G-related interoperability testing. ATIS is recognized by
the American National Standards Institute (ANSI). ATIS is also a member of ITU and the Inter-
American Telecommunication Commission (CITEL).
ATIS often publishes thought leadership papers on futuristic use cases of 5G. One such publication is
titled 5G Supply Chain Standard: Creating the Foundation for Assured 5G Networks. It discusses a phased
approach, 1) Awareness, 2) Insight, and 3) Assurance, to help build a global, robust 5G supply chain
system (https://www.atis.org/resources/atis-5g-supply-chain-standard/).
Next, let us look at any possible challenges to satellite communication, especially due to 5G.
• Satellite backhaul: When a suitable terrestrial network is lacking, we can use fixed satellite
backhaul to single small cells and base stations. This can support eMBB and provide 5G
connectivity in regions lacking cellular infrastructure. Some degree of IoT application support
can be provided via mMTC.
• Connecting homes and premises: Homes and offices can be provided broadband services as
an alternative to installing fiber optic cables in rural and semi-rural areas. The use of distributed
small cells can provide this connectivity. Overall, fixed wireless access will promote connectivity
for underserved areas as well.
• Mobile assets and platforms: Mobile infrastructure assets such as ships, trains, airplanes, postal
delivery trucks, taxis, and cars require roaming capabilities as they may traverse localized 5G
cellular networks. Such mobile assets are good candidates for a 5G satellite network.
• On-demand services: A 5G satellite network can be used for content on-demand downloads
in low-density areas. Imagine a government university providing online courses or degrees to
students living in the desert or mountainous areas. They could download the content in regular
intervals leveraging satellite multicasting.
We looked at the need for SATCOM in the context of 5G in this section. Next, we will look at the
architectural needs to support that.
• Geostationary Earth Orbit (GSO): Some examples include the PanAmSat, Intelsat, and
Inmarsat satellite systems
• Medium Earth Orbit (MEO): The Galileo satellite and GPS are some examples.
• Low Earth Orbit (LEO): Starlink, Viasat, Iridium, and Globalsat are some examples.
Figure 16.11 is a diagram of the different types of satellite orbits around the earth. Many of these
satellites co-exist with the terrestrial networks to create a 5G satellite-based network.
Figure 16.11 shows that GEO satellites cause a latency of 600-800 milliseconds (ms) for the roundtrip.
This roundtrip latency drops down to 125-325 ms for MEO, and for LEO, to 30-50 ms. The power
needed by end user devices is greater when using GEO or MEO. LEO allows direct connectivity with
a smartphone as User Equipment (UE) due to low power requirements as well as low latency.
The architecture of 5G and satellite communications 353
Figure 16.12 shows the characteristics of the GSO, which stands for geostationary orbit, and
Non-Geostationary Orbit (NGSO) platforms (MEO and LEO) for satellites.
Figure 16.13 shows that NTN-related specifications started with R-17 and R-18 adds enhancements to
it. 3GPP R-17 started support for NTN and that has led to greater adoption of satellite communication
with 5G by service providers. R-18 will add support for cellular drones.
354 5G and Satellite Communications
R-17 supports bent-pipe and transparent architecture for satellite communication. This implies the
information transmitted from earth to the satellite is sent right back. Pictorially, i creates a shape like a
bent pipe, as shown in Figure 16.14. This is the simplest form of satellite communication. The satellite
may amplify the signal received from earth. The satellite does not do any other complex processing to
the signal, keeping its systems simple. The satellite acts like a passive repeater in this case.
Let us look at the impact of a voice call using bent-pipe versus crosslink technology, as shown in
Figure 16.15. The latency between the satellite phone and the landline would be lower due to a single
satellite hop. Globalstar and Inmarsat use such bent-pipe technology. On the other hand, Viasat and
Iridium use crosslink technology, which can reduce the quality of voice communication and add
latency for certain scenarios as the signal transmission time may increase. It requires a mini modem
and router in each LEO satellite (https://www.satellitephonereview.com/networks/).
There are a few other alternatives to bent-pipe architecture, such as regenerative architecture and
onboard processing architecture. In the regenerative architecture, the satellite processes the signal
before retransmitting it.
We can see in Figure 16.16 that the Core Network (CN) is terrestrial, and the Radio Access Network
(RAN) is in the satellite. In the case of bent-pipe architecture, both the CN and RAN are terrestrial,
keeping the satellite’s system simple. In this scenario, the satellite systems may also do error correction
and signal quality improvement before retransmitting it. In the onboard processing architecture,
the satellite may perform tasks such as error correction, encryption, and modulation. This makes
the onboard processing more complex. However, it can make the satellite system more reliable and
efficient. It drives up the cost of satellite systems.
Knowledge of 3GPP specifications such as R-17 and R-18 and their coverage of NTN helps to decide
which satellite system to utilize when architecting a satellite-based 5G solution. While LEO provides
lower latency (30 to 50 ms), it will have lower geographical coverage when compared to MEO/GEO.
In turn, MEO and GEO have a lower deployment cost per unit of geographical coverage. For an LEO
system, there will be different satellites in view of the UE, leading to handoffs. That can make the
design of the 5G system more complex.
356 5G and Satellite Communications
Next, let us look at the different spectrum frequencies allocated by 3GPP for NTN. There are two main
Frequency Range (FR) groups, namely FR1 and FR2, as shown in Table 16.1:
For NTN, 3GPP has ratified the following S-band and L-band for FR1:
• S-band: It ranges from 1,980-2,010 MHz and 2,170-2,200 MHz. As per the ITU, S-band is
for use in satellite and terrestrial components of International Mobile Telecommunications
(IMT) frameworks.
• L-band: Certain parts of this band are used for Maximum Segment Size (MSS). It depends on
the GSO or NGO composition. Note that 3GPP cannot dictate the use of such bands for NTNs
universally. Some countries may have different local use of this band for terrestrial use. The
ITU helps to co-ordinate between the countries in such cases for satellite and mobile network
operators (https://www.itu.int/en/ITU-R/terrestrial/broadcast/
Pages/Bands.aspx).
