0% found this document useful (0 votes)
16 views50 pages

5G NetworkArchitecture

The document outlines the evolution and architecture of 5G networks, emphasizing the transition from previous generations and the introduction of new services and applications. It discusses the standardization landscape, access networks, edge cloud, radio transmission, and coding/modulation techniques that facilitate the efficient operation of 5G. The document highlights the complexity of 5G, its reliance on shared infrastructure, and the importance of adaptive scheduling mechanisms for optimizing network performance.

Uploaded by

Alisha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views50 pages

5G NetworkArchitecture

The document outlines the evolution and architecture of 5G networks, emphasizing the transition from previous generations and the introduction of new services and applications. It discusses the standardization landscape, access networks, edge cloud, radio transmission, and coding/modulation techniques that facilitate the efficient operation of 5G. The document highlights the complexity of 5G, its reliance on shared infrastructure, and the importance of adaptive scheduling mechanisms for optimizing network performance.

Uploaded by

Alisha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

5G NETWORK ARCHITECTURE

1) Introduction
Cellular networks, which have a 40-year history that parallels the Internet’s, have undergone significant change.
The first two generations supported voice and then text, with 3G defining the transition to broadband access,
supporting data rates measured in hundreds of kilobits-per-second. Today, the industry is at 4G (supporting data
rates typically measured in the few megabits-per-second) and starting the transition to 5G, with the promise of a
tenfold increase in data rates.

But 5G is about much more than increased bandwidth. In the same way 3G defined the transition from voice to
broadband, 5G’s promise is mostly about the transition from a single access service (broadband connectivity) to
a richer collection of edge services and devices, including support for immersive user interfaces (e.g., AR/VR),
mission-critical applications (e.g., public safety, autonomous vehicles), and the Internet-of-Things (IoT). Because
these use cases will include everything from home appliances to industrial robots to self-driving cars, 5G won’t
just support humans accessing the Internet from their smartphones, but also swarms of autonomous devices
working together on their behalf. All of this requires a fundamentally different architecture.

Following sections will describe the 5G cellular network, which because it is on an evolutionary path and not a
point solution, includes standardized specifications, a range of implementation choices, and a long list of
aspirational goals. Building a disaggregated, virtualized, and software-defined 5G access network is the direction
the industry is already headed (for good technical and business reasons), but breaking the 5G network down into
its elemental components is also the best way to explain how 5G works. It also helps to illustrate how 5G might
evolve in the future to provide even more value.

What this all means is that there is no single, comprehensive definition of 5G, any more than there is for the
Internet. It is a complex and evolving system, constrained by a set of standards that purposely give all the
stakeholders many degrees of freedom.

2) Standardization Landscape
As of 3G, the generational designation corresponds to a standard defined by the 3GPP (3rd Generation Partnership
Project). Even though its name has “3G” in it, the 3GPP continues to define the standards for 4G and 5G, each of
which corresponds to a sequence of releases of the standard. Release 15 is considered the demarcation point
between 4G and 5G, with Release 16 expected by the end of 2019. Complicating the terminology, 4G was on a
multi-release evolutionary path referred to as Long Term Evolution (LTE). 5G is on a similar evolutionary path,
with several expected releases over its lifetime.

While 5G is an ambitious advance beyond 4G, it is also the case that understanding 4G is the first step to
understanding 5G, as several aspects of the latter can be explained as bringing a new degree-of-freedom to the
former. In the sections that follow, some architectural feature of 4G are introduced as a way of laying the
foundation for the corresponding 5G component.

Like Wi-Fi, cellular networks transmit data at certain bandwidths in the radio spectrum. Unlike Wi-Fi, which
permits anyone to use a channel at either 2.4 or 5 GHz (these are unlicensed bands), governments have auctioned
off and licensed exclusive use of various frequency bands to service providers, who in turn sell mobile access
service to their subscribers.

There is also a shared-license band at 3.5-GHz, called Citizens Broadband Radio Service (CBRS), set aside in
North America for cellular use. Similar spectrum is being set aside in other countries. The CBRS band allows
three tiers of users to share the spectrum: first right of use goes to the original owners of this spectrum, naval
radars and satellite ground stations; followed by priority users who receive this right over 10MHz bands for three
years via regional auctions; and finally the rest of the population, who can access and utilize a portion of this band
as long as they first check with a central database of registered users. CBRS, along with standardization efforts to
extend cellular networks to operate in the unlicensed bands, open the door for private cellular networks similar to
Wi-Fi.

The specific frequency bands that are licensed for cellular networks vary around the world, and are complicated
by the fact that network operators often simultaneously support both old/legacy technologies and new/next-
generation technologies, each of which occupies a different frequency band. The high-level summary is that
traditional cellular technologies range from 700-MHz to 2400-MHz, with new mid-spectrum allocations now
happening at 6-GHz, and millimeter-wave (mmWave) allocations opening above 24-GHz.

While the specific frequency band is not directly relevant to understanding 5G from an architectural perspective,
it does impact the physical-layer components, which in turn has indirect ramifications on the overall 5G system.

3) Access Networks
The cellular network is part of the access network that implements the Internet’s so-called last mile. Other access
technologies include Passive Optical Networks (PON), colloquially known as Fiber-to-the-Home. These access
networks are provided by both big and small network operators. Global network operators like AT&T run access
networks at thousands of aggregation points-of-presence across a country like the US, along with a national
backbone that interconnects those sites. Small regional and municipal network operators might run an access
network with one or two points-of-presence, and then connect to the rest of the Internet through some large
operator’s backbone.

In either case, access networks are physically anchored at thousands of aggregation points-of-presence within
close proximity to end users, each of which serves anywhere from 1,000 to 100,000 subscribers, depending on
population density. In practice, the physical deployment of these ”edge” locations vary from operator to operator,
but one possible scenario is to anchor both the cellular and wireline access networks in Telco Central Offices.

Historically, the Central Office—officially known as the PSTN (Packet-Switched Telephone Network) Central
Office—anchored wired access (both telephony and broadband), while the cellular network evolved independently
by deploying a parallel set of Mobile Telephone Switching Offices (MTSO). Each MTSO serves as a mobile
aggregation point for the set of cell towers in a given geographic area. For our purposes, the important idea is that
such aggregation points exist, and it is reasonable to think of them as defining the edge of the operator-managed
access network. For simplicity, we sometimes use the term “Central Office” as a synonym for both types of edge
sites.

4) Edge Cloud
Because of their wide distribution and close proximity to end users, Central Offices are also an ideal place to host
the edge cloud. But what exactly is the edge cloud?

In a nutshell, the cloud began as a collection of warehouse-sized datacenters, each of which provided a cost-
effective way to power, cool, and operate a scalable number of servers. Over time, this shared infrastructure
lowered the barrier to deploying scalable Internet services, but today, there is increasing pressure to offer low-
latency/high-bandwidth cloud applications that cannot be effectively implemented in centralized datacenters.
Augmented Reality (AR), Virtual Reality (VR), Internet-of-Things (IoT), Autonomous Vehicles are all examples
of this kind of application. This has resulted in a trend to move some functionality out of the datacenter and
towards the edge of the network, closer to end users.

Where this edge is physically located depends on who you ask. If you ask a network operator that already owns
and operates thousands of Central Offices, then their Central Offices are an obvious answer. Others might claim
the edge is located at the 14,000 Starbucks across the US, and still others might point to the tens-of-thousands of
cell towers spread across the globe.

It is worth pointing out that the cloud’s migration to the edge coincides with a second trend, which is that network
operators are re-architecting the access network to use the same commodity hardware and best practices in
building scalable software as the cloud providers. Such a design, which is sometimes referred to as CORD (Central
Office Re-architected as a Datacenter), supports both the access network and edge services co-located on a shared
cloud platform. This platform is then replicated across hundreds or thousands of sites (including, but not limited
to, Central Offices).

When we get into the details of how 5G can be implemented in practice, we use CORD as our exemplar. For now,
the important thing to understand is that 5G is being implemented as software running on commodity hardware,
rather than embedded in the special-purpose proprietary hardware used in past generations. This has a significant
impact on how we think about 5G (and how we describes 5G), which will increasingly become yet another
software-based component in the cloud, as opposed to an isolated and specialized technology attached to the
periphery of the cloud.

Now use of CORD as an exemplar is not to imply that the edge cloud is limited to Central Offices. CORD is a
good exemplar because it is designed to host both edge services and access technologies like 5G on a common
platform, where the Telco Central Office is one possible location to deploy such a platform.

So to understand how 5G is being implemented, it is helpful to have a working understanding of how clouds are
built. This includes the use of commodity hardware (both servers and white-box switches), horizontally
scalable microservices (also referred to as cloud native), and Software-Defined Networks (SDN).

Another important terminology is Network Function Virtualization (NFV), which involves moving functionality
that was once embedded in hardware appliances into VMs running on commodity servers. In our experience, NFV
is a stepping stone towards the fully disaggregated solution we describe. It is an alternative to the cloud native
exemplar presented here.

5) Radio Transmission
For anyone familiar with wireless access technologies like Wi-Fi, the cellular network is most unique due to its
approach to sharing the available radio spectrum among its many users, all the while allowing those users to
remain connected while moving. This has resulted in a highly dynamic and adaptive approach, in which coding,
modulation and scheduling play a central role.

Cellular networks use a reservation-based strategy, whereas Wi-Fi is contention-based. This difference is rooted
in each system’s fundamental assumption about utilization: Wi-Fi assumes a lightly loaded network (and hence
optimistically transmits when the wireless link is idle and backs off if contention is detected), while 4G and 5G
cellular networks assume (and strive for) high utilization (and hence explicitly assign different users to different
“shares” of the available radio spectrum).

6) Coding and Modulation


The mobile channel over which digital data needs to be reliably transmitted brings a number of impairments,
including noise, attenuation, distortion, fading, and interference. This challenge is addressed by a combination of
coding and modulation, as depicted in following figure 6.1:

Figure 6.1 Role of coding and modulation in mobile communication

At its core, coding inserts extra bits into the data to help recover from all the environmental factors that interfere
with signal propagation. This typically implies some form of Forward Error Correction (e.g., turbo codes, polar
codes). Modulation then generates signals that represent the encoded data stream, and it does so in a way that
matches the channel characteristics: It first uses a digital modulation signal format that maximizes the number of
reliably transmitted bits every second based on the specifics of the observed channel impairments; it next matches
the transmission bandwidth to channel bandwidth using pulse shaping; and finally, it uses RF modulation to
transmit the signal as an electromagnetic wave over an assigned carrier frequency.

For a deeper appreciation of the challenges of reliably transmitting data by propagating radio signals through the
air, consider the scenario depicted in figure, where the signal bounces off various stationary and moving objects,
following multiple paths from the transmitter to the receiver, who may also be moving.

Figure 6.2 Signal propagate along multiple paths from transmitter to receiver

As a consequence of these multiple paths, the original signal arrives at the receiver spread over time. Empirical
evidence shows that the Multipath Spread—the time between the first and last signals of one transmission arriving
at the receiver—is 1 to 10 μs in urban environments and 10 to 30 μs in suburban environments. Theoretical bounds
for the time duration for which the channel may be assumed to be time invariant, known as the Coherence
Time and denoted Tc, is given by :

Tc=(c/v)×(1/f)

where c is the velocity of the signal, v is the velocity of the receiver (e.g., moving car or train), and f is the
frequency of the carrier signal that is being modulated. This says the coherence time is inversely proportional to
the frequency of the signal and the speed of movement, which makes intuitive sense: The higher the frequency
(narrower the wave) the shorter the coherence time, and likewise, the faster the receiver is moving the longer the
coherence time. Based on the target parameters to this model (selected according to the target physical
environment), it is possible to calculate Tc, which in turn bounds the rate at which symbols can be transmitted
without undue risk of interference.

