CEC331-4G-5G COMMUNICATION NETWORKS-2039042488-4g5g QN Bank
CEC331-4G-5G COMMUNICATION NETWORKS-2039042488-4g5g QN Bank
➢ RAN includes the NodeB function and the Radio Network Controller (RNC) function. The NodeB
function provides the air interface. The RNC manages the air interface for the overall network.
8. Define Core Network.
The core network is the equivalent of Network Switching Subsystem or NSS in GSM and
provides all the central processing and management for the system. Core network has both circuit
switched and packet switched network elements.
9. Define Home Location register (HLR)
➢ HLR is a database that contains all information about the subscriber including their last
known location.
➢ The HLR maintains a mapping between Mobile Station International Subscriber Directory
Number (MSISDN) and International Mobile Subscriber Identity (IMSI). MSISDN is the
mobile phone number used for making and receiving voice calls and SMS.
10. Define Equipment Identity Register (EIR)
➢ The EIR is the function that decides whether a user equipment is allowed onto the network or not.
EIR is typically integrated with the HLR.
➢ EIR is used for blocking or monitoring calls from a stolen user equipment. Each user
equipment is uniquely identified through a number known as the International Mobile Equipment
Identity (IMEI).
11. Define Authentication Centre (AuC)
➢ AuC is used for storing a shared secret key, which gets generated and burned in the SIM
card at the time of manufacturing.
➢ AuC function is typically co-located with the HLR function. AuC does not exchange the
shared secret key, but would run an algorithm on the International Mobile Subscriber Identity
(IMSI), to generate data for authentication of a subscriber / user equipment. Each IMSI is unique
and gets mapped to a SIM card.
12. Define Mobile switching center (MSC)
➢ MSC is responsible for functions such as routing calls and SMS messages. It interfaces with the
HLR for keeping track of subscriber location and does call handovers, when the mobile
subscriber moves from one location to another.
➢ Gateway MSC (GMSC) is a function that is present either within or outside of the MSC.
A GMSC interfaces with the external networks such as the Public Switched Telephone
Network (PSTN), which is our legacy land line network.
13. Define Serving GPRS Support Node (SGSN)
➢ SGSN is responsible for mobility management and authentication of subscribers / mobile
devices in a GPRS network.
➢ It performs a role which is similar to the role played by the MSC for voice calls. The SGSN and
MSC are often co-located in the network.
14. Define Gateway GPRS Support Node (GGSN)
GGSN acts as a gateway to the Internet. It connects the GPRS network with the packet switched data
network. GGSN receives data addressed to a given subscriber, checks if the subscriber is active and
then forwards the data to the SGSN serving the particular subscriber.
15. Define Charging Gateway Function (CGF)
➢ CGF handles Call Detail Records (CDRs) generated by the GGSN in a GPRS network.
➢ There are different types of CDRs processed by the CGF, based on the network node that
generates the CDR. For example, when a SGSN generates CDRs, it is called S-CDR.
16. Evolved Node B (eNB)
➢ eNodeB is the entity that supports air interface and performs radio resource management.
➢ It provides radio resource management functions such as IP header compression, user data
encryption, and routing the user data to the Serving Gateway (SGW).
17. Define Serving Gateway (SGW)
ST. ANNE’S COLLEGE OF ENGINEERING AND TECHNOLOGY
Approved by AICTE, New Delhi. Affiliated to Anna University, Chennai
Accredited by NAAC
ANGUCHETTYPALAYAM, PANRUTI – 607 106.
➢ SGW serves as the mobility anchor for the user plane. It takes care of inter-eNodeB handovers
& User Equipment (UE) mobility between 3GPP networks.
➢ It is responsible for routing/forwarding data packets between the eNodeB & Packet Data Network
Gateway (PDN GW).
18. Define Packet Data Network Gateway (PGW)
➢ PDN GW provides the UE with connectivity to the external packet data networks such as
Internet.
➢ It serves as the anchor point for intra-3GPP network mobility, as well as mobility between
3GPP and non-3GPP networks.