In Figure 16.17, we see the high-level NTN architecture spanning urban, rural, and remote area
coverage. For urban coverage, we see the use of Unmanned Aerial Vehicles (UAVs) or drones. AT&T
has tested cell on wings to provide 5G coverage for about 10 square miles using a drone.
Let us look at the two common types of satellite-based NTN communications. In Figure 16.18, we see
the first scenario, where only one satellite is involved in the communication and both the sender and
receiver are communicating with the same satellite. In this context, UAS refers to unmanned aerial
systems and ISL stands for inter-satellite link.
In scenario 2, as shown in Figure 16.19, we see there is more than one satellite involved in the NTN
communication. The satellites communicate with each other via the ISL. In this case, the sender and
the receiver are communicating with different satellites. In a general case, there can be more than two
satellites involved for the ISL part.
According to 3GPP TR 38.82117, the two typical scenarios of a satellite-based NTNs providing access
to UE are depicted as follows:
Finally, in Figure 16.20, we look at the TN and NTN communication scenario based on the interoperability
of GEO and LEO satellites, to provide global coverage.
With support for the three different scenarios of NTN-based communication, 5G can truly provide a
global reach and overcome the lack of terrestrial cell towers in every part of the earth – the land and
the oceans (https://www.5gamericas.org/wp-content/uploads/2022/01/5G-
Non-Terrestrial-Networks-2022-WP-Id.pdf).
Let us evaluate security implications next. Under the NTN architecture, the current 5G security
considerations will apply to NTN and 5G communication. The key considerations will remain as follows:
Privacy may emerge as the next consideration for this area. With mobile UE, the location and movement
of people or assets can be subject to privacy requirements. We may see future evolutions of security
implementations at the interface of the satellite GW and current 5G systems.
The architecture of 5G and satellite communications 359
Let us discuss the security measures for 3GPP (untrusted and trusted) for New Radio (NR)-based
access. Figure 16.21 shows an untrusted scenario per the 3GPP TS 23.501 specification. It uses the
Non-3GPP Interworking Function (N3IWF).
Figure 16.22 shows a trusted scenario, which relies on the Trusted Network Gateway Function (TNGF).
Finally, we’ll look at the security considerations for NTN- and TN-integrated communication. This
scenario is shown in Figure 16.23.
360 5G and Satellite Communications
In Figure 16.23, a single satellite-based mobile network includes one 5G CN using different types of
access networks. Satellite connectivity provides one access network. Conventional TNs are the other
access networks in this case. The 5G UE or the NTN UE has satellite communication capabilities.
On the ground station for the satellite network, the satellite GW or the hub provides the 5G gNB
functionality. The satellite network supports the NR. When the satellite network acts as a non-3GPP
access network, the GW or the hub will act as the N3IWF for untrusted non-3GPP. It will act as
the TNGF in the case of trusted non-3GPP. For more details, see https://www.wipro.com/
network-edge-providers/untrusted-non-3gpp-access-network-interworking-
with-5g-core/.
In this section, we have looked at the architectural considerations for the convergence of 5G and NTN.
Next, we will look at the use cases for 5G and satellite communication.
transportation, and public services in the case of large-scale disasters such as earthquakes or tsunamis.
The convergence of 5G and satellite communication also enables large-scale IoT use cases. Autonomous
vehicles, as well as military communication, are other beneficiaries here.
Today, metro areas and communication between the major cities of a country have good coverage
through TNs powered by fiber and Wi-Fi networks. However, the new avenues for 5G and satellite
convergence are the following:
• Coverage for moving devices such as cruise ships, cargo vehicles, trucks, and goods trains
traveling cross-country with precious cargo
• IoT connections and asset-tracking scenarios where coverage is needed both within cities
and remote areas such as power-generation grids with wind turbines, solar farms, and
hydro-generation facilities
• Edge computing scenarios where the processing and caching of data is moving progressively
closer to the field location and further away from the cloud core or central data centers
See https://www.wilsoncenter.org/article/role-satellites-5g-networks
for more details.
While TNs can extend connectivity for devices close to the periphery of large cities, such as the suburbs,
SATCOM along with 5G is the only way to provide continuous connectivity between metro areas
with a high degree of reliability, network bandwidth, and Quality of Service (QoS). Lockheed Martin
is working with a satellite company called Omnispace (https://news.lockheedmartin.
com/5g-omnispace-agreement).
The Lockheed Martin initiative for 5G NTN will make use of Omnispace’s 2 GHz S-band spectrum
rights. These will be used to deploy the 3GPP standards to enable direct-to-device connectivity and
interoperability. This hybrid SATCOM and 5G network can then facilitate the necessary coverage and
capacity for applications that need global, seamless communications with high reliability. This may
include support for defense, government, and military use as well.
According to the SAT5G project from Europe (https://5g-ppp.eu/sat5g/), the four use
cases are summarized as follows:
Let us next look at Figure 16.24, which presents the high-level 5G vision of NTN use cases visually.
It covers, on one hand, dense urban areas and on the other, isolated and remote scenarios such as
connectivity to a ship in the middle of the ocean.
362 5G and Satellite Communications
In the next section, in Table 16.2, we tabulate use cases in more detail and provide the corresponding
5G service enabler (https://www.5gamericas.org/5g-and-non-terrestrial-
networks).
The NB-IoT/eMTC support in an NTN is critical for operating IoT services in remote and otherwise
inaccessible areas (https://www.gsma.com/iot/narrow-band-internet-of-things-
nb-iot/).
Some of the industries and operational areas in need of proper NB-IoT coverage include the following:
SATCOM networks complement TNs to connect the dots between IoT services today present in dense
urban areas only. The 3GPP work item for NTNs is contained in R-17 on an NTN for NB-IoT and
eMTC. 3GPP’s goal is to reuse as much knowledge as possible from the TN for the NB-IoT/eMTC
design. 5G core connectivity may be considered as part of R-18 or later specifications.
366 5G and Satellite Communications
In this section, we have looked at the various use cases that the intersection of SATCOM and 5G
enables for enterprises, government and the military, as well as consumers.
