0% found this document useful (0 votes)
142 views98 pages

5G Mobile Core Network Overview

Uploaded by

Thúy Cao Hồng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
142 views98 pages

5G Mobile Core Network Overview

Uploaded by

Thúy Cao Hồng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

MOBILE CORE

NETWORK OVERVIEW

V I E T T E L D I G I TA L TA L E N T, M a y, 2 0 2 3
CONTENT
 Mobile core concept

 5G Core overview

 5GC architecture

 Key 5GC technology

 5GC application and plan


Introductions
Meet your mentor
Meet the participants
Name
Organizations
Course expectations
Mobile core concept
Objectives
Introduce history of Mobile network
Describes basic Mobile network characteristics
Update the standardization process
Describes mobile network topology
Understand the Mobile core position and functions
History of Mobile network

1980s 1990s 2000s 2010s 2020s


Basic Mobile network characteristics

1980s 1990s 2000s 2010s


1G 2G 3G 4G
Voice Add SMS/limited Add Video/internet Add broadband
data experience, VoIP

Max 2.4 kbps Max 19.2kbps Max 2Mbps Max: 100Mbps


Enhanced: Enhanced: Enhanced:
GPRS: 115Kbps HSUPA/HSDPA: 14 – MIMO/OFDMA:
EDEG: 384Kbps 82Mbps 394.4Mbps
LTE-A: 1.5Gbps
Key 5G network characteristics
Expectation from ITU

lý thuyt
Key 5G network characteristics
customer and IoT

Expectation from Vendor and operator, considering with the real deployment scenario
5G standardization progress

5G study 5G stage1 5G stage2


5G standardization progress (update R18)

Freeze release Open and under planning release


Describes most of 5G services and their Working for enhanced MBB and non MBB
specifications. services (focus on redcap)
Research for AI/ML in Core network Research for AI/ML in RAN and physical layer
Mobile network high level topology
Mobile core position and functions
Normal people think the progress to access mobile network is somewhat simple like
below: An app on the phone connect to the app server through RAN then come to Internet

In fact, the implementation is far more complex than it seems. There is a core network
including many NEs/NFs that sits between the base station and the Internet. Services
are both implemented and controlled by the core network.
Mobile core position and functions
VID https://www.youtube.com/watch?v=5ze7uUh6rOM
5GC overview
Objectives
Introduce 5G network deployment options
Understand NSA & SA architecture
Mobile core network evolution
4G Core network limitations
5GC design expectations
5G network deployment options

5G NSA network architecture


• Non-standalone (NSA)
5G gNodeB
architecture
4G eNodeBs and 5G gNodeBs
coexist on the radio access
UE 4G eNodeB 4G EPC network, and the 4G EPC or
At the initial and middle stages of network deployment, 5G
gNodeBs are introduced to At the middle and later stages of network deployment, 5GC gains
5GC is used on the core
network.
co-exist with 4G eNodeBs. momentum, and 4G eNodeBs are gradually phased out.

• Standalone (SA) architecture


5G gNodeBs are used on the
radio access network, and
5GC is used on the core
EPC network architecture 5G SA network architecture

network. This architecture is


New deployment of 5G gNodeBs and 5GC

the ultimate goal of 5G


UE 4G eNodeB 4G EPC UE 5G gNodeB 5GC
network evolution.
5G network deployment options - NSA trm gc hd da vào 1 trm gc khác

Option 3 – the most popular option for 5G deployment up to now


 There are more 4G eNodeBs than 5G gNodeBs. They are standardized early and the products are
mature, facilitating market promotion.
 Data transmission and traffic steering based on NSA dual connectivity are supported, ensuring
service continuity.
 The live network requires little reconstruction and investment.
 Only eMBB services are supported. New services and functions relevant to 5GC are unavailable.
5G network deployment options – NSA (cont)

Option 7
 5G gNodeBs are introduced to co-exist with 4G eNodeBs.
 4G eNodeBs provide wide coverage and dual connectivity to ensure excellent user experience.
 New services and functions relevant to 5GC are supported, with an improved 5G service
experience.
 The upgrade and reconstruction workload for enhanced 4G eNodeBs is overwhelming.
5G network deployment options – NSA (cont)

Option 4
 5G gNodeBs gradually replace 4G eNodeBs on live networks.
 New, comprehensive 5G functions are supported, stimulating more data use and
unleashing data's full potential.
 The entire industry may take a long time to become mature.
5G network deployment options – SA
trm gc hd c lp

Option Characteristic

The legacy EPC network architecture cannot meet the requirements of ultra-low latency services, such as autonomous
1
driving and industrial control.
• The ultimate goal of the 5G network architecture is to support eMBB, mMTC, and URLLC use cases. This facilitates
2 vertical industry expansion.
• The network is simple, but requires a long period to deploy, which hinders the protection of the investment in the live
network.
An enhanced 4G eNodeB cannot achieve the same peak rate, latency, and capacity as those of a 5G gNodeB,
5
requires large live network reconstruction, and results in low commercial value.
The 4G EPC cannot keep up with the high throughput and capacity of 5G gNodeBs, making this option unlikely to be
6
commercialized.
Mobile core network evolution
There are multiple network architectures for 5G, Each network architecture has its own characteristics,
and specific evolution paths between them also differ. Common evolution paths include but are not
limited to the following.