To complicate matters further, above two figures imply the transmission originates from a single antenna, but cell
towers are equipped with an array of antennas, each transmitting in a different (but overlapping) direction. This
technology, called Multiple-Input-Multiple-Output (MIMO), opens the door to purposely transmitting data from
multiple antennas in an effort to reach the receiver, adding even more paths to the environment-imposed multipath
propagation.

One of the most important consequences of these factors is that the transmitter must receive feedback from every
receiver to judge how to best utilize the wireless medium on their behalf. 3GPP specifies a Channel Quality
Indicator (CQI) for this purpose, where in practice the receiver sends a CQI status report to the base station
periodically (e.g., every millisecond in LTE). These CQI messages report the observed signal-to-noise ratio, which
impacts the receiver’s ability to recover the data bits. The base station then uses this information to adapt how it
allocates the available radio spectrum to the subscribers it is serving, as well as which coding and modulation
scheme to employ. All of these decisions are made by the scheduler.

How the scheduler does its job is one of the most important properties of each generation of the cellular network,
which in turn depends on the multiplexing mechanism. For example, 2G used Time Division Multiple Access
(TDMA) and 3G used Code Division Multiple Access (CDMA). It is also a major differentiator for 4G and 5G,
completing the transition from the cellular network being fundamentally circuit-switched to fundamentally packet-
switched. The following two sections describe each, in turn.

7) Scheduling : 4G
The state-of-the-art in multiplexing 4G cellular networks is called Orthogonal Frequency-Division Multiple
Access (OFDMA). The idea is to multiplex data over a set of 12 orthogonal subcarrier frequencies, each of which
is modulated independently. The “Multiple Access” in OFDMA implies that data can simultaneously be sent on
behalf of multiple users, each on a different subcarrier frequency and for a different duration of time. The sub
bands are narrow (e.g., 15kHz), but the coding of user data into OFDMA symbols is designed to minimize the
risk of data loss due to interference between adjacent bands.

The use of OFDMA naturally leads to conceptualizing the radio spectrum as a two-dimensional resource, as shown
in figure 7.1:

Figure 7.1 Spectrum abstractly represented by a 2-D grid of schedulable Resource Elements.

The minimal schedulable unit, called a Resource Element (RE), corresponds to a 15kHz-wide band around one
subcarrier frequency and the time it takes to transmit one OFDMA symbol. The number of bits that can be encoded
in each symbol depends on the modulation rate, so for example using Quadrature Amplitude Modulation (QAM),
16-QAM yields 4 bits per symbol and 64-QAM yields 16 bits per symbol.

A scheduler allocates some number of REs to each user that has data to transmit during each 1ms Transmission
Time Interval (TTI, where users are depicted by different coloured blocks in figure. The only constraint on the
scheduler is that it must make its allocation decisions on blocks of 7x12=84 resource elements, called a Physical
Resource Block (PRB). Figure shows two back-to-back PRBs. Of course time continues to flow along one axis,
and depending on the size of the available frequency band (e.g., it might be 100MHz wide), there may be many
more subcarrier slots (and hence PRBs) available along the other axis, so the scheduler is essentially preparing
and transmitting a sequence of PRBs.

Note that OFDMA is not a coding/modulation algorithm, but instead provides a framework for selecting a specific
coding and modulator for each subcarrier frequency. QAM is one common example modulator. It is the scheduler’s
responsibility to select the modulation to use for each PRB, based on the CQI feedback it has received. The
scheduler also selects the coding on a per-PRB basis, for example, by how it sets the parameters to the turbo code
algorithm.

The 1ms TTI corresponds to the time frame in which the scheduler receives feedback from users about the quality
of the signal they are experiencing. This is the CQI mentioned earlier, where once every millisecond, each user
sends a set of metrics, which the scheduler uses to make its decision as to how to allocate PRBs during the
subsequent TTI.

Another input to the scheduling decision is the QoS Class Identifier (QCI), which indicates the quality-of-service
each class of traffic is to receive. In 4G, the QCI value assigned to each class (there are nine such classes, in total)
indicates whether the traffic has a Guaranteed Bit Rate (GBR) or not (non-GBR), plus the class’s relative priority
within those two categories.

Finally, keep in mind that figure focuses on scheduling transmissions from a single antenna, but the MIMO
technology described above means the scheduler also has to determine which antenna (or more generally, what
subset of antennas) will most effectively reach each receiver. But again, in the abstract, the scheduler is charged
with allocating a sequence of Resource Elements.

So, How does the scheduler decide which set of users to service during a given time interval, how many resource
elements to allocate to each such user, how to select the coding and modulation levels, and which antenna to
transmit their data on? This is an optimization problem. Our goal is to describe an architecture that allows someone
else to design and plug in an effective scheduler. Keeping the cellular architecture open to innovations like this is
one of our goals, and as we will see in the next section, becomes even more important in 5G where the scheduler
operates with even more degrees of freedom.

8) Scheduling : 5G
The transition from 4G to 5G introduces additional degrees-of-freedom in how the radio spectrum is scheduled,
making it possible to adapt the cellular network to a more diverse set of devices and applications domains.

Fundamentally, 5G defines a family of waveforms—unlike LTE, which specified only one waveform—each
optimized for a different band in the radio spectrum. The bands with carrier frequencies below 1GHz are designed
to deliver mobile broadband and massive IoT services with a primary focus on range. Carrier frequencies between
1GHz-6GHz are designed to offer wider bandwidths, focusing on mobile broadband and mission-critical
applications. Carrier frequencies above 24GHz (mmWaves) are designed to provide super wide bandwidths over
short, line-of-sight coverage.

(A waveform is the frequency, amplitude, and phase-shift independent property (shape) of a signal. A sine wave
is an example waveform.)

These different waveforms affect the scheduling and subcarrier intervals (i.e., the “size” of the resource elements
described in the previous section).

 For sub-1GHz bands, 5G allows maximum 50MHz bandwidths. In this case, there are two waveforms:
one with subcarrier spacing of 15kHz and another of 30kHz. (We used 15kHz in the example shown
in figure above). The corresponding scheduling intervals are 0.5ms and 0.25ms, respectively. (We used
0.5ms in the example shown in figure above.)

 For 1GHz-6GHz bands, maximum bandwidths go up to 100MHz. Correspondingly, there are three
waveforms with subcarrier spacings of 15kHz, 30kHz and 60kHz, corresponding to scheduling intervals
of 0.5ms, 0.25ms and 0.125ms, respectively.

 For millimetre bands, bandwidths may go up to 400MHz. There are two waveforms, with subcarrier
spacings of 60kHz and 120kHz. Both have scheduling intervals of 0.125ms.

This range of options is important because it adds another degree of freedom to the scheduler. In addition to
allocating radio resources to users, it has the ability to dynamically adjust the size of the resource by changing the
wave form being used. With this additional freedom, fixed-sized REs are no longer the primary unit of resource
allocation. We instead use more abstract terminology, and talk about allocating Resource Blocks to subscribers,
where the 5G scheduler determines both the size and number of Resource Blocks allocated during each time
interval.

The following figure depicts the role of the scheduler from this more abstract perspective, where just as with
4G, CQI feedback from the receivers and the QCI quality-of-service class selected by the subscriber are the two
key pieces of input to the scheduler. Note that the set of QCI values changes between 4G and 5G, reflecting the
increasing differentiation being supported. For 5G, each class includes the following attributes:

 Resource Type: Guaranteed Bit Rate (GBR), Delay-Critical GBR, Non-GBR

 Priority Level

 Packet Delay Budget

 Packet Error Rate

 Averaging Window

 Maximum Data Burst

Note that while the preceding discussion could be interpreted to imply a one-to-one relationship between
subscribers and a QCI, it is more accurate to say that each QCI is associated with a class of traffic (often
corresponding to some type of application), where a given subscriber might be sending and receiving traffic that
belongs to multiple classes at any given time.

Figure 8.1 Scheduler allocates Resource Elements to user data streams based on CQI feedback from receivers
and the QCI parameters associated with each class of service.
9) Basic Architecture
The following section identifies the main architectural components of cellular access networks. It focuses on the
components that are common to both 4G and 5G, and as such, establishes a foundation for understanding the
advanced features of 5G presented in later chapters.

This overview is partly an exercise in introducing 3GPP terminology. For someone that is familiar with the
Internet, this terminology can seem arbitrary (e.g., “eNB” is a “base station”), but it is important to keep in mind
that this terminology came out of the 3GPP standardization process, which has historically been concerned about
telephony and almost completely disconnected from the IETF and other Internet-related efforts. To further confuse
matters, the 3GPP terminology often changes with each generation (e.g., a base station is called eNB in 4G and
gNB in 5G).

10) Main Components


The cellular network provides wireless connectivity to devices that are on the move. These devices, which are
known as User Equipment (UE), have until recently corresponded to smartphones and tablets, but will
increasingly include cars, drones, industrial and agricultural machines, robots, home appliances, medical devices,
and so on.

Figure 10.1 Cellular networks consists of a Radio Access Network (RAN) and a Mobile Core.

As shown in figure 10.1, the cellular network consists of two main subsystems: the Radio Access Network
(RAN) and the Mobile Core. The RAN manages the radio spectrum, making sure it is both used efficiently and
meets the quality-of-service requirements of every user. The main component in the RAN is the crypticly
named eNodeB (or eNB), which is short for the equally cryptic evolved Node B. The Mobile Core is a bundle of
functionality (as opposed to a device) that serves several purposes:

 Provides Internet (IP) connectivity for both data and voice services.

 Ensures this connectivity fulfills the promised QoS requirements.

 Tracks user mobility to ensure uninterrupted service.

 Tracks subscriber usage for billing and charging.


(Mobile Core is another example of a generic term. In 4G this is called the Evolved Packet Core (EPC) and in 5G
it is called the Next Generation Core (NG-Core).)

Even though the word “Core” is in its name, from an Internet perspective, the Mobile Core is still part of the
access network, effectively providing a bridge between the RAN and the IP-world.

Taking a closer look at figure above, we see that a Backhaul Network interconnects the eNBs that implement the
RAN with the Mobile Core. This network is typically wired, may or may not have the ring topology shown in the
Figure, and is often constructed from commodity components found elsewhere in the Internet. For example, the
Passive Optical Network (PON) that implements Fiber-to-the-Home is a prime candidate for implementing the
RAN backhaul. The backhaul network is obviously a necessary part of the RAN, but it is an implementation
choice and not prescribed by the 3GPP standard.

Although 3GPP specifies all the elements that implement the RAN and Mobile Core in an open standard—
including sub-layers we have not yet introduced—network operators have historically bought proprietary
implementations of each subsystem from a single vendor. This lack of an open source implementation contributes
to the perceived “opaqueness” of the cellular network in general, and the RAN in particular. And while it is true
that an eNodeB implementation does contain sophisticated algorithms for scheduling transmission on the radio
spectrum—algorithms that are considered valuable Intellectual Property of the equipment vendors—there is
significant opportunity to open and disaggregate both the RAN and the Mobile Core. The following two sections
describe each, in turn.

Before getting to those details, following figure redraws components from above figure to highlight two important
distinctions. The first is that the eNB (which we will refer to as the Base Station from here on) has an analog
component (depicted by an antenna) and a digital component (depicted by a processor). The second is that the
Mobile Core is partitioned into a Control Plane and User Plane, which is similar to the control/data plane split
that someone familiar with the Internet would recognize. (3GPP also recently introduced a corresponding
acronym—CUPS, Control and User Plane Separation—to denote this idea).