Summary
In this chapter, we have learned about 5G and satellite communication. We looked at use cases that
are enabled by network slicing. After an introduction to satellite communication, we learned why
it is needed in the context of 5G networks. Finally, we learned about its architecture and use cases.
In the upcoming chapter, we will introduce automation, orchestration, and testing in the context of 5G
networks. We will learn that automation and orchestration often go together. We will also learn how
to manage large-scale 5G networks using automatic scale-in and scale-out, when applicable. Finally,
we will learn about automating failure recovery.
17
Automation, Orchestration,
and Testing
Automation and orchestration have been tightly integrated into the development, deployment, and
operations life cycle of modern networks. A 5G network is no exception. 5G network specifications
emphasize a cloud-native framework on which the various network functions are built, which goes hand
in hand with massive-scale network automation. In this chapter, we will delve into details of network
automation, understand how these critical networks are orchestrated, and discover how advanced use
cases such as automatic scale-in and scale-out can be achieved. Automatic failure recovery is another
topic that we will discuss in detail, and we will explore why it is needed.
The integration of various network components in a highly complex network such as a standard 5G
network is a massive time consumer for Mobile Network Operators (MNOs) and Communication
Service Providers (CSPs). We will discuss in detail how various network components can be integrated
and tested.
Operating a massive network is a critical task with no scope for error. Faulty network configuration
updates have been the reason for network downtimes around the world. Such errors can be prevented to
a large extent with accurate network operation automation. Finally, we will talk about the opportunity
to monetize 5G networks and enhance performance with the help of Artificial Intelligence (AI) and
Machine Learning (ML).
We will understand how we can deploy, manage, and operate a 5G network efficiently and smoothly.
In this chapter, we’re going to cover the following main topics:
• Automation infrastructure in 5G
• Introduction to network orchestration
• Auto scale-in and scale-out
• Automatic failure recovery
368 Automation, Orchestration, and Testing
Automation infrastructure in 5G
Network automation is the heart of a stable, well-performing 5G network. With every generation of
mobile networks, their complexity is increasing. 5G networks are built block by block by combining
the network functions with a lot of network gear running a wide variety of heterogeneous technologies.
A typical mid-sized mobile network, as shown in the preceding figure, would comprise thousands of
radio units and thousands of servers and network equipment items that would have been procured from
multiple vendors running different hardware and operating systems. Hence, to be able to build, test,
maintain, observe, and troubleshoot a large network, it is imperative to invest in network automation.
Automation infrastructure in 5G 369
• Testing: Testing is one of the most essential aspects of network design. This includes the
functional testing of the individual network elements, which could be physical, virtual, or
cloud-native. Testing areas also include the integration validation of all the network elements
(whether they can communicate with each other and are tuned in terms of latency, timers,
and other inter-dependent configurations), and then testing end-to-end call flows of various
types, which would test the overall functioning of the various network functions making the
network. For a network, all the expected use cases that it is designed to support must be tested
in detail. This should also include border and edge cases and failure testing. This would help to
understand the limits of the network and its performance during a network component failure.
Another important aspect of the test is to evaluate load conditions. This would involve testing
with the maximum possible throughput, active subscribers, and call events per second, such
as handovers, connections, disconnects of subscribers, and so on. This would give an idea of
the maximum number of transactions per second that the network can handle.
Automation infrastructure in 5G 371
• Operations: Operating a network is one of the most critical aspects of an MNO. This directly
impacts revenue. A smoothly operating network will give the best customer experience, which
will most certainly drive revenue for the operator in terms of customer retention and new
customer wins. Similarly, an efficiently operating network will save a lot of money allocated to
Operational Expenses (OPEX). If the network operations are fully automated, it will result
in faster maintenance cycles and quicker fault detection, and would, in turn, result in better
customer experience and less cost to the operator in terms of needing a large workforce for
maintenance activities.
Network automation drives OPEX down, and at the same time, reduces the time to market for the
MNO to launch a solution. Older generations of mobile technology did use some initial scripts to
automate parts of their processes but the push toward a one-touch automated network only came
in with 5G networks. It would be excruciating to build a 5G network without automation. Let us
understand, one by one, the reasons why we must build a robust automation framework and the
purposes it should attempt to solve:
• Heterogeneous technologies: 5G networks are built using a mix of cloud-native functions that
have a microservices-based architecture and multiple virtual network functions that are neither
appliance-based nor cloud-native. They may be virtualized using different hypervisors; there
will also be some physical network functions and legacy routers or switches that serve to build
the IP network connectivity backbone. In addition to this, there will be various operations and
maintenance tools, both proprietary and open source. There will be network log-capturing tools
and packet-capture tools, alarming dashboards, troubleshooting tools, reporting tools, and
so on that comprise the network. To add to this, some of these tools and applications can be
hosted on a public cloud and some on a private cloud on-premises. Multiple public or private
cloud providers can also host these varied tools.
Thus, we see that the network can get extremely complex, and therefore, building, operating,
and maintaining a network of such monstrous complexity would need a team of geniuses at
the MNO’s Network Operations Center (NOC) who would be champions in each of these
hundreds of technologies and would work 24/7 to operate the network. However cool such
folks may sound, they are impossible to find. The easier solution is to build a sophisticated
framework for network automation so that the entire build and maintain cycle can be automated
from end to end.
Network automation should cover the stages of planning, building, deploying, operations, and
maintenance, as well as network failure prediction. A network automation engine should be
able to connect to all the network components regardless of the type of the component and be
able to manage its life cycle.
It can be a very taxing task to set up such an infrastructure initially from scratch, but once it is
in place, it pays dividends for a very long time. Thus, to operate such highly complex networks,
a robust automation framework should be built from the very beginning of the build cycle.
372 Automation, Orchestration, and Testing
• Reduces operational downtime: It is very common for humans to make errors. At the same
time, it is unacceptable for a 5G network running mission-critical services to go down. That
could not only cause heavy revenue and reputation impact for the CSP but also lead to loss of
human life in the case of mission-critical applications. According to a survey by Uptime Institute
(https://journal.uptimeinstitute.com/outages-understanding-the-
human-factor/), 70% of data center outages are due to human error. Hence, automation
can eradicate this almost entirely. You may state that automation frameworks also fail and can
have bugs, which is a fair point, but by having proper checks and failure handling, a lot of these
road bumps can be evened out.