➢ It takes care of Policy and Charging Enforcement Function (PCEF), which includes Quality
of Service (QoS), online/offline flow- based charging data generation, deep-packet inspection,
and lawful intercept.
19. Define Mobility Management Entity (MME)
MME manages mobility, UE identities and security parameters. It operates in the Control
plane and provides functions such as managing session states, authentication, mobility with 3GPP
2G/3G nodes, and roaming.
20. Define Policy and Charging Rules Function (PCRF)
Policy and Charging Rules Function (PCRF) maintains the policy and charging related controls
for all the subscribers. For example, a subscriber’s quality of service policy is stored in the PCRF
server.
21. What is Circuit Switched Fall-Back (CSFB)?
➢ When LTE is just used for data transfer, voice calls are handled through the legacy circuit
switched mechanisms - by falling back to a 3G or 2G network.
➢ Circuit Switched Fall- Back (CSFB) works only when the area covered by an LTE network
is also covered by the 3G network.
22. Define Voice over LTE (VoLTE)
➢ Voice over LTE is relatively a new concept, to support voice calls over the 4G network.
➢ While CSFB helped the service providers during the migration from 2G/3G to 4G networks,
VoLTE runs completely on the 4G network.
➢ In case of VoLTE, the user equipment / mobile should be capable of initiating a VoLTE
call and the network should support VoLTE.
23. How do setting up a VOLTE?
Setting up a VoLTE is a two-step process:
1. At first, the UE sets up a dedicated bearer/tunnel for IMS APN (Access Point Name).
2. Once the bearer is established, the UE sets up a Session Initiation Protocol (SIP) connection with
the IMS Core. SIP is a popular protocol used for Voice over IP (VOIP) communications,
over the Internet.
24. What is Radio Access Network (RAN)?
The Radio Access Network (RAN) architecture has evolved across the different generations of
the wireless network, to support the bandwidth and scalability requirements. RAN has two distinct
units Ð the Remote Radio Head (RRH) and the Baseband Unit (BBU).
25. Draw the table for evolution of RAN.
ST. ANNE’S COLLEGE OF ENGINEERING AND TECHNOLOGY
Approved by AICTE, New Delhi. Affiliated to Anna University, Chennai
Accredited by NAAC
ANGUCHETTYPALAYAM, PANRUTI – 607 106.
1. What are the drivers for 5G? /List the use cases enabled by 5G (Nov/Dec 23)
(1) Business case demands from a broader set of economic actors, including industrial
companies driving new use cases,
(2) New technologies for delivering core network components creating expectations of
more efficient and flexible operations, and
(3) Shifts in how business, society and environmental needs are balanced to deliver
services in a new way.
2. List the new technologies have driven the development of 5G.
(1) Virtualization,
(2) Cloud native,
(3) Containers,
(4) Microservices
ST. ANNE’S COLLEGE OF ENGINEERING AND TECHNOLOGY
Approved by AICTE, New Delhi. Affiliated to Anna University, Chennai
Accredited by NAAC
ANGUCHETTYPALAYAM, PANRUTI – 607 106.
(5) Automation
3. Define virtualization.
➢ Traditionally Mobile core network element functional designs are distributed
applications which scale horizontally and run on dedicated hardware such as
processor blades in a chassis.
➢ The network element architecture is distributed internally onto specific types of
blades that perform specific tasks.
➢ The first major step of virtualization was to migrate those application-specific blades
to virtualized resources such as virtual machines (VMs) and later containers.
4. Define cloud native.
Cloud Native architectures have gained a lot of interest over the past years and service
operators attempt to emulate the efficiencies captured by so-called hyperscalers (e.g.,
Facebook, Google, Amazon) has led to a much heightened interest in this area.
5. What are several cloud-native design principles?
✓ Infrastructure Agnostic
✓ Software decomposition and life cycle management
✓ Resiliency
✓ State-optimized design
✓ Orchestration and automation
failing containers, and software upgrades including canary testing (small-scale testing) before
larger deployments.