Figure 10.2 Mobile Core divided into a Control Plan and a User Plane, an architectural feature known as
CUPS: Control and User Plane Separation

11) Radio Access Network (RAN)


We now describe the RAN by sketching the role each base station plays. Keep in mind this is kind of like
describing the Internet by explaining how a router works—a not unreasonable place to start, but it doesn’t fully
do justice to the end-to-end story.
First, each base station establishes the wireless channel for a subscriber’s UE upon power-up or upon handover
when the UE is active. This channel is released when the UE remains idle for a predetermined period of time.
Using 3GPP terminology, this wireless channel is said to provide a bearer service.

(The term “bearer” has historically been used in telecommunications (including early wireline technologies like
ISDN) to denote “data,” as opposed to a channel that carries “signalling” information.)

Figure 11.1 Base Station detects (and connects to) active UEs.

Second, each base station establishes ”3GPP Control Plane” connectivity between the UE and the corresponding
Mobile Core Control Plane component, and forwards signaling traffic between the two. This signaling traffic
enables UE authentication, registration, mobility tracking.

Figure 11.2 Base Station establishes control plane connectivity between each UE and the Mobile Core.
Third, for each active UE, the base station establishes one or more tunnels between the corresponding Mobile
Core User Plane component.

Figure 11.3 Base station establishes one or more tunnels between each UE and the Mobile Core’s User Plane.

Fourth, the base station forwards both control and user plane packets between the Mobile Core and the UE. These
packets are tunnelled over SCTP/IP and GTP/UDP/IP, respectively. SCTP (Stream Control Transport Protocol) is
3GPP-defined alternative to TCP, tailored to carry signalling (control) information for telephony services. GTP (a
nested acronym corresponding to (General Packet Radio Service) Tunneling Protocol) is a 3GPP-specific
tunneling protocol designed to run over UDP.

As an aside, it is noteworthy that connectivity between the RAN and the Mobile Core is IP-based. This was
introduced as one of the main changes between 3G and 4G. Prior to 4G, the internals of the cellular network were
circuit-based, which is not surprising given its origins as a voice network.

Figure 11.4 Base Station to Mobile Core (and Base Station to Base Station) control plane tunneled over
SCTP/IP and user plane tunneled over GTP/UDP/IP.
Fifth, the base station coordinates UE handovers between neighboring base stations, using direct station-to-station
links. Exactly like the station-to-core connectivity shown in the previous figure, these links are used to transfer
both control plane (SCTP over IP) and user plane (GTP over UDP/IP) packets.

Figure 11.5 Base Stations cooperate to implement UE hand over.

Sixth, the base station coordinates wireless multi-point transmission to a UE from multiple base stations, which
may or may not be part of a UE handover from one base station to another.

Figure 11.6 Base Stations cooperate to implement multipath transmission (link aggregation) to UEs.

For our purposes, the main takeaway is that the base station can be viewed as a specialized forwarder. In the
Internet-to-UE direction, it fragments outgoing IP packets into physical layer segments and schedules them for
transmission over the available radio spectrum, and in the UE-to-Internet direction it assembles physical layer
segments into IP packets and forwards them (over a GTP/UDP/IP tunnel) to the upstream user plane of the Mobile
Core. Also, based on observations of the wireless channel quality and per-subscriber policies, it decides whether
to (a) forward outgoing packets directly to the UE, (b) indirectly forward packets to the UE via a neighboring base
station, or (c) utilize multiple paths to reach the UE. The third case has the option of either spreading the physical
payloads across multiple base stations or across multiple carrier frequencies of a single base station (including
Wi-Fi).

Note that as outlined in the previous chapter, scheduling is complex and multi-faceted, even when viewed as a
localized decision at a single base station. What we now see is that there is also a global element, whereby it’s
possible to forward traffic to a different base station (or to multiple base stations) in an effort to make efficient
use of the radio spectrum over a larger geographic area.

In other words, the RAN as a whole (i.e., not just a single base station) not only supports handovers (an obvious
requirement for mobility), but also link aggregation and load balancing, mechanisms that are familiar to anyone
that understands the Internet.

12 ) Mobile Core
The main function of the Mobile Core is to provide external packet data network (e.g., Internet) connectivity to
mobile subscribers, while ensuring that they are authenticated and their observed service qualities satisfy their
subscription SLAs. An important aspect of the Mobile Core is that it needs to manage all subscribers’ mobility by
keeping track of their last whereabouts at the granularity of the serving base station.

While the aggregate functionality remains largely the same as we migrate from 4G to 5G, how that functionality
is virtualized and factored into individual components changes, with the 5G Mobile Core heavily influenced by
the cloud’s march towards a microservice-based (cloud native) architecture. This shift to cloud native is deeper
than it might first appear, in part because it opens the door to customization and specialization. Instead of
supporting just voice and broadband connectivity, the 5G Mobile Core can evolve to also support, for example,
massive IoT, which has a fundamentally different latency requirement and usage pattern (e.g., many more devices
connecting intermittently). This stresses—if not breaks—a one-size-fits-all approach to session management.

12.1) 4G Mobile Core


The 4G Mobile Core, which 3GPP officially refers to as the Evolved Packet Core (EPC), consists of five main
components, the first three of which run in the Control Plane (CP) and the second two of which run in the User
Plane (UP):

 MME (Mobility Management Entity): Tracks and manages the movement of UEs throughout the RAN.
This includes recording when the UE is not active.

 HSS (Home Subscriber Server): A database that contains all subscriber-related information.

 PCRF (Policy & Charging Rules Function): Tracks and manages policy rules and records billing data on
subscriber traffic.

 SGW (Serving Gateway): Forwards IP packets to and from the RAN. Anchors the Mobile Core end of
the bearer service to a (potentially mobile) UE, and so is involved in handovers from one base station to
another.

 PGW (Packet Gateway): Essentially an IP router, connecting the Mobile Core to the external Internet.
Supports additional access-related functions, including policy enforcement, traffic shaping, and charging.
Although specified as distinct components, in practice the SGW (RAN-facing) and PGW (Internet-facing) are
often combined in a single device, commonly referred to as an S/PGW. The end result is illustrated in following
figure 12.1.1:

Figure 12.1.1 4G Mobile Core (Evolved Packet Core).

Note that 3GPP is flexible in how the Mobile Core components are deployed to serve a geographic area. For
example, a single MME/PGW pair might serve a metropolitan area, with SGWs deployed across ~10 edge sites
spread throughout the city, each of which serves ~100 base stations. But alternative deployment configurations
are allowed by the spec.

12.2) 5G Mobile Core


The 5G Mobile Core, which 3GPP calls the NG-Core, adopts a microservice-like architecture, where we say
“microservice-like” because while the 3GPP specification spells out this level of disaggregation, it is really just
prescribing a set of functional blocks and not an implementation. Keeping in mind a set of functional blocks is
very different from the collection of engineering decisions that go into designing a microservice-based system,
viewing the collection of components shown in figure 12.2.1 as a set of microservices is a good working model.

The following organizes the set of functional blocks into three groups. The first group runs in the Control Plane
(CP) and has a counterpart in the EPC:

 AMF (Core Access and Mobility Management Function): Manages the mobility-related aspects of the
EPC’s MME. Responsible for connection and reachability management, mobility management, access
authentication and authorization, and location services.

 SMF (Session Management Function): Manages each UE session, including IP address allocation,
selection of associated UP function, control aspects of QoS, and control aspects of UP routing. Roughly
corresponds to part of the EPC’s MME and the control-related aspects of the EPC’s PGW.

 PCF (Policy Control Function): Manages the policy rules that other CP functions then enforce. Roughly
corresponds to the EPC’s PCRF.

 UDM (Unified Data Management): Manages user identity, including the generation of authentication
credentials. Includes part of the functionality in the EPC’s HSS.

 AUSF (Authentication Server Function): Essentially an authentication server. Includes part of the
functionality in the EPC’s HSS.
The second group also runs in the Control Plane (CP) but does not have a counterpart in the EPC:

 SDSF (Structured Data Storage Network Function): A “helper” service used to store structured data.
Might be implemented by an “SQL Database” in a microservices-based system.

 UDSF (Unstructured Data Storage Network Function): A “helper” service used to store unstructured data.
Might be implemented by a “Key/Value Store” in a microservices-based system.

 NEF (Network Exposure Function): A means to expose select capabilities to third-party services,
including translation between internal and external representations for data. Might be implemented by
an “API Server” in a microservices-based system.

 NFR (NF Repository Function): A means to discover available services. Might be implemented by a
“Discovery Service” in a microservices-based system.

 NSSF (Network Slicing Selector Function): A means to select a Network Slice to serve a given UE.
Network slices are essentially a way to differentiate service given to different users. It is a key feature of
5G that we discuss in depth later in this tutorial.

The third group includes the one component that runs in the User Plane (UP):

 UPF (User Plane Function): Forwards traffic between RAN and the Internet, corresponding to the S/PGW
combination in EPC. In addition to packet forwarding, responsible for policy enforcement, lawful
intercept, traffic usage reporting, and QoS policing.

Of these, the first and third groups are best viewed as a straightforward refactoring of 4G’s EPC, while the second
group—despite the gratuitous introduction of new terminology—is 3GPP’s way of pointing to a cloud native
solution as the desired end-state for the Mobile Core. Of particular note, introducing distinct storage services
means that all the other services can be stateless, and hence, more readily scalable. Also note that figure 12.2.1
adopts an idea that’s common in microservice-based systems, namely, to show a “message bus” interconnecting
all the components rather than including a full set of pairwise connections. This also suggests a well-understood
implementation strategy.

Figure 12.2.1 5G Mobile Core (NG-Core).


Stepping back from these details, and with the caveat that we are presuming an implementation, the main takeaway
is that we can conceptualize the Mobile Core as a Service Mesh. We adopt this terminology for “an interconnected
set of microservices” since it is widely used in cloud native systems. Other terms you will sometimes hear
are Service Graph and Service Chain, the latter being more prevalent in NFV-oriented documents. 3GPP is silent
on the specific terminology since it is considered an implementation choice rather than part of the specification.

13) Deployment Options


With an already deployed 4G RAN/EPC in the field and a new 5G RAN/NG-Core deployment underway, we
can’t ignore the issue of transitioning from 4G to 5G (an issue the IP-world has been grappling with for 20 years).
3GPP officially spells out multiple deployment options, which can be summarized as follows:

 Stand-Alone 4G / Stand-Alone 5G

 Non-Stand-Alone (4G+5G RAN) over 4G’s EPC

 Non-Stand-Alone (4G+5G RAN) over 5G’s NG-Core

Focusing on the second pair, which imply incremental phasing, we see two general strategies. The first is to
connect new 5G base stations to existing 4G-based EPCs, and then incrementally evolve the Mobile Core by
refactoring the components and adding NG-Core capabilities over time. The second is to implement a backward-
compatible NG-Core that can support both 4G and 5G base stations, where the new NG-Core could be
implemented from scratch, but would likely start with the existing EPC code base.

One reason we call attention to the phasing issue is that we face a similar challenge in the chapters that follow.
The closer the following discussion gets to implementation details, the more specific we have to be about whether
we are using 4G components or 5G components. As a general rule, we use 4G components—particularly with
respect to the Mobile Core, since that’s the available open source software—and trust the reader can make the
appropriate substitution without loss of generality. Like the broader industry, the open source community is in the
process of incrementally evolving its 4G code base into its 5G-compliant counterpart.

14) RAN Internals


The description of the RAN in the previous chapter focused on functionality, but was mostly silent about the
RAN’s internals structure. We now focus in on some of the internal details, and in doing so, explain how the RAN
is being transformed in 5G. This involves first describing the stages in the packet processing pipeline, and then
showing how these stages can be distributed and implemented.

14.1) Packet Processing Pipeline


Figure 14.1.1 shows the packet processing stages implemented by the base station. These stages are specified by
the 3GPP standard. Note that the figure depicts the base station as a pipeline (running left-to-right) but it is equally
valid to view it as a protocol stack (as is typically done in official 3GPP documents). Also note that (for now) we
are agnostic as to how these stages are implemented, but since we are ultimately heading towards a cloud-based
implementation, you can think of each as corresponding to a microservice (if that is helpful).
Figure 14.1.1 RAN processing pipeline, including both user and control plane components.