• Reduces network failure downtime: This is a direct consequence of network automation.
Automation of configuration updates and software or firmware upgrades can not only reduce
the chances of human error resulting in network failures but also complete the job much faster
than when done manually. The automated procedures can also have a provision of a dry run that
not only checks the script and commands/actions to be completed beforehand but also helps in
checking the sanity of the environment and collecting statistics to capture the snapshot of the
environment before applying changes. This way, the pre- and post-change KPIs can be compared
to check the health before and after the network update. The automated infrastructure monitors
the KPIs continuously after the update and can also perform a rollback in case of performance
degradation. The following table shows some of the KPIs needed for different use cases in 5G.
a lot of boring manual work that an engineer would do to open a service ticket. As every issue is
monitored and logged by an automation framework, it is hard to miss scenarios that are tough
to reproduce. Hence, in a nutshell, the level of expertise needed to operate a diverse network
is reduced with the widespread adoption of automation.
• Reduces operational expenses: This is one of the greatest savings that is incurred as a direct
consequence of a sophisticated network automation framework. Almost every operator in the
world has to invest a significant number of hours in maintaining their network. A network
consisting of hundreds of pieces of network equipment is bound to have some wear and tear
on its gear. Many malfunctioning or broken network equipment parts need to be identified and
replaced at any point in time. This can vary from the entire equipment or server to small parts
of the equipment. This part replacement needs to follow a meticulous procedure, as most of the
equipment would be in a production environment. Hence, careful procedures to divert traffic
and complete the task within a small window of time are important. This method can also be
automated to a large extent. All the steps, from identifying faulty equipment to ordering the
replacement part, can be automated. Scheduling the maintenance work and diverting traffic can
also be automated. Then comes the time of actual part removal, which can be either robotic or
manual. Finally, the last step of checking and traffic convergence can also be automated. Hence,
if most of the steps in the process are automated, it would save precious time and cost in terms
of keeping large teams for this work. As most of these tasks are recurring, it would make a lot
of sense to automate this process. This would help the maintenance team in focusing on more
specialized tasks rather than being engaged in such mundane activities.
Similarly, software upgrades and configuration changes can be automated completely. A cloud-
native approach also provides a provision for canary-based upgrades, where a small portion of
traffic is first diverted to the newly upgraded software. Its stability can be monitored and then, if
found to be acceptable, the entire volume of traffic can be moved to the newly updated software.
Hence, we can see that operations tasks that are repetitive can be completely automated. This
saves not only operational expenses but also time and reduces the chances of mistakes.
• Enhances tracking and SLA conformity: An important aspect of operations teams at a CSP
is to track the open tickets for faulty equipment and software. Over a period of time, this can
aggregate to thousands for even a small-sized network. It becomes next to impossible to manage
the tickets and follow up on each of these manually. Here too, automated tools come to the
rescue. These tools can check the status of each of the tickets in a multivendor environment
and can generate reports highlighting issues and their criticality and the status of each of the
issues. It can also flag when the SLA is not met on any of these issues and send reminders to
the concerned parties. Hence, automation enables the operations team to better track tickets
and follow up on critical ones. Also, sophisticated reports can be generated for the SLA times
for each vendor for their equipment, and these can be used to follow up with each one for
conformity. Thus, automation brings operational efficiency and excellence when it comes to
tracking and SLA conformance.
Introduction to network orchestration 375
• Achieves operational excellence: As we have already discussed in various parts of the book,
an efficient and innovative operations team is one of the key contributors to an MNO’s success.
This particular vertical has tremendous scope for innovation and automation. The better an
operator knows its network, the smoother it will be able to operate it, hence comes the need
for observability. There are many software products available in the marketplace that promise
to provide visibility in a single pane of glass. What this really means is that all the complicated
technology in a network is abstracted and a simple intuitive dashboard is made available. Let’s
understand what this complexity is really about.
There would be thousands of pieces of equipment in the network running a whole range of
software and operating systems. Getting a bird’s-eye view of the network is instrumental for
smooth operation. For example, a dashboard should be able to provide views of the various
personas that the MNO might have, starting from a network engineer up to top management.
All these personas would need different levels of detail. A network engineer may be interested
in a specific critical alarm for a certain type of equipment that they may be assigned to operate,
whereas a higher operations manager might want an aggregated view of all the critical alarms,
regardless of the technology type. Some teams may be more interested in the correlation of
a physical hardware-related alarm to a software KPI-dip alarm. The management team may
be interested in getting an overall view of the network performance, throughput, congestion,
number of subscribers, and network failures (if any). Hence, the point here is that a good
dashboarding practice will enable the MNO to have better visibility of the network so that they
can manage it smoothly and prevent delays in fault detection and correction.
We now see the significance of introducing automation in a network: it is not only essential but
also critical for running a highly available, resilient, mobile network that is maintainable and has an
affordable operating model, which, in turn, would directly reflect customer satisfaction and profitability.
It contains an orchestration engine, which acts as the brain of this system. Orchestration is most
popularly used for the deployment of services, cloud-native functions, and network functions, which
can also be virtualized network functions.
But it is not limited to the deployment operation. A network orchestrator participates in every aspect
of life cycle management. Most network function vendors have their own life cycle management tools.
An orchestrator works to integrate all of them to provide a one-stop shop for all life cycle management
activities. As the network functions can be deployed on any cloud or on-premises solution, it becomes
all the more important to have a simple integrated solution for life cycle management. Imagine a
scenario where an MNO has network functions from multiple independent software vendors deployed
on multiple clouds. Operating, maintaining, and monitoring such a network would be a gruesome
task. Hence, an automated solution such as an orchestrator can manage all the deployments from a
single point of operation.