Carriers propose different paths for 4G-to-5G evolution by considering the 5G network scale, network
functions and time scheduled for initial 5G deployment, service support capabilities, and investment in
network infrastructure upgrades and construction
4G Core network limitations

4G Core network is designed for the predefined services,


emphasize the availability, invulnerability

 Complex Network elements


 Overlap function
 Tightly coupling between Nes
 Difficult interworking

The 4G Core has been designed with lack of


flexibility. It cannot provide full support for
the evolution to 5G networks in multi-
service scenarios.
5GC design expectations
5GC architecture
Objectives
Introduce 5G-EPC and CUPS concept
Describes 5GC architecture
Introduce 5GC NFs and functions
Understand basic 5GC procedure
Analyze 5G-EPC and 5GC architecture
4G – 5G interworking and Dual core concept
Introduce 5G-EPC and CUPS concept

Control plane

NSSF NEF NRF PCF UDM

Nssf Nnef Nnrf Npcf Nudm

Nausf Namf Nsmf

AUSF AMF SMF

User plane N1 N2 N4
N3 N6
UE (R)AN UPF DN

NFS network function CUPS


Control plane functions are abstracted into User plane functions are decentralized,
multiple network function services, aiming to making them to be flexibly deployed on the
build networks toward the service based core network or deployed close to the access
architecture (SBA) through softwarization and network (AN) where subscribers access.
modularization
Describes 5GC architecture
5G interface – Reference point presentation
Describes 5GC architecture
5G interface – As 4G reference point
Introduce 5GC NFs and functions kt ni ra mng ngoài

most important

ng nhp vào mng to 1 phiên kt ni


Understand basic 5GC procedure
Registration
When a new user attempts to access the 5G network for the first time, they need to register with the
network to obtain access permission. The type of signaling interaction for such a registration is
termed initial registration
Understand basic 5GC procedure
Registration
Step 1: Send initial registration request
A mobile phone sends an initial
registration request to the AMF through a
base station. A Registration Request is
the first signaling message generated in
the initial registration procedure

Step 2: Authenticate request


As this is the user's first attempt to
access the network, the AMF sends
the user information to the AUSF
and UDM for authentication.
Understand basic 5GC procedure
Registration
Step 3: Validity check
The UDM has already stored the user's subscription information. After confirming that the user
has purchased a 5G service package, the UDM instructs the AUSF and AMF to authenticate the
user.

Bidirectional authentication (*)


Understand basic 5GC procedure
Registration

Bidirectional authentication is
performed between the user and
network. A user can access the
network only after both the user and
network are authenticated. The UDM
uses the subscription information to
determine an authentication
algorithm and sends the algorithm to
the AUSF and AMF. The AUSF, AMF,
and mobile phone will start
bidirectional authentication based on
the algorithm.

If the user is not authenticated, the signaling procedure ends, and the registration fails.
Understand basic 5GC procedure
Registration
Step 4: Retrieval of Subscription Data and Network Use Policies

The AMF obtains the user's


subscription data from the UDM, and
network use policies from the PCF
Understand basic 5GC procedure
Registration
Step 4: Retrieval of Subscription Data and Network Use Policies

User’s package information was converted into PCF store % delivers network use
subscription data and stored in the UDM. The policies to the UE based on the phone
UDM delivers the subscription data to the AMF, capabilities. The policies include but are
which will allocate network resources to the not limited to restricted service areas
user based on such data. and network resource priorities
Understand basic 5GC procedure
Registration
Step 5: Acknowledgment of the Registration Request

Getting approval from other control NFs, AMF notifies the


user that the initial registration is completed and the user
can access the network
Understand basic 5GC procedure
Session establishment To access internet, UE need a data path through Core network