The key stages are as follows:

 RRC (Radio Resource Control) → Responsible for configuring the coarse-grain and policy-related
aspects of the pipeline. The RRC runs in the RAN’s control plane; it does not process packets on the user
plane.

 PDCP (Packet Data Convergence Protocol) → Responsible for compressing and decompressing IP
headers, ciphering and integrity protection, and making an “early” forwarding decision (i.e., whether to
send the packet down the pipeline to the UE or forward it to another base station).

 RLC (Radio Link Control) → Responsible for segmentation and reassembly, including reliably
transmitting/receiving segments by implementing ARQ.

 MAC (Media Access Control) → Responsible for buffering, multiplexing and demultiplexing segments,
including all real-time scheduling decisions about what segments are transmitted when. Also able to
make a “late” forwarding decision (i.e., to alternative carrier frequencies, including Wi-Fi).

 PHY (Physical Layer) → Responsible for coding and modulation (as discussed in an earlier chapter),
including FEC.

While it is simplest to view the stages in Figure 14.1.1 as a pure left-to-right pipeline, in practice the Scheduler
running in the MAC stage implements the “main loop” for outbound traffic, reading data from the upstream RLC
and scheduling transmissions to the downstream PHY. In particular, since the Scheduler determines the number
of bytes to transmit to a given UE during each time period (based on all the factors outlined in an earlier chapter),
it must request (get) a segment of that length from the upstream queue. In practice, the size of the segment that
can be transmitted on behalf of a single UE during a single scheduling interval can range from a few bytes to an
entire IP packet.
15) Split RAN
The next step is understanding how the functionality outlined above is partitioned between physical elements, and
hence, “split” across centralized and distributed locations. Although the 3GPP standard allows for multiple split-
points, the partition shown in Figure 15.1 is the one being actively pursued by the operator-led O-RAN (Open
RAN) Alliance.

Figure 15.1 Split-RAN processing pipeline distributed across a Central Unit (CU), Distributed Unit (DU), and
Radio Unit (RU).

This results in a RAN-wide configuration similar to that shown in Figure 15.2, where a single Central Unit
(CU) running in the cloud serves multiple Distributed Units (DUs), each of which in turn serves multiple Radio
Units (RUs). Critically, the RRC (centralized in the CU) is responsible for only near-real time configuration and
control decision making, while the Scheduler that is part of the MAC stage is responsible for all real-time
scheduling decisions.

Figure 15.2 Split-RAN hierarchy, with one CU serving multiple DUs, each of which serves multiple RUs.
Clearly, a DU needs to be “near” (within 1ms) the RUs it manages since the MAC schedules the radio in real-
time. One familiar configuration is to co-locate a DU and an RU in a cell tower. But when an RU corresponds to
a small cell, many of which might be spread across a modestly sized geographic area (e.g., a mall, campus, or
factory), then a single DU would likely service multiple RUs. The use of mmWave in 5G is likely to make this
later configuration all the more common.

Also note that the split-RAN changes the nature of the Backhaul Network, which in 4G connected the base stations
(eNBs) back to the Mobile Core. With the split-RAN there are multiple connections, which are officially labelled
as follows:

 RU-DU connectivity is called the Fronthaul

 DU-CU connectivity is called the Midhaul

 CU-Mobile Core connectivity is called the Backhaul

As we will see in a later , one possible deployment co-locates the CU and Mobile Core in the same cluster, meaning
the backhaul is implemented in the cluster switching fabric. In such a configuration, the midhaul then effectively
serves the same purpose as the original backhaul, and the fronthaul is constrained by the predictable/low-latency
requirements of the MAC stage’s real-time scheduler.

16) Software Defined RAN


Finally, we describe how the RAN is implemented according to SDN principles, resulting in an SD-RAN. The
key architectural insight is shown in Figure 16.1, where the RRC is partitioned into two sub-components: the one
on the left provides a 3GPP-compliant way for the RAN to interface to the Mobile Core’s control plane, while the
latter opens a new programmatic API for exerting software-based control over the pipeline that implements the
RAN user plane. To be more specific, the left sub-component simply forwards control packets between the Mobile
Core and the PDCP, providing a path over which the Mobile Core can communication with the UE for control
purposes, whereas the right sub-component implements the core of the RCC’s control functionality.

Figure 16.1 RRC disaggregated into a Mobile Core facing control plane component and a Near Real-Time
Controller.
All constituent parts of the RRC, plus the PDCP, form the CU.

Completing the picture, Figure 16.2 shows the Near-RT RAN Controller implemented as a traditional SDN
Controller hosting a set of SDN control apps. The Near Real-Time Controller maintains a RAN Network
Information Base (R-NIB) that includes time-averaged CQI values and other per-session state (e.g., GTP tunnel
IDs, QCI values for the type of traffic), while the MAC (as part of the DU) maintains the instantaneous CQI values
required by the real-time scheduler. Specifically, the R-NIB includes the following state:

 NODES: Base Stations and Mobile Devices

o Base Station Attributes:

 Identifiers

 Version

 Config Report

 RRM config

 PHY resource usage

o Mobile Device Attributes:

 Identifiers

 Capability

 Measurement Config

 State (Active/Idle)

 LINKS: Physical between two nodes and potential between UEs and all neighbor cells

o Link Attributes:

 Identifiers

 Link Type

 Config / Bearer Parameters

 QCI Value

 SLICES: Virtualized RAN construct

o Slice Attributes:

 Links

 Bearers / Flows

 Validity Period

 Desired KPIs

 MAC RRM Configuration

 RRM Control Configuration


Figure 16.2 Example set of control applications running on top of Near Real-Time RAN Controller.

The example Control Apps in figure 16.2 include a range of possibilities, but is not intended to be an exhaustive
list. The right-most example, RAN Slicing, is the most ambitious in that it introduces a new capability: Virtualizing
the RAN. It is also an idea that has been implemented, which we describe in more detail in the next chapter.

The next three (RF Configuration, Semi-Persistent Scheduling, Cipher Key Assignment) are examples of
configuration-oriented applications. They provide a programmatic way to manage seldom-changing configuration
state, thereby enabling zero-touch operations. Coming up with meaningful policies (perhaps driven by analytics)
is likely to be an avenue for innovation in the future.

17) Advanced Capabilities


Disaggregating the cellular network pays dividends. This section explores three examples. Stepping back to look
at the big picture, previous sections (Architecture) described “what is” (the basics of 3GPP) and the (RAN
Internals) described “what will be” (where the industry, led by the O-RAN Alliance, is clearly headed), whereas
this section describes “what could be” (our best judgement on cutting-edge capabilities that will eventually be
realized).

17.1) Optimized Data Plane


There are many reasons to disaggregate functionality, but one of the most compelling is that by decoupling control
and data code paths, it is possible to optimize the data path. This can be done, for example, by programming it
into specialized hardware. Modern white-box switches with programmable packet forwarding pipelines are a
perfect example of specialized hardware we can exploit in the cellular network. Figure 17.1.1 shows the first step
in the process of doing this. The figure also pulls together all the elements we’ve been describing up to this point.
There are several things to note about this diagram.
Figure 17.1.1 End-to-end disaggregated system, including Mobile Core and Split-RAN.

First, the figure combines both the Mobile Core and RAN elements, organized according to the major subsystems:
Mobile Core, Central Unit (CU), Distributed Unit (DU), and Radio Unit (RU). The figure also shows one possible
mapping of these subsystems onto physical locations, with the first two co-located in a Central Office and the
latter two co-located in a cell tower. As discussed earlier, other configurations are also possible.

Second, the figure shows the Mobile Core’s two user plane elements (PGW, SGW) and the Central Unit’s single
user plane element (PDCP) further disaggregated into control/user plane pairs, denoted PGW-C / PGW-U, SGW-
C / SGW-U, and PDCP-C / PDCP-U, respectively. Exactly how this decoupling is realized is a design choice (i.e.,
not specified by 3GPP), but the idea is to reduce User Plane component to the minimal Receive-Packet / Process-
Packet / Send-Packet processing core, and elevate all control-related aspects into the Control Plane component.

Third, the PHY (Physical) element of the RAN pipeline is split between the DU and RU partition. Although
beyond the scope of this book, the 3GPP spec specifies the PHY element as a collection of functional blocks, some
of which can be effectively implemented by software running on a general-purpose processor and some of which
are best implemented in specialized hardware (e.g., a Digital Signal Processor). These two subsets of functional
blocks map to the PHY Upper (part of the DU) and the PHY Lower (part of the RU), respectively.

Fourth, and somewhat confusingly, Figure 17.1.1 shows the PCDP-C element and the Control Plane (Forwarding)
element combined into a single functional block, with a data path (blue line) connecting that block to both the
RLC and the MME. Exactly how this pair is realized is an implementation choice (e.g., they could map onto two
or more microservices), but the end result is that they are part of an end-to-end path over which the MME can
send control packets to the UE. Note that this means responsibility for demultiplexing incoming packets between
the control plane and user plane falls to the RLC.
Figure 17.1.2 Implementing data plane elements of the User Plane in programmable switches.

Figure 17.1.2 shows why we disaggregated these components: it allows us to realize the three user plane elements
(PGW-U, SGW-U, PDCP-U) in switching hardware. This can be done using a combination of a language that is
tailored for programming forwarding pipelines (e.g., P4), and a protocol-independent switching architecture (e.g.,
Tofino). For now, the important takeaway is that the RAN and Mobile Core user plane can be mapped directly
onto an SDN-enabled data plane.

Pushing RAN and Mobile Core forwarding functionality into the switching hardware results in overlapping
terminology that can sometimes be confusing. 5G separates the functional blocks into control and user planes,
while SDN disaggregates a given functional block into control and data plane halves. The overlap comes from
our choosing to implement the 5G user plane by splitting it into its SDN-based control and data plane parts. As
one simplification, we refer to the Control Plane (Forwarding) and PDCP-C combination as the CU-C (Central
Unit - Control) going forward.

Finally, the SDN-prescribed control/data plane disaggregation comes with an implied implementation strategy,
namely, the use of a scalable and highly available Network Operating System (NOS). Like a traditional OS, a NOS
sits between application programs (control apps) and the underlying hardware devices (whitebox switches),
providing higher levels abstractions (e.g., network graph) to those applications, while hiding the low-level details
of the underlying hardware. To make the discussion more concrete, we use ONOS (Open Network Operating
System) as an example NOS, where PGW-C, SGW-C, and PDCP-C are all realized as control applications running
on top of ONOS.
Figure 17.1.3 Control Plane elements of the User Plane implemented as Control Applications running on an
SDN Controller (e.g., ONOS).

Figure 17.1.3 shows one possible configuration, in which the underlying switches are interconnected to form a
leaf-spine fabric. Keep in mind that the linear sequence of switches implied by Figure 17.1.2 is logical, but that
in no way restricts the actual hardware to the same topology. The reason we use a leaf-spine topology is related
to our ultimate goal of building an edge cloud, and leaf-spine is the proto-typical structure for such cloud-based
clusters. This means the three control applications must work in concert to implement an end-to-end path through
the fabric, which in practice happens with the aid of other, fabric aware, control applications (as implied by the
“…” in the Figure). We describe the complete picture in more detail in the next chapter, but for now, the big
takeaway is that the control plane components of the 5G overlay can be realized as control applications for an
SDN-based underlay.

17.2) Multi Cloud


Another consequence of disaggregating functionality is that once decoupled, different functions can be placed in
different physical locations. We have already seen this when we split the RAN, placing some functions (e.g., the
PCDP and RRC) in the Central Unit and others (e.g., RLC and MAC) in Distributed Units. This allows for simpler
(less expensive) hardware in remote locations, where there are often space, power, and cooling constraints.