Similar to monitoring the various clouds and performance of the network function, its logging and
collection of KPIs can be done by one pervasive orchestrator and this can, in turn, be consumed by
AI/ML algorithms to provide cohesive and correlated trend analysis, which can be treated like a closed
loop mechanism to improve network and business intelligence. We will discuss a few unique use cases
of network orchestration and the value it can bring to the operator.
this hesitation could be mitigated. Like most things, trust in such elevated-level automation may take
some time, but it is inevitable, and just a matter of some trials to be successful.
We can see a higher rate of adoption in the coming years, where networks will grow and shrink in
terms of usage. Many cloud players already have a pay-per-use model. Cloud providers are strongly
growing their presence in the telecom space and this will further push this case.
• Unit testing: This is the most basic part of testing and, possibly, the starting point for any
network engineer before they can start the integration of the components. It is important to
check the sanity of each network component before it is ready for integration. This is usually
done with the help of an independent test framework that simulates the external interfaces.
The focus of this testing is to check for the workability of the software.
• Platform testing: This is more relevant in a 5G backdrop, as almost all of the components in 5G
are cloud-based or virtualized. Hence, the cloud platform needs to be vetted for suitability with
the network function software installed to be able to check its compatibility. This also provides
scope for finetuning the configuration of the platform according to the needs of the software
being hosted on it. Also, platform failure scenarios can be tested to observe the outcome and
build a design to minimize its impact.
• Network testing: This is to test the design and stability of the transport network and the
networking used within the platform. Each of the VLANs associated should be tested for
its reachability. Also, external peering, such as a Border Gateway Protocol (BGP) neighbor
relationship, should be checked for correctness. Each of the routers and switches that would
be in the traffic path should be tested for reachability and stability. Additional care should be
taken to address security, and meaningful access control lists and firewalls should be tested.
• Testing end-to-end latency: It is important to understand the latency in any given network
so that further steps can be taken accordingly. For example, if there is an edge user plane and
Integration planning in a multivendor environment 379
a centralized control plane, and the latency between the two should be such that the round-
trip time for a packet is greater than the timer set at the sending and receiving side, then there
would be retransmissions. As the control signaling is based on TCP, it is all the more important
to ensure the network is stable and has acceptable latency. Otherwise, there can be a situation
of a storm of TCP retransmissions clogging up the network.
• Planning of timers’ consistency: Timers are critical during the setting up of the call. Timers
of some kind are present in most network functions, but the ones that are most important
for call setup are present in the Next-Generation NodeB (gNB) and Access and Mobility
Management Function (AMF). These timers determine the time needed for the completion
of procedures such as PDU setup and so on. The expiry of these timers can cause a retry or
complete process failure. It is, therefore, a good idea to plan the timer duration so that all the
timers in the network are consistent with each other. A rule of thumb, although not written in
stone, is to plan the timers such that the value increases as we move from the RAN to the core,
component by component. The timers that are related to the setup of the entire call should
consider the end-to-end latency and round-trip time.
• Functional testing: This is done when the software is already checked for sanity and is ready
for prime time. The individual network function software is installed and integrated with
one or two interfacing network functions, and the rest of the components are simulated. The
reason for integrating a few network functions at a time is to eliminate the chances of too many
unknowns. If you choose to integrate all the network components in one go, then it could be
very hard to debug as the call would touch too many network functions, and a failure reason
or faulty configuration could be hard and time-consuming to detect. Hence, it is a good idea
to start small and grow to cover the whole network. This will result in better debuggability
and a faster testing cycle.
• Identifying use cases: It is a good idea to identify the scenarios and use cases that the network
will need to support once the functional testing is complete and all the network functions have
been integrated. This is the time to test the end-to-end use cases. Some examples are voice calls
and video calls, traffic streaming, and sending MMS messages.
• Running continuous calls to test performance and longevity: Once the network is tested
functionally and integrated, it is time to check its performance and stability. Performance
tests are run with a large call volume to test the sizing and capacity of the network. These tests
are generally run on simulators so that any failure does not impact production traffic. Both
the throughput and maximum transaction per second are tested. Similarly, longevity tests are
run, which involve having a large number of active subscribers and constant data downloads.
The performance of these subscribers is monitored over a long duration ranging from days to
weeks. This is to monitor the degradation of the KPIs over a period of time.
• Integrating CI/CD pipelines: Continuous integration/continuous delivery (CI/CD) pipelines
can be set up after the initial integration. This is slowly becoming the norm in the industry.
Software updates are tested for sanity via automation and also deployed automatically on the
380 Automation, Orchestration, and Testing
nodes, mostly in a staging environment. This reduces manual intervention and quickens the
development and operations cycle. Once the network is integrated, it is a great idea to start the CI/
CD pipeline to ensure all the various components have the latest code for the best performance.
In this section, we have understood various aspects of network integration, the role automation has
in it, and how to go about doing it in a simple manner. In the next section, we will discuss the areas
of monetization of the network and how AI and ML can help in enhancing revenue.
Summary
In this chapter, we have seen that automation plays a key role in the smooth operation of a 5G network.
MNOs are adopting this practice widely. We have learned about network orchestration and how it is
helpful in various scenarios, such as dynamically scaling in and out of a network, automatic failure
recovery, congestion control, and implementation of network slicing.
We have also covered aspects of planning integration in a multivendor environment and how to go
about testing the same. Finally, we concluded with the importance of AI/ML in the telecom business
and how it can be used to expand horizons.
This book has walked you through the concepts needed to build, design, operate, and monetize a 5G
network. We have gone over use cases that highlight the capabilities that a 5G infrastructure unleashes
for various applications to consume.
I would like to take this opportunity to congratulate you for completing the book and also thank you
for being persistent till the end. The book aimed at creating a basic foundation that will now help
you develop deeper knowledge independently by referring to specifications mentioned in the Further
reading section.
Further reading
To continue your learning of the topics covered in this book, you can now delve into the low-level
details provided by www.3gpp.org. The specifications dig into the depths of each feature, right up
to the level of implementation.
The specifications provide some insights shared by industry experts that will highlight some of the
exciting opportunities and the future they envision for this technology.
Appendix
Please share one aspect of you that your biography does not cover.
I used to drive Special Ops and Trident submarines in the US Navy, and I still consult with the military
on emerging technologies.