Step 1: Initiating a PDU Session Establishment Request


Step 2: Reporting the Request from the AMF to SMF
Step 3: Obtaining Session Establishment Policies
Step 4: Selecting a UPF and Delivering Session Establishment Policies
Step 5: Instructing the Base Station to Establish the PDU Session
Step 6: Instructing the UPF to Establish the PDU Session
Understand basic 5GC procedure
Session establishment
1. The UE sends a PDU Session Establishment Request
message to the AMF through the wireless base station,
requesting the AMF to establish a data path for video services.
2. The AMF checks the UE's basic information and reports the
UE's request to the SMF.
3. The SMF obtains the PDU session establishment policies
from the PCF. The policies include required session quality,
charging policies, and change notification policies.
4. The SMF selects an appropriate UPF to
prepare for signaling resources for establishing
the PDU session.
5. The SMF instructs the base station and UE to
establish an uplink channel for the PDU session
as required.
6. The SMF instructs the UPF to establish a
downlink channel for the PDU session as
required.
Understand basic 5GC procedure
Session establishment
1. One UE can have multiple PDU session
More than one PDU session can be created for a UE to access different data networks. Generally, one PDU
session is required by a user to surf the Internet, while another PDU session is needed for Voice

2. Different QoS flows can be planned for a PDU session to fulfill different QoS requirements
Analyze 5G-EPC and 5GC architecture
Analyze 5G-EPC and 5GC architecture

5G-EPC

MAPPING FUNCTION
5GC
4G – 5G interworking and Dual core concept
4G – 5G interworking, provide services continuity
4G – 5G interworking and Dual core concept
4G – 5G interworking and Dual core concept

k phi chun
4G – 5G interworking and Dual core concept
4G – 5G interworking and Dual core concept
4G – 5G interworking and Dual core concept
Sample of Dual Core product from Vendor

(*) Dual core is not standard, each vendor has their own design
Key 5GC technologies
Objectives
Cloud – evolution of communication platform

Service base architecture

Network slicing concept and application

Multi Edge computing


Cloud – evolution of communication platform

What is communication platform


For a communication system, the underlying framework is the architecture, on top of which
system is built; the communication platform provide network resource and service for user
Cloud – evolution of communication platform

ATCA – Advanced Telecommunication Arcihtecture

• Tightly coupled with


• Open industry standard
Vendor specific service
• Configure with blade
application
(card) and chassis (shelf
• Cannot migrate to other
• Physic modular and
services from other
scalable
vendors
• Optimized by Telco vendor
• Reduce hardware
to meet performance and
resource efficiency
carrier grade requirement
• Risk of investment and
• Long life cycle
maintenance cost

To tackle these problems, the concept of “Virtualization” is introduced and


take the communication to the next evolution – Cloud based platform
Cloud – evolution of communication platform

Cloud:
Decoupled hardware and network function (software),
virtualize all hardware resources to a pool
• Flexible service deployment and scale
• High resources utilization, reduce cost
• Avoid vendor lock-in
• Virtual machine based resource

Cloud native:
Introduce the platform layer allow to install services
directly to both physical server or Virtual machine
• New service design as micro services (stateless)
• Container based resource
• Higher upgrade efficiency and more flexible based
on DevOps and continuous delivery
Cloud – evolution of communication platform
NFV architecture – ETSI reference
Cloud – evolution of communication platform
Cloud native advantages
Cloud – evolution of communication platform
Cloud native advantages
Cloud – evolution of communication platform
Cloud native advantages

Future life cycle management with DevOps & CI/CD


Cloud – evolution of communication platform

Cloud native disadvantages (in telco segment)

 Newest platform, not mature and stable than previous generations

 More flexible – More complex in networking and integration

 Require adaptive training for Operation team

 Increase OPEX
Cloud – evolution of communication platform

Cloud deployment models


Service base architecture
Service base architecture
NF Decoupling
On the 5GC network, NFs are decoupled and abstracted into independent NFSs that
support a variety of network applications.
Analyze the sample on the PCRF, MME, and S-GW/P-GW in QoS control. When a mobile
subscriber is activated, QoS parameters are determined through negotiation. On the 5GC
network, the QoS control function is modularized into the policy control function (PCF).

In the figure below, different colors are used to show the function mapping between EPC NEs and 5GC NFs.
Service base architecture
SBI and Protocols s dng cùng 1 chng giao thc

Service based interfaces (SBIs) concept: The same interface can be used to provide services
for other invokers, and multiple coupling interfaces are converted into a single SBI, reducing
the number of interfaces.

All SBIs use HTTP/2, and upper-layer The interface on each NF is an SBI, that is, the Nxxx
services use HTTP to transmit interface (such as Namf and Nsmf) mentioned above. The
messages. With same transmission bottom layer transmission modes of all SBIs are the same
method, all SBIs can adopt the serial and can be transmited on the same bus (as shown in the
bus interface protocol to support black line in the figure above). This is referred to as bus
flexible service onboarding. communication.
Service base architecture
SBI – Working mechanism
NFSs – NF services
3GPP defines NFSs that each NF provides for the control
plane, serving for E2E mobile network signaling processes,
such as registration, session, mobility management, etc.