This process can be repeated by distributing the more centralized elements across multiple clouds, including large
datacenters that already benefit from elasticity and economies of scale. Figure 17.2.1 shows the resulting multi-
cloud realization of the Mobile Core. We leave the user plane at the edge of the network (e.g., in the Central
Office) and move control plane to a centralized cloud. It could even be a public cloud like Google or Amazon.
This includes not only the MME, PCRF and HSS, but also the PGW-C and SGW-C we decoupled in the previous
section. (Note that Figure 17.2.1 renames the PDCP-U from earlier diagrams as the CU-U; either label is valid.)
Figure 17.2.1 Multi-Cloud implementation, with MME, HSS, PCRF and Control Plane elements of the PGW
and SGW running in a centralized cloud.

What is the value in doing this? Just like the DU and RU, the Edge Cloud likely has limited resources. If we want
room to run new edge services there, it helps to move any components that need not be local to a larger facility
with more abundant resources. Centralization also facilitates collecting and analyzing data across multiple edge
locations, which is harder to do if that information is distributed over multiple sites. (Analytics performed on this
data also benefits from having abundant compute resources available.)

But there’s another reason worth calling out: It lowers the barrier for anyone (not just the companies that own and
operate the RAN infrastructure) to offer mobile services to customers. These entities are called MVNOs (Mobile
Virtual Network Operators) and one clean way to engineer an MVNO is to run your own Mobile Core on a cloud
of our choosing.

18) Network Slicing


One of the most compelling value propositions of 5G is the ability to differentiate the level of service offered to
different applications and customers. Differentiation, of course, is key to being able to charge some customers
more than others, but the monetization case aside, it is also necessary if you are going to support such widely
varying applications as streaming video (which requires high bandwidth but can tolerate larger latencies) and
Internet-of-Things (which has minimal bandwidth needs but requires extremely low and predictable latencies).

The mechanism that supports this sort of differentiation is called network slicing, and it fundamentally comes
down to scheduling, both in the RAN (deciding which segments to transmit) and in the Mobile Core (scaling
microservice instances and placing those instances on the available servers). The following introduces the basic
idea, starting with the RAN.

But before getting into the details, we note that a network slice is a generalization of the QoS Class Index (QCI)
discussed earlier. 3GPP specifies a standard set of network slices, called Standardized Slice Type (SST) values.
For example, SST 1 corresponds to mobile broadband, SST 2 corresponds to Ultra-Reliable Low Latency
Communications, SST 3 corresponds to Massive IoT, and so on. It is also possible to extend this standard set with
additional slice behaviors, as well as define multiple slices for each SST (e.g., to further differentiate subscribers
based on priority).
18.1) RAN Slicing
We start by reviewing the basic scheduling challenge previewed in Chapter 2. As depicted in following figure the
radio spectrum can be conceptualized as a two-dimensional grid of Resource Blocks (RB), where the scheduler’s
job is to decide how to fill the grid with the available segments from each user’s transmission queue based on CQI
feedback from the UEs. To restate, the power of OFDMA is the flexibility it provides in how this mapping is
performed.

Figure 18.1.1 Scheduler allocating resource blocks to UEs.

While in principle one could define an uber scheduler that takes dozens of different factors into account, the key
to network slicing is to add a layer of indirection, such that (as shown in figure 18.1.2, we perform a second
mapping of Virtual RBs to Physical RBs. This sort of virtualization is common in resource allocators throughout
computing systems because we want to separate how many resources are allocated to each user from the decision
as to which physical resources are actually assigned. This virtual-to-physical mapping is performed by a layer
typically known as a Hypervisor, and the important thing to keep in mind is that it is totally agnostic about which
user’s segment is affected by each translation.

Figure 18.1.2 Wireless Hypervisor mapping virtual resource blocks to physical resource blocks
Having decoupled the Virtual RBs from Physical RBs, it is now possible to define multiple Virtual RB sets (of
varying sizes), each with its own scheduler. Figure 18.1.3 gives an example with two equal-sized RB sets, where
the important consequence is that having made the macro-decision that the Physical RBs are divided into two
equal partitions, the scheduler associated with each partition is free to allocate Virtual RBs completely independent
from each other. For example, one scheduler might be designed to deal with high-bandwidth video traffic and
another scheduler might be optimized for low-latency IoT traffic. Alternatively, a certain fraction of the available
capacity could be reserved for premium customers or other high-priority traffic (e.g., public safety), with the rest
shared among everyone else.

Figure 18.1.3 Multiple schedulers running on top of wireless hypervisor.

Going one level deeper in the implementation details, the real-time scheduler running in each DU receives high-
level directives from the near real-time scheduler running in the CU, and as depicted in figure 18.1.4, these
directives make dual transmission, handoff, and interference decisions on a per-slice basis. A single RAN Slicing
control application is responsible for the macro-scheduling decision by allocating resources among a set of slices.
Understanding this implementation detail is important because all of these control decisions are implemented by
software modules, and hence, easily changed or customized. They are not “locked” into the underlying system, as
they have historically been in 4G’s eNodeBs.

Figure 18.1.4 Centralized near-realtime control applications cooperating with distribute real-time RAN
schedulers.
18.2) Core Slicing
In addition to slicing the RAN, we also need to slice the Mobile Core. In many ways, this is a well-understood
problem, involving QoS mechanisms in the network switches (i.e., making sure packets flow through the
switching fabric according to the bandwidth allocated to each slice) and the cluster processors (i.e., making sure
the containers that implement each microservice are allocated sufficient CPU cores to sustain the packet
forwarding rate of the corresponding slice).

But packet scheduling and CPU scheduling are low-level mechanisms. What makes slicing work is to also
virtualize and replicate the entire service mesh that implements the Mobile Core. If you think of a slice as a system
abstraction, then that abstraction needs to keep track of the set of interconnected microservices that implement
each slice, and then instruct the underlying packet schedulers to allocate sufficient network bandwidth to the
slice’s flows and the underlying CPU schedulers to allocate sufficient compute cycles to the slice’s containers.

For example, if there are two network slices (analogous to the two RAN schedulers shown in above figures), then
there would also need to be two Mobile Core service meshes: One set of AMF, SMF, UPF,… microservices
running on behalf of the first slice and a second set of AMF, SMF, UPF,… microservices running on behalf of the
second slice. These two meshes would scale independently (i.e., include a different number of container instances),
depending on their respective workloads and QoS guarantees. The two slices would also be free to make different
implementation choices, for example, with one optimized for massive IoT applications and the other optimized
for high-bandwidth AR/VR applications.

The one remaining mechanism we need is a demultiplexing function that maps a given packet flow (e.g., between
UE and some Internet application) onto the appropriate instance of the service mesh. This is the job of the NSSF:
it is responsible for selecting the mesh instance a given slice’s traffic is to traverse.

19) Exemplar Implementation


The steps we’ve taken in the previous chapters to virtualize, disaggregate, optimize, distribute, and slice the
cellular network not only help us understand the inner-workings of 5G, but they are also necessary to reduce the
entirety of the 5G cellular network to practice. The goal is an implementation, which by definition, forces us to
make specific engineering choices. This chapter describes one set of engineering choices that results in a running
system. It should be interpreted as an exemplar, for the sake of completeness, but not the only possibility.

The system we describe is called CORD, which you will recall from the Introduction is an acronym
(Central Office Re-architected as a Datacenter). More concretely, CORD is a blueprint for building a 5G
deployment from commodity hardware and a collection of open source software components. We call this
hardware/software combination a CORD POD, where the idea is to deploy a POD at each edge site that is part of
a cellular network.

Before getting into the specifics, it is important to understand that CORD is a work-in-progress, with a sizable
open source community contributing to its code base. Many of the components are quite mature, and currently
running in operator trials and production networks. Others (largely corresponding to the advanced capabilities
described in the previous chapter) are prototypes that run in “demonstration mode,” but are not yet complete
enough to be included in official releases. Also, as outlined in the earlier discussion on deployment options, CORD
starts with a production-quality EPC that is being incrementally evolved into its 5G counterpart. (This chapter
uses the EPC-specific components for illustrative purposes.)

20) Framework
Following gives a schematic overview of a CORD POD. It connects downstream to a set of DUs (and associated
RUs), and upstream to the rest of the Internet. Internally, it includes a set of commodity servers (the figure shows
four racks of three servers each, but the design accommodates anywhere from a partial rack to 16 racks) and a set
of white-box switches arranged in a leaf-spine topology (the figure shows two leaves and two spine switches, but
the design allows anywhere from a single switch to two leaf switches per rack and as many spine switches as
necessary to provide sufficient east-to-west bandwidth).

Figure 20.1 CORD implementation of RAN and Mobile Core.

With respect to software, Figure 20.1 shows a combination of RAN (red) and Mobile Core (blue) components,
plus the modules that define the CORD platform (orange). We describe the platform components later in this
chapter, but you can think of them as collectively implementing a multi-tenant cloud on top of which many
different scalable services can run. The RAN and Mobile Core are two such tenants. The CORD platform can also
host other edge services (which is one reason CORD is built using cloud technology in the first place), but exactly
what other edge services might run on a given CORD POD is beyond the scope of this book.

The RAN and Core related components are ones we’ve described in earlier chapters. They include the Control
and User planes of the CU and Mobile Core, respectively, where to simplify the diagram, we show the SGW and
PGW merged into a single S/PGW. One aspect of Figure E that requires further elaboration is how each of the
RAN and Mobile Core components are actually realized. There are three different manifestations of the functional
components implied by the Figure: (1) the data plane layer of the CU-U and S/PGW-U are realized as P4 programs
loaded into the programmable switches; (2) the control plane layer of the CU-U and S/PGW-U (as well as the
Trellis platform module) are realized as control applications loaded onto the ONOS Network OS; and the
remaining components are realized as Kubernetes-managed microservices. (Kubernetes is implicit, and not shown
in the figure.)

To expand on this idea, Figure 20.2 gives an alternative view of a CORD POD, abstracting away the details
of what services it hosts, and focusing instead on how those services are instantiated on the POD. In this figure,
all the functionality instantiated onto the POD runs as a combination of Kubernetes-based microservices and
ONOS-based control applications.
Figure 20.2 Alternative view of CORD, with a CI/CD toolchain managing the platform and set of services
implemented by a combination of ONOS-based control apps and Kubernetes-based microservices.

When abstracted in this way, we can view a POD as including three major subsystems:

 Platform: The base layer common to all configurations includes Kubernetes as the container
management system and ONOS as the SDN controller, with Stratum loaded on to each switch. Both
ONOS and the control applications it hosts run as a Kubernetes-managed microservices.

 Profile: The deployment-specific collection of microservices and SDN control apps that have been
selected to run on a particular POD. This is a variable and evolvable set, and it includes the control plane
and edge services described elsewhere.

 CI/CD Toolchain: Used to assemble, deploy, operate, and upgrade a particular Platform/Profile
combination. It implements a set of processes that transforms a collection of disaggregated and
virtualized components into an operational system capable of responding to operator directives and
carrying live traffic.

Although beyond the scope of this book, the CI/CD toolchain uses standard DevOps tools to bootstrap software
onto the cluster of servers and switches, and rollout/rollback individual microservices and control applications. It
also auto-generates the Northbound Interface (NBI) that operators use to manage the POD, based on a declarative
specification of the Profile the POD is configured to support. This NBI is sufficiently complete to operate a CORD
POD in a production environment.
21) Platform Components
We now return to the three platform-related components shown in figures. Each is a substantial open source
component in its own right, but for our purposes, it is enough to understand the role each plays in supporting a
5G-based profile of CORD.