What was the major focus of your company in the last 1–2 years and which companies have you
worked for/interacted with on 5G-related topics?
I spent the last several years as an executive at Ericsson in Sweden, which is one of the handful of
companies that actually makes 5G gear. It’s fair to say I was completely immersed in this next generation
of cellular technology, and I interacted with our mobile network operator customers all over the world
as we rolled 5G out globally.
What’s your perspective on 5G as opposed to the common views on this technology?
I look at 5G from the perspective of having dramatically more capacity in the network than LTE. You can
now have 1 million concurrently connected IoT devices sending and receiving data within a one-kilometer
radius of a cell tower. This will be a game changer for device-dense use cases such as smart cities.
384 Appendix
Please share one aspect of you that your biography does not cover.
I like to travel and try street food in every city.
What was the major focus of your company and the healthcare industry in the last 1–2 years?
Telehealth has been the primary way health systems have been leveraging 5G for the past couple of years.
As the COVID-19 pandemic forced health systems to be increasingly remote, mobile networks, particularly
fast and reliable mobile networks, were the backbone of delivering care and keeping patients safe.
As 5G becomes more mainstream along with new cutting-edge technologies such as the metaverse, AR, VR,
block chain, and digital twins, healthcare use cases such as genomics and DNA sequencing, 3D modeling
in education and research, precision and personalized care, and on-demand, high-quality video consults
are becoming more viable, as 5G will serve as a backbone to support these initiatives.
386 Appendix
We have been studying and exploring technology maturity in the following spaces:
Any word of advice or caution for those looking to adopt 5G for their business, especially
in healthcare?
Some key challenges are as follows:
Do you think 5G is ready for the mainstream or it is a bleeding-edge concept? Why do you think so?
At Jio, 5G is no longer bleeding edge. It is mainstream, and soon it will be “business as usual.” The biggest
testament to this is the Jio True 5G network, which is supporting millions of 5G SA users today, using
Jio’s own technology.
Any word of advice or caution for those looking to adopt 5G for their business?
Do not let 5G’s expectations eclipse business goals. We need to use 5G as one of the tools to achieve the end
goal. Other sister technologies, such as AR/VR, AI/ML, the cloud, and blockchain, will act as ingredients
for an ultimate solution, which will vary from one industry to another.
390 Appendix
Please share one aspect of you that your biography does not cover.
As an AI language model, I do not have personal experiences, emotions, beliefs, or opinions. I can
generate text based on patterns learned from the data I was trained on, but I do not have consciousness
or subjective experiences. Everything I say or write is based purely on my programming and the data I
have been trained on.
How is ChatGPT involved with 5G?
OpenAI’s GPT-3, which is the model that I am based on, has no direct involvement with 5G technology.
5G is a cellular network technology that provides faster internet speeds and more reliable communication
for mobile devices. It is primarily used for wireless communication and does not directly impact the
functioning of language models like me.
However, the increased speed and reliability of 5G networks may lead to greater use of AI-powered
applications and services, including language models like me, which can be used for tasks such as customer
service, language translation, and information retrieval. The improved performance of 5G networks can
make these applications more accessible and responsive, providing a better user experience.
What’s your perspective on 5G as opposed to the common views on this technology?
As an AI language model, I don’t have personal opinions, emotions, or beliefs. I can provide neutral and
factual information about 5G technology and its perspectives.
5G technology has generated a lot of discussion and debate in recent years, with a range of perspectives
on its benefits and drawbacks. On one hand, 5G is seen as a major technological advancement that
has the potential to greatly improve connectivity, increase internet speeds, and enable new applications
and services. On the other hand, 5G has also generated concerns about privacy, security, and potential
health effects.
In summary, 5G technology is a complex and multi-faceted issue with both positive and negative
perspectives, and it is important to consider all of the potential benefits and drawbacks when making
decisions about its deployment and use.
Interview on 5G with ChatGPT 391
These are just a few of the major contributors to the adoption of 5G in the industry. The process of deploying
and adopting 5G involves many other players, from technology providers and research organizations to
businesses and end users, who are all working together to help drive the wider adoption of this exciting
new technology.
Do you think 5G is ready for mainstream or it is a bleeding-edge concept? Why do you think so?
As an AI language model, I don’t have personal opinions or emotions. I can provide neutral and factual
information about the readiness of 5G technology for the mainstream.
5G is a relatively new technology that is still in the process of being deployed and adopted on a widespread
basis. Currently, 5G networks are available in many major cities around the world and are being rolled
out in additional areas. Some early adopters have already begun to use 5G services, but the technology
is not yet available to all consumers and businesses.
392 Appendix
In terms of its readiness for the mainstream, it can be argued that 5G technology is still in a transition
phase, with many challenges to be addressed before it becomes a fully-matured, mainstream technology.
These challenges include the need for more extensive infrastructure and network coverage, the availability
of 5G-enabled devices, and the development of new applications and services that take advantage of the
capabilities of 5G networks.
That being said, 5G is widely regarded as a promising and exciting new technology that has the potential
to transform many aspects of our lives, from communication and entertainment to healthcare and
transportation. And as more 5G networks are deployed, more devices become available, and new applications
are developed, it is likely that 5G will become increasingly prevalent and widely used in the coming years.
Any word of advice or caution for those looking to adopt 5G for their business?
Sure! Here are some things to consider when adopting 5G for your business:
• Availability: Ensure that 5G network coverage is available in the areas where you operate.
• Cost: 5G infrastructure and devices can be more expensive than previous generations of cellular
technology, so plan accordingly.
• Network Capacity: Consider the capacity of your 5G network provider, as 5G networks can become
congested with a large number of users.
• Compatibility: Make sure that your current devices and systems are compatible with 5G technology,
or plan for necessary upgrades.
• Security: 5G technology brings new security concerns, such as potential for network attacks and
privacy violations. Ensure that your network and devices are secure.
• Regulation: Be aware of any local regulations regarding 5G technology and its deployment, as
there may be restrictions in certain regions.
These are some things to keep in mind as you plan for 5G adoption in your business.