11. Define container.
➢ From a simplistic perspective, system-level virtualization allows instances of an
Operating System (OS) to run simultaneously on a single-server on top of something
called a hypervisor.
➢ A hypervisor is a piece of computer software that creates and runs virtual machines.
System-level virtualization allows multiple instances of OS on a single server on top
of a hypervisor.
12. What is microservices?
Microservices are an architectural and organizational approach to software development
where rather than be developed in a monolithic fashion, software is composed of small
independent services that communicate over well-defined APIs.
o Access authorization
o Service authorization support
o Service provision support
35. What is policy control charging (PCC)?
Policy control is a very generic term and in a network there are many different policies that can
be implemented, for example, policies related to security, mobility, use of access technologies,
etc.
36. What is (Enhanced) Dedicated Core Networks ((e)DECOR)?
(e)DECOR was inspired by the desire and flexibility for the operators to deploy within an
operator’s network (designated by PLMN ID(s)) multiple core networks and directing users
towards specific core networks and thus allowing partitioning off the full core networks.
37. What is virtualized evolved packet core? (Nov/Dec 23)
DECOR and CUPS are two key enablers for the base core network architecture that enhances
EPC for 5G based on EN-DC due to the flexibility and versatility they provide for the operators
for deployment of differentiated core networks towards specific targeted users.
Part-B
1. Discuss the fundamentals of 5G technologies.
2. What is NVF? Explain its need and architecture (Nov/Dec 23)
3. Explain overview of 5G core network architecture.
4. Discuss the Service-based architecture (SBA)
5. Explain new Radio and Cloud Technologies (Nov/Dec 23)
6. Explain overview of Information on Cloud technologies
7. Explain overview of RAN Virtualization
8. Explain Radio Access Technologies (RATs).
9. Discuss EPC for 5G.
10. Briefly explain the Information on modulation or coding scheme
11. Discuss EPC for 5G
12. What are the key EPC functions? (Nov/Dec 23)
Unit-3
Part-A
Part – A Two marks
✓ Increased automation
✓ Flexibility and agility
✓ Reduced risks by separation of concerns.
3. What are the different requirements to be addressed by a Network Slice?
✓ Traffic capacity requirements per geographical area
✓ Charging requirement
✓ Coverage area requirement
✓ Degree of isolation requirement
✓ End-to-end latency requirement
✓ Mobility requirement
✓ Overall user density requirement
✓ Priority requirement and etc.
4. What is Management and orchestration?
During the preparation and whole Lifecycle management process, the customer is able
to provide its requirements using APIs from which the customer gets information of how
the Network Slices perform, and is able to modify its requirements as to adapt to the
needs of the customer. It provides a high-level view of the process in the preparation and
the Lifecycle management of a network Slice Instance (NSI).
5. What is network slice preparation?
Network Slice “blueprints” or “templates” are used to simplify the process. If a Network
Slice template exists that meets the customer requirements, then the preparation process
can be shortened, as either the customer may be able to use an existing NSI.
6. What is network slice commissioning?
NSI provisioning in the commissioning phase includes creation of the NSI. During NSI creation
all needed resources are allocated and configured to satisfy the Network Slice requirements.
7. What is network slice decommissioning?
NSI provisioning in the decommissioning phase includes decommissioning of non-shared
resources if required and removing the NSI specific configuration from the shared resources.
After the decommissioning phase, the NSI is terminated and does not exist anymore.
8. What is Multi-access Edge Computing (MEC)?
Multi-Access Edge Computing (MEC) is an integral part of the 5G ecosystem. MEC
helps service providers to bring application oriented capabilities closer to the users and
support several latency sensitive use cases from the edge.
✓ Need for distributing the infrastructure where the application services are hosted
in a service provider network, to improve the application performance and the user
experience etc.