 Stratum: A thin operating system that runs locally on each white-box switch. It’s purpose is to provide
a hardware-independent interface for managing and programming the switches in CORD. This includes
using P4 to define the forwarding behavior of the switch’s forwarding pipeline (think of this program as
a contract between the control and data planes), and P4Runtime to control that forwarding contract at
runtime.

 ONOS: A Network Operating System used to configure and control a network of programmable white-
box switches. It runs off-switch as a logically centralized SDN controller, and hosts a collection of SDN
control applications, each of which controls some aspect of the underlying network. Because it is
logically centralized, ONOS is designed to be highly available and to have scalable performance.

 Trellis: An ONOS-hosted SDN control application that implements a leaf-spine fabric on a network of
white-box switches. It implements the control plane for several features, including VLANs and L2
bridging, IPv4 and IPv6 unicast and multicast routing, DHCP L3 relay, dual-homing of servers and
upstream routers, QinQ forwarding/termination, MPLS pseudowires, and so on. In addition, Trellis can
make the entire fabric appear as a single (virtual) router to upstream routers, which communicate with
Trellis using standard BGP.

Stratum (running on each switch) and ONOS (running off-switch and managing a network of switches)
communicate using the following interfaces:

 P4: Defines the forwarding behavior for programmable switching chips as well as model fixed-function
ASIC pipelines. A P4 program defines a contract that is implemented by the data plane and programmable
by the control plane.

 P4Runtime: An SDN-ready interface for controlling forwarding behavior at runtime. It is the key for
populating forwarding tables and manipulating forwarding state, and it does so in a P4 program and
hardware agnostic way.

 OpenConfig Models: Define a base for device configuration and management. These models can be
programmatically extended for platform-specific functionality, but the goal is to minimize model
deviations so as to enable a vendor-agnostic management plane.

 gNMI (gRPC Network Management Interface): Improves on the existing configuration interfaces by
using a binary representation on the wire and enabling bi-directional streaming. Paired with the
OpenConfig models, gNMI is SDN-ready.

 gNOI (gRPC Network Operations Interfaces): A collection of microservices that enable switch specific
operations, like certificate management, device testing, software upgrade, and networking
troubleshooting. gNOI provides a semantically rich API that replaces existing CLI-based approaches.

Trellis, as an SDN control application running on top of ONOS, controls packet forwarding across the switching
fabric internal to a CORD POD (i.e., within a single site). But Trellis can also be extended across multiple sites
deeper into the network using multiple stages of spines, as shown in following figure. This means Trellis has the
potential to play a role in implementing the backhaul and midhaul network for the RAN, or alternatively, extending
the RAN into customer premises (denoted “On Site” in the figure).
Figure 21.1 Trellis control application managing a (possibly distributed) leaf-spine fabric.

22) Cloudification Of Access


The previous chapters went step-by-step, first breaking 5G down into its elemental components and then showing
how those components could be put back together using best practices in cloud design to build a fully functional,
3GPP-compliant 5G cellular network. In doing so, it is easy to lose sight of the big picture, which is that the
cellular network is undergoing a dramatic transformation. That’s the whole point of 5G. We conclude by making
some observations about this big picture.

To understand the impact, it is helpful to first understand what’s important about the cloud. The cloud has
fundamentally changed the way we compute, and more importantly, the pace of innovation. It has done this
through a combination of:

 Disaggregation: Breaking vertically integrated systems into independent components with open
interfaces.

 Virtualization: Being able to run multiple independent copies of those components on a common
hardware platform.

 Commoditization: Being able to elastically scale those virtual components across commodity hardware
bricks as workload dictates.

There is an opportunity for the same to happen with the access network, or from another perspective, for the
cloud to essentially expand so far as to subsume the access network.
Figure 22.1 A multi-tenant / multi-cloud—including virtualized RAN resources alongside conventional compute,
storage, and network resources—hosting both Telco and Over-the-Top (OTT) services and applications.

Figure 22.1 gives a high-level overview of how the transformation might play out, with the global cloud spanning
edge clouds, private Telco clouds, and the familiar public clouds. Each individual cloud site is potentially owned
by a different organization (this includes the cell towers, as well), and as a consequence, each site will likely be
multi-tenant in that it is able to host (and isolate) applications on behalf of many other people and organizations.
Those applications, in turn, will include a combination of the RAN and Core services (as described throughout
this book), Over-the-Top (OTT) applications commonly found today in public clouds (but now also distributed
across edge clouds), and new Telco-managed applications (also distributed across centralized and edge locations).

Eventually, we can expect common APIs to emerge, lowering the barrier for anyone (not just today’s network
operators or cloud providers) to deploy applications across multiple sites by acquiring the storage, compute,
networking, and connectivity resources they need.

23) Detailed Analysis of Network Slicing Feature :


 End-to-End Network Slicing for Multiple Industries Based on One Physical Infrastructure

E2E network slicing is a foundation to support diversified 5G services and is key to 5G network
architecture evolution. Based on NFV and SDN, physical infrastructure of the future network architecture
consists of sites and three-layer DCs. Sites support multiple modes (such as 5G, LTE, and Wi-Fi) in the
form of macro, micro, and pico base stations to implement the RAN real time function. These functions
have high requirements for computing capability and real time performance and require the inclusion of
specific dedicated hardware.

Three layer cloud DC consists of computing and storage resources. The bottom layer is the central office
DC, which is closest in relative proximity to the base station side. The second layer is the local DC, and
the upper layer is the regional DC, with each layer of arranged DCs connected through transport
networks. According to diversified service requirements, networks generate corresponding network
topologies and a series of network function sets (network slices) for each corresponding service type
using NFV on a unified physical infrastructure. Each network slice is derived from a unified physical
network infrastructure, which greatly reduces subsequent operators' network construction costs. Network
slices feature a logical arrangement and are separated as individual structures, which allows for heavily
customizable service functions and independent O&M.

Figure 23.1

As illustrated in the preceding figure, eMBB, uRLLC, and mMTC are independently supported on a
single physical infrastructure. eMBB slicing has high requirements for bandwidth to deploy cache in the
mobile cloud engine of a local DC, which provides high-speed services located in close proximity to
users, reducing bandwidth requirements of backbone networks. uRLLC slicing has strict latency
requirements in application scenarios of self-driving, assistant driving, and remote management.

RAN real Time and non-Real Time processing function units must be deployed on the site side providing
a beneficial location preferably based in close proximity to users. V2X Server and service gateways must
be deployed in the mobile cloud engine of the central office DC, with only control-plane functions
deployed in the local and regional DCs. mMTC slicing involves a small amount of network data
interaction and a low frequency of signaling interaction in most MTC scenarios. This consequently
allows the mobile cloud engine to be deployed in the local DC, and other additional functions and
application servers can be deployed in the regional DC, which releases central office resources and
reduces operating expenses.

 Reconstructing the RAN with Cloud

During the course of an evolution towards RAN2020, CloudRAN architecture is used on the RAN side
to implement RAN Real Time functions, on-demand deployment of nonreal time resources, component-
based functions, flexible coordination, and RAN slicing. With Mobile Cloud Engine (MCE), CloudRAN
can implement flexible orchestration for RAN Real time and non-real Time functions based on different
service requirements and transmission resource configuration to perform cloudification of the RAN.

The RAN real time functions include access network scheduling, link adaptation, power control,
interference coordination, retransmission, modulation, and coding. These functions require high real-
time performance and computing load. The deployment of sites must include dedicated hardware with
high accelerator processing specifications and performance, whilst located in close proximity to services.
The RAN non-real time functions include intercell handover, cell selection and reselection, user-plane
encryption, and multiple connection convergence. These functions require minimal real-time
performance, latency requirements to dozens of milliseconds and are suitable for centralized deployment.
A universal processor can be deployed in a MCE or site according to vast service requirements. MCE
can implement complex management while coordinating multiple processing capabilities based on
regional time, frequency bands, and space. This upgraded management system allows CloudRAN to
support 4G, 4.5G, 5G, and Wi-Fi, and implement coordination and scheduling of macro, micro, and pico
site types. Network functions are deployed on radio, backbone, or core convergence nodes to maximize
both network efficiency and additional capabilities.

Figure 23.2

 Multi-Connectivity Is Key to High Speed and Reliability

Multi-connectivity is gaining a reputation as an underlying fundamental construct for the deployment of


the future network architecture. CloudRAN can be seamlessly deployed in a unified network architecture.
This is a huge leap in radio network deployment. In current fragmented networks, increasing speed and
reducing latency can improve user experience. Reliable high-speed data cannot depend on a single
frequency band or standard connections. In heterogeneous networks, multiconnectivity helps provide an
optimal user experience based on LTE and 5G capabilities, such as high bandwidth and rates of high
frequency, network coverage and reliable mobility of low frequency, and accessible Wi-Fi resources.

In scenarios that require high bandwidth or continuity, a user requires multiple concurrent connections.
For example, data aggregation from multiple subscriptions to 5G, LTE, and Wi-Fi is required to produce
high bandwidth. An LTE network access is required to maintain continuity after a user has accessed a 5G
high-frequency small cell. In scenarios that source that source multiple technologies , CloudRAN serves
as an anchor for data connection which noticeably reduces alternative transmission. In the traditional
architecture integrating base stations as an anchor for data connection, LTE, 5G, and Wi-Fi data is
aggregated into a non-real time processing module of a specific standard to be forwarded to each access
point. In the CloudRAN architecture, non-real time processing function modules in access points of
different modes are integrated into the MCE, which serves as an anchor for data connection. Data flows
are transmitted to each access point over the MCE, which prevents alternative transmission and reduces
transmission investment by 15%, and latency by 10 ms.

 MCE

MCE is the logical entity of central control and management for CloudRAN, incorporating RAN non-
real time functions, Wi-Fi AC, distributed gateway, service-related application distribution entity (App),
and Cache. RAN non-real time functions include a general control plane (cRRC) to facilitate multi-
connectivity and new technology deployment, and a centralized resource management module (cRRM)
to ensure the efficient coordination of resources in heterogeneous networks. Cloud-based SON (cSON)
is introduced to improve network capacity, coverage, and transmission resources to encompass vast
extended areas and ensure the successful implementation of slicing management.

24) Detailed Analysis of Cloud-Native New Core Architecture :

 Control and User Plane Separation Simplifies the Core Network

Existing network gateways integrate parts of both user plane and control plane functions. In the 5G era,
many services with high requirements for latency require gateways to be relocated by a downward shift
towards the local or central office DCs. This requires that the number of gateway nodes must increase by
a factor of 20 to 30 times the original amount. If operators still opt to use the existing gateway
architecture, complex gateway service configuration will significantly increase CAPEX and OPEX.

In addition, if the control plane has subscribed reports of location and RAT information, a large amount
of signaling will be generated between the site, distributed gateway, and network control plane. A large
number of distributed gateways will result in heavy interface link load and handover signaling load on
centralized control plane NEs.

Figure 24.1

Gateway control and user plane separation divides complex control logic functions for convergence into
control planes, which reduces the costs of distributed gateway deployment, interface load, and number
of alternative signaling routes. In addition, the control plane and user plane separation supports scaling
of the forwarding and control planes, which further improves network architecture flexibility, facilitates
centralized control logic functions, and ensures easy network slicing for diversified industry applications.
This segregation technique also decouples the forwarding plane from the control plane, which prevents
frequent forwarding plane upgrades caused by control plane evolution.

Two tasks must be completed to implement control and user plane separation. First, an implementation
of lightweight functions to divide complex control logic functions. Second, the construction of models
for the reserved core functions with the definition of a generalized template model complete with object-
oriented interface for the forwarding plane to ensure that the forwarding plane is both programmable and
scalable. After the control and user planes are successfully separated, interfaces providing the associative
link connections operate through the enhanced GTP protocol. Based on subscriber access types and
subscription data, the control plane initiates an orchestration for service objects and atomic actions, and
sends the request to the forwarding plane over the enhanced GTP interface. The forwarding plane then
responds with a service-based event notification confirming receipt which is directed back to the control
plane.
 Flexible Network Components Satisfy Various Service Requirements

Figure 24.2

In the 5G era, mobile networks will provide diversified services. eMBB, uRLLC, and mMTC demand
different requirements for network control functions. Existing mobile networks cannot customize control
functions for a specific service type and can only provide one set of logical control functions for
diversified services.