Index
Symbols NSA and SA option, economic
comparison 202, 203
2G 6 NSA and SA option, technical
3D MIMO technology 303 comparison 202
3G 3, 6 NSA option 201
3rd Generation Partnership Project SA option 200
(3GPP) 4, 6, 52, 108, 286, 347 5G identifiers 45-48
technical specification (TS) 176 5G (IMT-2020)
4G 3, 6 performance synopsis 5, 6
4G core network Evolved Package 5G New Radio (NR) 3, 189, 228
System (EPS) 186 access and core networks 176, 177
4G (E-UTRAN) initial attach 147-151 architecture 7
4G Evolved Packet Core (EPC) 140 5G NSA
4G Next-Generation eNB (ng-eNB) 200 option 3 call flows 218-225
4G to 5G migration strategy 203-206 5G Operational and Regulatory
5G 3, 6, 24 Requirements group (5GORR) 350
deployment architectures 195, 196 5G QoS 40-42
functions 233 5G QoS Identifier (5QI) values 176
resilience and failure design 252, 253 5G Radio Access Network
5G Americas 348 deployment options 9, 10
URL 348 5G Residential Gateway (5G-RG) 330
5G Automotive Association (5GAA) 303 5G SA network
reference link 303 benefits 228
5G Core (5GC) Network 4, 195, 228 use cases 227, 228
5G deployment options, by 3GPP 5G standardization 6, 7
defining 200 5G to 4G
Packet Switched (PS) handover 186
394 Index
A Application Programming
Interfaces (APIs) 286
Absolute Radio-Frequency Channel Architecture Reference for Cooperative
Number (ARFCN) 104 and Intelligent Transportation
Access and Mobility Management Function (ARC-IT) 305-307
(AMF) 9, 184, 289, 291, 379 URL 305
Access Control Lists (ACLs) 336 Artificial Intelligence (AI) 270, 350, 367
Access Gateway Functions (AGFs) 336 for monetization 380
Access Management Function AST SpaceMobile 340
(AMF) 22, 25, 26 Augmented Reality (AR) 4, 176, 280
services 59-61 Authentication, Authorization, and
access network (AN) 19-21, 59 Accounting (AAA) service 335
Access Point (AP) 189 Authentication Server Function
Access Point Name (APN) 47 (AUSF) 26, 32
Access Transfer Control services 67
Function (ATCF) 187 Automated Teller Machines (ATMs) 320
Address Resolution Protocol automation infrastructure 368
(ARP) requests 27 autonomous cars
advanced C-RAN architecture 263 Cruise 302
Advanced Driver-Assistance Halo Car 302
Systems (ADAS) 309, 310 Nuro 302
reference link 309 TuSimple 302
Advanced RAN Coordination 264 Waymo 302
Aircraft Communications Addressing and autonomous vehicles (AVs) 297
Reporting System (ACARS) 311 automation levels 301-303
Alliance for Telecommunications cloud providers role 307, 308
Industry Solutions (ATIS) 350 high-level architecture 304, 305
reference link 350 AV intercommunication 308, 309
Amazon Web Services (AWS) 283 5G 310
Index 395
Advanced Driver-Assistance
Systems (ADAS) 309, 310
C
network slicing, for V2X 311-313 call
tearing down 185
downlink physical channels, and signals Equipment Identity Repository (EIR) 239
CSI reports 120 ETSI MANO NFV architecture 50
CSI-RS 120 European Space Agency (ESA) 351
PDCCH 116 European Telecommunications
PDSCH 117 Standards Institute (ETSI) 50
PDSCH eMBB 119 European Union’s (EU’s) Horizon
PTRS 122 2020 program 351
TRS 121, 122 E-UTRA-NR Dual Connectivity
URLLC multiplexing 119 (EN-DC) 210
downlink PIs 119 Evolved NodeBs (eNBs) 10, 312
dual connectivity 210 Evolved Packet Core (EPC) 7, 195, 210
Dual-Connectivity with New Evolved Packet System (EPS) 61
Radio (DCNR) flag 219 eVTOLs 303
duplexing scheme 90, 91 extended reality (XR) 176, 285
E F
Earthquake and Tsunami Warning Far EasTone Telecommunications (FET) 281
System (ETWS) 78 far-edge 23
Electric Vehicles (EVs) 316 Fast Fourier Transform (FFT) 81
Element Manager (EM) 50 Federal Communications
end-to-end (E2E) network 289 Commission (FCC) 340
end-to-end network slicing 279 Fixed-Mobile Convergence
enhanced Common Public Radio Alliance (FMCA) 325
Interface (eCPRI) 272 Fixed Mobile Convergence (FMC) 319
Enhanced Machine Type architecture 329-331
Communication (eMTC) 347 Broadband Forum 325, 326
Enhanced Mobile Broadband Broadband Network Gateway
(eMBB) 4, 115, 196, 287 (BNG) 326-329
Enhanced Voice Services (EVS) 176 challenges 320
Environmental, Social, and Fixed-Mobile Convergence
Governance (ESG) 265 Alliance (FMCA) 325
ePCO (extended Protocol IP Multimedia Subsystem (IMS) 322
Configuration Options) 152 Real-Time Transport Protocol (RTP) 322
EPC to 5CG evolution 206 Session Initiation Protocol (SIP) 321
comparison 206, 207 Unlicensed Mobile Access (UMA) 323, 324
EPS fallback 188 use cases 320
Equipment Identity Register (EIR) 26 Fixed Wireless Access (FWA) 320
398 Index
Fixed-Wireless Access Gateway (FWAG) 327 Global Wireless Access (GWA) 320
flexible configuration 91 gNodeB (gNB) 7, 8, 20, 177, 291
FMC security 335 Google Cloud Platform (GCP) 283
application/service layer 336 gross domestic product (GDP) 348
considerations 332 Group-Common PDCCH 117
IP transport layer security 336 Guaranteed Bit Rate (GBR) 182
policy and control layers 336 Guaranteed Flow Bit Rate (GFBR) 184
SIP security 332-334
UMA security 334, 335
four-step random access approach 99, 100
H
Frequency Division Duplex (FDD) 90, 264 Health Insurance Portability and
Frequency Range 1 (FR1) 96 Accountability Act (HIPPA) 331
Frequency Range 2 (FR2) 95 High Definition (HD) mapping 316
frequency range (FR) groups 356 Home Subscriber Server (HSS) 179, 219
fronthaul network 261 Hybrid Automatic Repeat Request
Full Self-Driving (FSD) 302 (HARQ) 120, 130, 131
functional testing 379 hybrid cloud