10. What are the MEC architecture functions?
❖ MEC Orchestrator
❖ MEC Platform
❖ MEC Platform Manager
❖ Virtualization Infrastructure
❖ MEC Application Services
11. What is the use of Virtualization Infrastructure?
Virtualized infrastructure provides shared compute, storage and networking resources
for hosting MEC related applications or Virtual Network Functions (VNFs).
12. What MEC Breakout mode?
The session connection is redirected to a MEC application which is either hosted locally
on the MEC platform or on a remote server. Some examples of breakout applications
are local Content Deliver Network (CDN) caches (for ex., Akamai caches), gaming
services and media delivery services (for ex., Netflix streaming). Normally, you achieve
this by defining forwarding policies
13. What is MEC In-line mode ?
MEC is deployed transparently, in an in-line mode. The session connection is maintained
with the original server, while all the traffic traverses and goes through the application
running in the MEC. Examples of in-line MEC applications are transparent content
caching and security applications.
14. What is MEC Tap mode?
In Tap mode, data exchanged in a session is selectively duplicated and forwarded to
the tap MEC application. Some examples of tap mode applications are virtual network
probes, monitoring and security applications.
15. What is MEC Independent mode - MEC application and services run independently, but
still the MEC application is registered in the MEC platform and will receive other MEC
services, such as DNS and radio network information (for ex., radio bearer statistics).
Steering the traffic to the MEC is achieved by configuring local DNS or MEC host’s data
plane.
16. What is meant by service continuity?
In any telecom technology one of the key feature requirement is data session and service
continuity to ensure the uninterrupted service experience to the users irrespective of any change
of UE IP address or change in Core network anchor point.
17. Give the types of SSC modes?
SSC mode 1
SSC mode 2
SSC mode 3
ST. ANNE’S COLLEGE OF ENGINEERING AND TECHNOLOGY
Approved by AICTE, New Delhi. Affiliated to Anna University, Chennai
Accredited by NAAC
ANGUCHETTYPALAYAM, PANRUTI – 607 106.
• Confidentiality
• Limited traffic flow confidentiality.
The GRE is a protocol designed for performing tunnelling of a network layer protocol over
another network layer protocol.
It is generic in the sense that it provides encapsulation of one arbitrary network layer protocol
(e.g., IP or MPLS) over another arbitrary network layer protocol.
27. Write the main functions of the 5G non-access stratum (NAS)? (Nov/Dec 23)
Handling of UE registration and mobility, including generic functionality for access control
such as connection management, authentication, NAS security handling, UE identification
and UE configuration
Part-B
1. Discuss about Network slicing/ What is network slicing? Explain its requirements,
architecture, benefits and management. Discuss same with 100 users ( Nov/Dec 23)
2. Explain Multi access edge computing (MEC) (Nov/Dec 23)
3. Explain 5G end-to-end system architecture
4. Discuss about 5G service continuity
5. Explain the relation to EPC.
6. How does core network evolve to 5GC from EPC?
7. Explain the Maturity of 5G NR deployment
8. Explain edge computing
9. Explain 5G protocols: 5G NAS
10. Explain NG application protocol (NGAP)
11. Explain GPRS tunnelling protocol for the User Plane (GTP-U)
12. Explain IP security (IPSec) Protocol (Nov/Dec 23)
13. Explain Generic routing encapsulation (GRE)
Unit-4
Part-A
Part – A Two marks
• That a user can initiate communication toward other users or services such as Internet access,
and that connectivity and ongoing sessions can be maintained as the user moves, within or
between access technologies.
2. What are the mobility management functions?
• Service Area Restriction
• Local Area Data Network (LADN)
• Mobile Initiated Connection Only (MICO)
3. What is Service Area Restriction?
Mobility with session continuity is controlled at UE level at certain areas
4. Local Area Data Network (LADN)?
Mobility with session continuity is controlled at PDU Session level making communication
available at certain areas
5. Mobile Initiated Connection Only (MICO)?
Paging capability (as part of the mobility service) is optional.