Tightly coupled control functions and complex interfaces result in increasingly difficult service
deployment and network O&M. Flexible and customizable control function components are a basic core
necessity of next-generation mobile networks.

In the service-oriented 5G network architecture, logical control functions can be abstracted as


independent functional components, which can be flexibly combined according to service requirements.
Logically decoupled from other components, network function components support neutral interfaces
and implement an identical network interface message to provide services for other network function
subscribers. Multiple coupling interfaces are transformed to converge into a single interface.

A Network function management framework provides network registration, identification, and


management. Independent features ensure that the addition of network functions and potential upgrades
do not affect existing network services. Compared to tightly coupled network control functions, the
control plane component architecture significantly simplifies the development and deployment of new
services through flexible orchestration and plug-and-play deployment, and lays a solid foundation for 5G
E2E network slicing.

 Unified Database Management

Rapid fault recovery is required for network data status information (such as user data and policy data shared
across data centers), to meet network reliability requirements after the virtualization of functions. The traditional
disaster recovery mechanism based on N+1 backup relies on private signaling interaction to implement status
information synchronization, which produces system inefficiency and complex interaction of cross-vendor
products.

With separated data and control logic, network status information can be centralized in a unified database. All
network functions can access metadata models through standard interfaces and locally store dynamic user data.
Thanks to the distributed database synchronization, network status information can implement real-time backup
between data centers. With the help of the service management framework, the unified database simplifies the
procedure for network information retrieval functions introduced by the component tbased control plane to reduce
the required signaling overhead for data synchronization.

Figure 24.3

25) Self Service Agile Operation


One of the targets and driving forces of network architecture evolution is to provide diversified services using
mobile networks. E2E network slicing is a fundamental technology to achieve this target.

In the 5G era, a network will contain multiple logically separated network slices. Each slice has a specific network
topology, network function, and resource allocation model. If manual configuration is still used for network
planning and deployment, operators' O&M system will potentially face a huge number of significant challenges.
5G networks will possess self-serving agile operation capabilities.

Network slicing services can be automatically generated, maintained, or terminated according to services
requirements, which significantly reduces subsequent operating expenses. Third-party vertical industries can input
mobile network slicing requirements on an operation platform.

The operator analyzes customer requirements based on current network status. After a service level agreement
procedure is complete, the operator maps various service requirements on network requirements, and selects
multiple network function components to generate a network slice.

According to service features and deployment of data centers, the operator determines logical network function
deployment nodes and defines a connection relationship, namely software-defined topology (SDT). After the
network slicing topology is defined, an E2E protocol is defined, namely, software defined protocol (SDP).

According to service requirements, network resources are allocated for logical connections in the logical topology,
namely software-defined resource allocation (SDRA). SDT, SDP, and SDRA constitute a list of key functions
required for Service Oriented Network Auto Creation (SONAC).
Figure 25.1

26) Detailed Analysis of 5G Core Network Functions and what they do


The 5G Core Network is composed of various network functions, each serving a unique purpose. These functions
communicate internally and externally over well-defined standard interfaces, making the 5G network highly
flexible and agile. Let's take a closer look at some3 of the critical 5G Core Network functions:

User Plane Function (UPF)

The User Plane Function is a critical component of the 5G core network architecture It oversees the managment
of user data during the data transmission process. The UPF serves as a connection point between the RAN and the
data network.

It takes user data from the RAN and performs a variety of functions like as packet inspection, traffic routing,
packet processing, and QoS enforcement before delivering it to the Data Network or Internet. This function allows
the data plane to be shifted closer to the network edge, resulting in faster data rates and shorter latencies.

The UPF combines the user traffic transport functions previously performed in 4G by the Serving Gateway (S-
GW) and Packet Data Network Gateway (P-GW) in the 4G Evolved Packet Core (EPC).
Figure 26.1

UPF Interfaces/reference points with employed protocols:

 N3 (GTP-U): Interface between the RAN (gNB) and the UPF

 N9 (GTP-U): Interface between two UPF’s (i.e the Intermediate I-UPF and the UPF Session Anchor)

 N6 (GTP-U): Interface between the Data Network (DN) and the UPF

 N4 (PFCP): Interface between the Session Management Function (SMF) and the UPF

Session Management Function (SMF)

The Session Management Function (SMF) is crucial element that make up the 5G Core Network responsible for
establishing, maintaining, and terminating network sessions for User Equipment (UE). The SMF carries out these
tasks using network protocols such as Packet Forwarding Control Protocol (PFCP) and Network Function-specific
Service-based interface (Nsmf).

SMF communicates with other network functions like the Policy Control Function (PCF), Access and Mobility
Management Function (AMF), and the UPF to ensure seamless data flow, effective policy enforcement, and
efficient use of network resources. It also plays a significant role in handling Quality of Service (QoS) parameters,
routing information, and charging characteristics for individual network sessions.

SMF brings some control plane functionality of the serving gateway control plane (SGW-C) and packet gateway
control plane (PGW-C) in addition to providing the session management functionality of the 4G Mobility
Management Entity (MME).

Access and Mobility Management Function (AMF)

The Access and Mobility Management Function (AMF) oversees the management of connections and mobility. It
receives policy control, session-related, and authentication information from the end devices and passes the
session information to the PCF, SMF and other network functions. In the 4G/EPC network, the corresponding
network element to the AMF is the Mobility Management Entity. While the MME's functionality has been
decomposed in the 5G core network, the AMF retains some of these roles, focusing primarily on connection and
mobility management, and forwarding session management messages to the SMF.
Additionally, the AMF retrieves subscription information and supports short message service (SMS). It identifies
a network slice using the Single Network Slice Selection Assistance Information (S- NSSAI), which includes the
Slice/Service Type (SST) and Slice Differentiator (SD). The AMF's operations enable the management of
Registration, Reachability, Connection, and Mobility of UE, making it an essential component of the 5G Core
Network.

Figure 26.2

Policy Control Function (PCF)

The Policy Control Function (PCF) provides the framework for creating policies to be consumed by the other
control plane network functions. These policies can include aspects like QOS, Subscriber Spending/Usage
Monitoring, network slicing management, and management of subscribers, applications, and network resources.
The PCF in the 5G network serves as a policy decision point, like the PCRF (Policy and Charging Rules Function)
in 4G/EPC Network. It communicates with other network elements such as the AMF, SMF, and Unified Data
Management (UDM) to acquire critical information and make sound policy decisions.

Unified Data Management (UDM) and Unified Data Repository (UDR)

The Unified Data Management (UDM) and Unified Data Repository(UDR) are critical components of the 5G
core network. The UDM maintains subscriber data, policies, and other associated information, while the UDR
stores this data. They collaborate to conduct data management responsibilities that were previously handled by
the HSS (Home Subscriber Server) in the 4G EPC. When compared to the HSS, the UDM and UDR provide
greater flexibility and efficiency, supporting the enhanced capabilities of the 5G network.

Network Exposure Function (NEF)

The Network Exposure Function (NEF) is another key component of 5G core network that enables network
operators to securely expose network functionality and interfaces on a granular level by creating a bridge between
the 5G core network and external application (E.g., internal exposure/re-exposure, Edge Computing).

The NEF also provides a means for the Application Functions (AFs) to securely provide information to 3GPP
network (E.g., Expected UE Behavior).
The NEF northbound interface is between the NEF and the AF. It specifies RESTful APIs that allow the AF to
access the services and capabilities provided by 3GPP network entities and securely exposed by the NEF. It
communicates with each NF through a southbound interface facilitated by a northbound API. The 3GPP interface
refers to the southbound interface between NEF and 5G network functions, such as the N29 interface between
NEF and Session Management Function (SMF), the N30 interface between NEF and Policy Control Function
(PCF), and so on.

By opening the network's capabilities to third-party applications, NEF enables a seamless connection between
network capabilities and business requirements, optimizing network resource allocation and enhancing the overall
business experience.

Network Repository Function (NRF)

The Network Resource Function (NRF) serves as critical component required to implement the new service-based
architecture in the 5G core network which serves as a centralized repository for all NF’s instances. It is in charge
of managing the lifecycle of NF profiles, which includes registering new profiles, updating old ones, and
deregistering those that are no longer in use. The NRF offers a standards-based API for 5G NF registration and
discovery.

Technically, NRF operates by storing data about all Network Function (NF) instances, including their supported
functionalities, services, and capacities. When a new NF instance is instantiated, it registers with the NRF,
providing all the necessary details. Subsequently, any NF that needs to communicate with another NF can query
the NRF for the target NF's instance details. Upon receiving this query, the NRF responds with the most suitable
NF instance information based on the requested service and capacity.

27) How Does the 5G Core Differ from Previous Generations?


The primary architectural distinction between the 5G Core and the 4G EPC is that the 5G Core makes use of the
Service-Based Architecture (SBA) with cloud-native flexible configurations of loosely coupled and independent
NFs deployed as containerized microservices. The microservices based architecture provides the ability for NFs
to scale and upgrade independently of each other which is significant benefit to CSPs.

The 4G EPC, on the other hand, employs a flat architecture for efficient data handling with network components
deployed as physical network elements in most cases and the interface between core network elements was
specified as point-to-point running proprietary protocols and was not scalable.

Figure 27.1

Another significant distinction between 5G Core and EPC is the formation of the control plane (CP). The control
plane functionality is more intelligently shared between Access and Mobility Management Functions (AMF) and
Session Management Functions (SMF) in the 5G Core than the MME and SGW/PGW in the 4G/EPC. This
separation allows for more efficient scaling of network resources and improved network performance.

In addition to the design and functional updates, the business' priorities with 5G have been updated. With 5GC,
CSPs are moving away from proprietary, vertically integrated systems and shifting to cloud-native and open
source-based platforms like Red Hat OpenShift Container Platform that runs on industry standard hardware. This
helps improve the responsiveness while also cutting the operating expenses will be the primary focus going
forward with 5G Core for CSPs.

28) Key distinctions between the 4G LTE and 5G QoS models


The key distinctions between 4G LTE and 5G QoS models primarily lie in their approach to quality-of-service
enforcement and their level of complexity. In 4G LTE, QoS is enforced at the EPS bearer level (S5/S8 + E-RAB)
with each bearer assigned an EPS bearer ID. On the other hand, 5G QoS is a more flexible approach that enforces
QoS at the QoS flow level. Each QoS flow is identified by a QoS Flow ID (QFI).

Figure 28.1

Furthermore, the process of ensuring end-to-end QoS for a Packet Data Unit (PDU) session in 5G involves packet
classification, user plane marking, and mapping to radio resources. Data Packets are classified into QoS flows by
UPF using Packet Detection Rules (PDRs) for downlink and QoS rules for uplink.

5G leverages Service Data Adaptation Protocol (SDAP) for mapping between a QOS flow from the 5G core
network and a data radio bearer (DRB). This level of control and adaptability provides an improved QoS model
in 5G as compared to 4G networks.
29) The Power of Cloud-Native Architecture in 5G Core
One of the standout features of the 5G Core is its cloud-native architecture. This architecture allows the 5G core
network to be built with microservices that can be reused for supporting other network functions. The 5G core
leverages technologies like microservices, containers, orchestration, CI/CD pipelines, APIs, and service meshes,
making it more agile and flexible.