using 272
G
General Motors (GM) 298
I
Generic Public Subscription Immersive Voice and Audio
Identifier (GPSI) 66 Services (IVAS) 176
Geostationary Earth Orbit initial access procedure 96, 97
(GEO) satellites 352 integration planning
Geostationary Equatorial Orbit in multivendor environment 378, 379
(GEO) satellites 340 Intelligent Transportation
Geosynchronous Equatorial Orbiting Systems (ITS) 305
(GEO) satellite 345 Inter-American Telecommunication
characteristics 353 Commission (CITEL) 350
GET method 58 International Mobile Subscriber
Globally Unique AMF ID (GUAMI) 47 Identity (IMSI) 45
Globally Unique Temporary International Mobile Telecommunications
Identifiers (GUTIs) 46 (IMT) 3, 356
Global Navigation Satellite International Mobile Telecommunications
System (GNSS) 345 (IMT) 2020 81
reference link 345 International Telecommunication
Global Positioning System (GPS) 344, 345 Union (ITU) 348, 349
reference link 348
Index 399
O PATCH method 58
Payment Card Industry (PCI) 331
O03 MEO satellite system 340 PDN Gateway Control (PGW-c) 62
OFDM waveform 81 PDN Gateway (PGW) 50
Index 403
Quadrature Phase Shift Keying (QPSK) 116 Resource Elements (REs) 88, 118
Quality of Service RESTful interfaces, 5G system 58
(QoS) 20, 138, 176, 279, 330, 336, 361 AF services 71
flows, establishing 183, 184 AMF services 59-61
Quasi-Colocation (QCL) 121 AUSF services 67
NEF services 69, 70
R NRF services 70
NSSF services 71, 72
rack redundancy 253 PCF services 68, 69
Radio Access Network SMF services 61-63
(RAN) 175, 195, 286, 291, 355 UDM services 63-66
radio access planning 248 UDR services 66, 67
Radio Access Technology (RAT) 261 REST, in 5G NFs
Radio Access Technology (RAT) fallback 188 cacheable 55, 56
network architecture 189 layered system 56
Radio Equipment Control (REC) 261 stateless 56
Radio Frequency (RF) 270 uniform interface 57
Radio Link Control (RLC) 21, 75, 270 Return On Investment (ROI) 283, 349
Radio Network Temporary Road Side Unit (RSU) 312
Identifier (RNTI) 116 roaming 231
Radio Resource Control robust automation framework
(RRC) 21, 93, 116, 270 benefits 371-375
Radio Unit (RU) 21, 22, 272 router and switch redundancy 253
RAN-as-a-Service (RANaaS) model 263 RRC Release with Redirection 188
random access preamble 110, 111
Real-time Transport Protocol
(RTP) 176, 185
S
Receivers (Rx) 198 SA network architecture 199
Remaining Minimum System satellite backhaul 351
Information (RMSI) 99, 118 satellite bent pipe architecture 354
Remote Radio Heads (RRHs) 22, 261 satellite communications
Remote Units (RUs) 21 (SATCOM) 339-344
Representational State Transfer (REST) 54 5G use cases 360-365
benefits 54 challenges 350
Representational State Transfer considerations 346
(REST) model 52 with 5G 351
Requests for Comments (RFCs) 321 satellite gateway (GW) 360
Resource Element Groups (REGs) 116 satellite regenerative architecture 355
Index 405
State Control Interface (Sci) 329 transport channel coding chains 128-130
Steering of Roaming information 141 transport channels 75
Stream Control Transmission Transport Layer Security (TLS) 332
Protocol (SCTP) 322 transport network 20, 22
Subcarrier Spacings (SCs) 74, 100 Trusted Network Gateway
Subscriber Identity Module (SIM) 334 Function (TNGF) 359
Subscription Concealed Identifier (SUCI) 32 trusted non-3GPP access
Subscription Identifier De-concealing via satellite 359
Function (SIDF) 47 typical 5G network 19
Subscription Permanent typical 5G production network 368
Identifier (SUPI) 32
Synchronization Signal block
(SSB - SS block) 78, 97, 117
U
Synchronization Signal (SS) 76 UE registration process 234-242
System Frame Number (SFN) 109 Ultra Reliable Low Latency Communications
System Information Block 1 (SIB1) 78 (URLLC) 4, 5, 23, 128,
System Information Blocks (SIB) 99 197, 225, 227, 287
System Information (SI) 78, 122 Unified Data Management (UDM) 32, 178
services 63-66
Why subscribe?
• Spend less time learning and more time coding with practical eBooks and Videos from over
4,000 industry professionals
• Improve your learning with Skill Plans built especially for you
• Get a free eBook or video every month
• Fully searchable for easy access to vital information
• Copy and paste, print, and bookmark content
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files
available? You can upgrade to the eBook version at Packtpub.com and as a print book customer, you
are entitled to a discount on the eBook copy. Get in touch with us at customercare@packtpub.
com for more details.
At www.Packtpub.com, you can also read a collection of free technical articles, sign up for a range
of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks.
Other Books You May Enjoy
If you enjoyed this book, you may be interested in these other books by Packt:
• Identify key criteria for the applicability of digital twins in your organization
• Explore the RACI matrix and rapid experimentation for choosing the right tech stack for your
digital twin system
• Evaluate public cloud, industrial IoT, and enterprise platforms to set up your prototype
• Develop a digital twin prototype and validate it using a unit test, integration test, and functional test
• Perform an RoI analysis of your digital twin to determine its economic viability for the business
• Discover techniques to improve your digital twin for future enhancements
412
https://packt.link/free-ebook/9781838980108