6. What are the 5G Mobility Management (5GMM) related procedures?
✓ Common procedures
✓ Specific procedures
✓ Connection management procedures
7. What is Registration and Mobility?
Radio networks are built by cells that range in size from tens and hundreds of meters to tens of
kilometers and the UE updates the network about its location on a regular basis.
8. What is paging?
Paging is sending message and it is used to search for Idle UEs and establish a signalling
connection. Paging is, for example, triggered by downlink packets arriving to the UPF.
9. What is Mobile Initiated Connection Only (MICO) mode?
Mobile Initiated Connection Only (MICO) mode was introduced to allow paging resources to
be saved for UEs that don’t need to be available for Mobile Terminating communication. When
the UE is in MICO mode, the AMF considers the UE as unreachable when the UE is in CM-
IDLE state.
10. What is RRC Inactive?
It includes support for efficient communication with minimal signalling by using a concept
called RRC Inactive which affects the UE, NG-RAN and 5GC. RRC Inactive is a state where
a UE remains in CM-CONNECTED state (i.e. at NAS level) and can move within an area
configured by NG-RAN (the RAN Notification Area – RNA) without notifying the network.
11. How are the 5GC assistance information divided?
✓ Core Network assisted RAN parameters tuning.
✓ Core Network assisted RAN paging information.
✓ RRC Inactive Assistance Information.
12. What is Service Area and Mobility Restrictions?
Mobility Restrictions enables the network, mainly via subscriptions, to control the Mobility
Management of the UE as well as how the UE accesses the network. Similar logic as used in
EPS is applied in 5GS, but with some new functionality added as well.
ST. ANNE’S COLLEGE OF ENGINEERING AND TECHNOLOGY
Approved by AICTE, New Delhi. Affiliated to Anna University, Chennai
Accredited by NAAC
ANGUCHETTYPALAYAM, PANRUTI – 607 106.
Part-B
1. Explain Mobility management. (Nov/Dec 23)
2. Explain Interworking with EPC
3.Explain Interworking with EPC using 3GPP access
4.Explain interworking using the N26 interface
5.Explain command and control.
6.Explain spectrum sharing and trading/ Dynamic spectrum sharing and its advantages (Nov/Dec
23)
7. Explain the Spectrum Using SDR and Cognitive Radio – Dynamic Sharing
8. Explain Spectrum Trading
9. Explain Cognitive radio based on 5G.
10. Discuss about Millimeter Waves
ST. ANNE’S COLLEGE OF ENGINEERING AND TECHNOLOGY
Approved by AICTE, New Delhi. Affiliated to Anna University, Chennai
Accredited by NAAC
ANGUCHETTYPALAYAM, PANRUTI – 607 106.
Unit-5
Part- A
1. List the Security features in 5G network or need for security in 5G network
(Nov/Dec 23)
1. 5G uses licensed spectrum, which prevents hackers from eavesdropping into the network
and getting access to sensitive data that gets exchanged over the network.
2. 5G Network slicing ensures that data exchanged by one customer or a service does
not get shared with other customers or services riding on the network.
3. 5G supports “Home Control” features for preventing network spoofing attacks. Home
Control feature authenticates the device location in roaming scenarios.
2. What is Extensible Authentication Protocol (EAP)?
5G provides native support for Extensible Authentication Protocol (EAP). It allows new
authentication methods to be plugged into the network, by the service provider. It also
homogenizes the authentication method for 3GPP and non-3GPP systems (for example,
5G and WiFi systems).
3. What is Security Anchor Function (SEAF)?
Security Anchor Function (SEAF) in 5G, allows for re- authentication of the device,
when the device moves between different access networks without having to run the full
authentication process. SEAF is now part of the Access and Mobility Management Function
(AMF), in the 5G core.
4. What is PLMN?
In telecommunication, a public land mobile network (PLMN) is a combination of wireless
communication services offered by a specific operator in a specific country. A PLMN typically
consists of several cellular technologies like GSM/2G, UMTS/3G, LTE/4G, offered by a single
operator within a given country, often referred to as a cellular network.