With Cloud-Native architecture, 5G Core can be easily deployed and operated, offering a cost-effective solution
that complies with regulatory requirements and supports a wide range of use cases. The adherence to cloud-native
principles is of utmost importance as it allows for the independent scaling of components and their dynamic
placement based on service demands and resource availability. This architecture also allows for network slicing,
which enables the creation of end-to-end virtual networks on top of a shared infrastructure.

Figure 29.1

30) Private 5G Architectures


The private 5G network architecture can be deployed in multiple ways, but we can simply categorize the
different deployment options with the level of integration with the mobile operator’s public network. Doing that,
we come up with the following private 5G architectures:

• Isolated network - The entire private network is owned and operated by the user and completely isolated from
the public network.
• Shared network - A hybrid configuration that leverage part of the telecom service provider’s infrastructure.
• Private network slice under public network - The private network is realized by network slicing. Leverage
operator’s existing public network infrastructure and offer private connection through the software defined
network slice.
1. Isolated Private 5G Network Architecture

In an isolated private 5G network architecture, the entire network is hosted and operated by the user to ensure
full control of the network. The network is completely isolated from public network, which minimizes the risk
of data breach. The drawback is that the investment of building and operating the infrastructure is very high and
will require personnel with a high level of knowledge about telecom networks.

Figure 30.1 Isolated 5G Private Network

With that being said, the isolated private 5G network is suitable for public safety agencies or large enterprises
with an abundance of resources and high concern for data privacy. For example, public communication systems
can be maintained for the rescue teams with an isolated private 5G network set up in a mobile vehicle.

2. Shared Private 5G Network Architecture

A shared private 5G network architecture shares the infrastructure of a mobile operator’s public network to lower
the cost of setup for the private 5G network. Depending on the business requirement, the user can choose how
much components will be managed by themselves versus by the mobile operator.

Figure 30.2 Shared 5G Private Network


In the case of a smart factory, it may be better to leave the MEC and UPF on premises. This allows for a private
5G architecture where the user can get low latency communication with room for future modifications.

For other types of use case scenarios such as stadiums or exhibition centres, where a fast and stable connection is
needed, the business owner can maintain the RAN locally. This ensures that the coverage and network quality is
under control while leaving the rest to system management to the mobile operator.

3. Network Slicing Private 5G Architecture

Network slicing can ensure data isolation and network quality when using an end-to-end private 5G connection
provided by a mobile operator’s existing infrastructure. This approach has lowest investment cost for
infrastructure, but it lacks control for the network.

Figure 30.3 Private 5G Slicing Under Public Network

The network slicing private 5G network architecture suitable for scenarios that require deployment on wide area,
such as smart city IoT connections or autonomous driving services. Organizations can lease a private bandwidth
from the operator and depending on the business type, they can choose different Service Level Agreements (SLAs)
to fit their business needs.

31) Advancements in 5G Technology


These are the few advancements to 5G technology:

1. Super Speed: Using 4G technology we can attain the highest browsing speed of 8-18 Mbps only. But an
amazing browsing speed of 1 Gbps can be achieved using the 5G technology on an individual level. This
speed can be increased up to 10 Gbps. Actually, 5G speed in the 6 GHz band is modestly higher than 4G
technology with an equal amount of spectrum and antennas. If you are able to add the LAA (Licensed
assisted access) to 4G configuration, it can add 100’s of megabits per second to the speed is practically
possible with the usage of 5G.

2. Increased Bandwidth: 5G technology can increase the bandwidth of the signals. So the signals will
become clearer than before. It will create a positive impact in different fields. Surprisingly, advancements
in 5G technology can amplify the bandwidth by 1000 times.

3. Worldwide Coverage: All the networks around the world can be covered by using 5G technology.
5G services can be provided to every inaccessible point on the globe. This will create a huge positive
impact on the world economy. The economically backward countries will flourish using the
blessings of the internet. This feature was not available in the previous versions. So 5G technology
can be easily accessed worldwide by any user, this is also an amazing advancement of 5G
technology.
4. Our world will itself become a Wi-Fi zone: In these days we are in search of Wi-Fi zone
everywhere. Some foreign countries have turned themselves into fully Wi-Fi zones. But in developing
countries like India, these features are not too easy to avail. But the scenario will change with the
introduction of 5G services. Using the 5G network we can convert the whole world into a Wi-Fi zone.
All elements in the 5G will change into network functions and thus they will be able to discover other
network functions. It is called network resource functions. Also, 5G will apply a great push to cloud
technologies as the new telecommunication architecture requires all the nodes to be reusable and
scalable. So you can access the Internet speed with the same browsing speed irrespective of your
position. You will enjoy the same internet speed on the roads and inside your room. This is one of the
most fantastic advancements of 5G technology.

5. Enhanced battery life: The battery life of your device will increase using 5G services. Internet
services always cost you the power of your device. Sometimes the change of your mobile phone goes
out really soon if you are active on the internet. But this will not happen with the 5G technology. 5G
technology can save the power of your devices besides providing you with high-speed internet. Thus
this advancement of the 5G technology can help us in power consumption which is another burning
problem in the modern day world.

32) Important Pillars of 5G


1. Millimeter-Wave:

 mm Wave 5G will ingest massive amounts of data, enabling data transfer speeds exceeding 1 Gbps.

 This form of technology is currently used in the United States by carriers such as Verizon and AT&T.

2. Small cell:

 Since mm Wave cannot overcome obstacles, many mini-cell towers are placed in the area to relay the
signal from the main cell towers.

 These small cells have to be placed closer compared to traditional masts to allow the user to receive his
5G signal without interruption.

3. Massive MIMO (multiple input multiple outputs):

 This technology is used in large cell towers to handle large amounts of traffic. A typical cell tower
delivering 4G has 12 antennas handling all cell traffic in the area.

 MIMO can support 100 antennas simultaneously, increasing the tower’s total capacity to handle more
traffic.

 This technology will help make the transmission of 5G signals smoother.

4. Beamforming:

 Beamforming is a technology that can periodically monitor multiple frequency sources and switch to a
stronger, faster tower when the signal is blocked.
 This ensures that certain data is only sent in certain directions. Something like a data traffic light.

5. Full duplex:

 Full-duplex is a technology that allows nodes to transmit and receive data simultaneously on the same
frequency band.

 Landlines and shortwave radios use this type of technology.

33) Major Advantages


1. Fast: Imagine being able to download a full HD movie in less than 3 seconds. This is the download speed on
5G. 5G will deliver speeds of up to 20 Gbps, increasing traffic capacity and network efficiency by a factor of 100.

2. Low latency: In addition, mm Wave can also achieve latency as low as 1ms. This establishes a connection
instantly and reduces network traffic afterwards.

3. State-of-the-art technology foundation: 5G’s full potential is envisioned to provide speeds that enable real-time
reproduction of augmented reality. This will further lead to the development of more hardware to work with
augmented reality. This technology is also the basis for virtual reality, autonomous driving, and the Internet of
Things.

4. Ripple Effect: The benefits of 5g will not only improve the smartphone experience but also open up
opportunities for progress in other areas such as healthcare, infrastructure, and even manufacturing.

34) Major Concerns


1. Capital intensive: Deploying 5G technology is costly. This will require frequencies beyond 3.5GHz, a wider
bandwidth than 3G and 4G, forcing carriers to dismantle the current ecosystem.

2. Bandwidth limitation: The sub-6 GHz spectrum is bandwidth limited, so its speed may be slower than mm-
Wave provides. Requires hardware implementation: In addition, mm-Wave is only effective at short distances and
cannot pass through obstacles. It also tends to be absorbed by trees and rain, so a lot of hardware needs to be
deployed for 5G to work effectively.

3. Unknown security issues: 5G technology may also have security and privacy issues, but these issues will
become more apparent as the technology becomes more accessible.

4. Growing scepticism: 5G is growing, but not as fast as expected. Even at current speeds, multiple reports suggest
5G won’t overtake 4G and 3G by 2025. However, Qualcomm predicts that 5G smartphone shipments will exceed
750 million units by 2022 and 5G connections will exceed 1 billion units by 2023, 2 more than 4G will reach that
number.

5. Domestic Industry Stress: India’s telecommunications sector has been under stress recently due to the intense
competition unleashed by Jio’s entry. Without government support (bank loans and low-band fees), businesses
will struggle to adopt 5G shortly.

35) Growth of 5G Users


The number of 5G users has been increasing exponentially since its introduction in 2020. Currently, over 30% of
the total world population has access to the 5G network. As infrastructure continues to expand, the reach of 5G is
expected to grow from urban areas to rural areas.
Figure 34.1

The graph above shows how the number of 5G users has grown from 2020 to 2024. It shows a constant increase
in number of users. Currently, in 2024 about 2 billon peoples have access to 5g network across world.

36) Coverage Area of 5G Network


5G coverage is expanding rapidly across major regions around the world. Countries like the USA, India, and
Canada have extensive 5G coverage, reaching both urban and some rural areas. The deployment of 5G is
significantly enhancing connectivity and enabling new technological advancements.

Figure 34.1

The image above illustrates the global coverage areas of 5G networks. The purple-coloured regions represent
areas with strong 5G coverage. Some regions have widespread adoption, others are still in the early stages of
developing their networks. North America, parts of Europe, China, India, and Australia are leading in 5G
availability, while other regions, particularly in Africa and parts of Asia, have less coverage.

37) Effects of 5G Expansion on Global Economy


The 5G network is expected to boost global economy in many ways. Here are some of the key economic effects
of 5G:

 $13.1 trillion dollars of global economic output by 2035.


 22.8 million new job opportunities will be created worldwide.

 5g network will add $265 Billion in global capital expenditure (CAPEX) and research & development
(R&D) annually over the next 15 years.

Further, it is expected that Industries like automotive, healthcare, and entertainment will see major benefits from
5G networks. This will also play a critical role in the development of smart cities, autonomous vehicles, and
advanced AI applications. The full impact of 5G will continue to evolve over the coming years, but its potential
to transform the global economy is already clear.

38) Security
5G implementation brings tremendous performance benefits and diversity of applications through extensive use
of cloud-based resources, virtualization, network slicing, and other emerging technologies. With these changes
come new security risks and additional “attack surfaces” exposed within the 5G security architecture.

 5G security practices build upon past mobile technology generations, yet the “trust model” has
expanded with more players involved in the service delivery process.

 The IoT and user propagation create an exponentially higher number of endpoints with many of these
traffic inputs no longer supervised by human hands.

 Improved 5G security features detailed by the 3GPP standards include unified authentication to
decouple authentication from access points, and public key based encryption schemes to reduce the risk
of metadata exploits.

 Continual monitoring and assessment of security effectiveness are essential as 5G critical performance
nodes become increasingly virtualized.

 Best practices include end-to-end 5G network security monitoring encompassing the system
architecture, devices, and apps.

39) Conclusion : Cloud-Native Architecture is the Foundation of 5G Innovation


In existing networks, operators have gradually used SDN and NFV to implement ICT network hardware
virtualization, but retain a conventional operational model and software architecture.

5G networks require continuous innovation through cloud adoption to customize network functions and enable
on-demand network definition and implementation and automatic O&M.

Physical networks are constructed based on DCs to pool hardware resources (including part of RAN and core
network devices), which maximizes resource utilization. In addition, E2E network slicing provides logically
separated virtualized network slices for diversified services, which significantly simplifies network construction
for dedicated services.

CloudRAN is built based on MCE. Multi-connectivity helps aggregate access capabilities of multiple RATs,
frequency bands, and site types to maximize network efficiency. Flexible deployment of network functions helps
customize networks for various differentiated services.

CloudRAN allows operators to address challenges and proof themselves against potential prospective
uncertainties. Based on the control and user plane separation, 5G core networks using component-based control
planes, programmable user planes, and unified database will simplify signalling interaction and allow for the
deployment of distributed gateways. Customized network functions can allow operators to generate increasingly
flexible additional network slices to better serve subscribers needs.

You might also like