5. What is SEPP?
The Security Edge Protection Proxy (SEPP) enables secure interconnect between 5G networks.
The SEPP ensures end-to-end confidentiality and/or integrity between source and destination
network for all 5G interconnect roaming messages.
6. What is SUCI?
Subscription Concealed Identifier (SUCI) .This is a temporary identifier used to conceal the
subscriber's permanent identity (SUPI) in a 5G network. It is used for authentication and
authorization purposes and provides improved security and privacy features compared to the
IMSI used in 4G networks.
7. Define User domain security
User domain security includes the set of security features that secure the user access to the
mobile device. The most common security feature in this user domain context is the secure
access to the USIM. Access to the USIM will be blocked until the USIM has authenticated the
user. Authentication is in this case based on a shared secret (the PIN code) that is stored inside
the USIM.
ST. ANNE’S COLLEGE OF ENGINEERING AND TECHNOLOGY
Approved by AICTE, New Delhi. Affiliated to Anna University, Chennai
Accredited by NAAC
ANGUCHETTYPALAYAM, PANRUTI – 607 106.
8. What are the primary different primary authentication and key agreement protocols in
the 5G network?
In the 5G network, three different primary authentication and key agreement protocols are
defined in the related 3rd generation partnership project (3GPP) specifications, including the
5G AKA (authentication and key agreement) protocol, the EAP-AKA' protocol, and the 5G
EAP-TLS protocol.
9. What is Flow based QoS framework?
The QFI is carried in an (GTP-U) encapsulation header on N3 (and N9) i.e. without any changes
to the end-to-end packet header. Data packets marked with the same QFI receives the same
traffic forwarding treatment (e.g. scheduling, admission threshold). The QoS Flows can be
GBR QoS Flows i.e. that require guaranteed flow bit rate, or QoS Flows that do not require
guaranteed flow bit rate (Non-GBR QoS Flows).
10. Define Service Data Adaptation Protocol (SDAP).
Service Data Adaptation Protocol (SDAP).specified in 3GPP TS 37.324, is used to enable
multiplexing if more than one QoS Flow is sent on a DRB, i.e. if the NG-RAN decides to setup
a DRB per QFI then the SDAP layer is not needed.
11. How to Protect the MEC infrastructure?
The risk can be minimized by deploying endpoint protection software in the MEC host.
MEC applications and services can be protected and secured by configuring and enforcing
application or service specific policies. For example, configuring role-based access control
for administrators managing the MEC applications and services. In addition, implement
monitoring to provide enhanced visibility of the MEC applications, MEC services and
the MEC infrastructure components.
12. How to Protect the Virtualized Infrastructure?
5G brings-in additional complexity to the operations teams, in deploying, managing
and securing the network infrastructure - as several 5G components are deployed in a
virtualized infrastructure. In order to protect, the Virtualized Network Functions (VNFs),
service providers have to turn-on DNS level security features to block bad domains and
bad talkers from accessing the network.
13. How to Protect the CPE and Small Cell devices?
In 5G, several equipment such as the Customer Premise Equipment (CPE) and Small Cells
are deployed closer to the user or at the user premise. In such cases, encryption of sensitive
data stored in non-secure physical locations is a must. All the CPE or Small Cell devices
connecting to the service provider’s 5G network should validate firmware and software
packages cryptographically at the time of booting.
14. Distinguish between Network Access Security and Network Domain Security. (Nov/Dec
23)
User domain security includes the set of security features that secure the user access to the
mobile device. The most common security feature in this user domain context is the secure
access to the USIM. Similarly Network domain security includes the set of features for its
access.
ST. ANNE’S COLLEGE OF ENGINEERING AND TECHNOLOGY
Approved by AICTE, New Delhi. Affiliated to Anna University, Chennai
Accredited by NAAC
ANGUCHETTYPALAYAM, PANRUTI – 607 106.
Part-B
1. Discuss about Security features in 5G networks.
2. Explain network domain security.