With single interface per NF, how


can they interwork with each others

 3GPP defines the network repository


dk thông tin lên
function (NRF), which is responsible for
automatic NFS management, including
registration, discovery, and status
detection.
 After being powered on, an NF reports
its NFS information to the NRF and
discovers the peer NFS through the NRF
Service base architecture
SBI – Working mechanism
Service base architecture
SBI – Working mechanism
In the "service-based representation", where any control plane network function enables other
authorized network functions to access their services.

 Nsmf: Services provided by the  Namf: Services provided by the


SMF AMF
 AMF can access the SMF services  SMF can access the AMF services
via this interface via this interface
Service base architecture
NRF – Network repository function
Service base architecture
NRF – Network repository function
Service base architecture
NRF – Network repository function
When new NF is up, it automatically register to the NRF with their profile, and services

nhiu SMF có th tìm dc thì xut


Service base architecture
SBI – Working mechanism
Service base architecture
NRF discovery sample
Service base architecture
NRF discovery sample
Service base architecture
NRF – Network repository function
Service base architecture
SBI – Network Communication Path Optimization

Comparison of 4G and 5G network communication paths


Network slicing concept and application
NETWORK SLICING
Network slicing is a technology that allows multiple logical networks with functionality specific to
the service or customer over a common network infrastructure

Network slicing is not new concept, it’s many deployment solutions and targeting to full slicing in 5GC
Network slicing concept and application
NETWORK SLICING – WHY IN 5G
4G is a one fit all network, while 5G
provides very different service
scenarios by supporting eMBB, mMTC,
and URLLC, three scenarios
incorporating diversified and
differentiated applications.

Slicing offer 5GS operators:


 The flexibility to allocate differ QoS
(latency, capacity…)
 The efficient resource allocation
and utilization
 Dynamic create & control service
 Enable flexible subscription model
Network slicing concept and application
NETWORK SLICING ARCHITECTURE
Network slicing concept and application
NETWORK SLICING
Sample models for Network slicing deployment
Network slicing concept and application
Network function role in Network slicing
network slicing
selection function
Network slicing concept and application
Network function role in Network slicing
Multi Access Edge computing

Centralize Edge Computing Multi Access


computing (Cache, LBO) Edge computing

Multi access Edge Computing

Wireless
IoT Wi-Fi MSA/FMC Fixed 2G/3G/4G/5G LTE-V/V2X Enterprise Stadium

Multiple access
Multi Access Edge computing
MEC applications
Multi Edge computing
MEC applications
Multi Edge computing
MEC applications
Multi Edge computing
MEC applications
Multi Edge computing
MEC Architecture – ETSI reference
Multi Edge computing
MEC Architecture – Regular deployment model

 MEC hardware and MEC IaaS provide hardware  VAS is short for value-added services. They are
resources and infrastructure services deployed on the MEP and are provided to third-
 5GC user plane includes the SGW-U, PGW-U, and party applications (DNS, FW, NAT)
UPF functions and is deployed at the edge  ME apps are OTT applications integrated on the
 MEP is short for MEC platform. It provides service MEP. Typical applications include V2X server,
registration, discovery, and deregistration CDN, and AR/VR
functions and exposes network capabilities to  APIs are used to expose network and platform
third-party applications capabilities
Multi Edge computing
MEC Architecture – Local break out

An MEC server can provide the LBO function to steer traffic to local application servers,
avoiding traffic hauling back and forth between the edge and the core. An example use case
is video surveillance. MEC servers and cameras deployed locally can upload video streams to
the local server instead of to the Internet, ensuring video playback in real time
Multi Edge computing
MEC Architecture – Network exposure
Multi Edge computing
MEC Architecture – Charging control
Multi Edge computing
MEC Deployment

Not all services require MEC. To determine, we will need to consider the latency and LBO requirements
of each service; and then determine where to deploy the MEC servers and user plane gateways.
5GC application planning
Objectives
Understand how legacy service work in 5G
Introduce 5GC planning
Understand how legacy service work in 5G
Talking about legacy service – we normally talk about Voice
Understand how legacy service work in 5G
5G Voice – Open new scenarios
Understand how legacy service work in 5G
5G Voice solutions
Understand how legacy service work in 5G
5G Voice solution – ENDC VoLTE
Understand how legacy service work in 5G
5G Voice solution – EPS Fallback
Understand how legacy service work in 5G
5G Voice solution – Voice over New radio
Introduce 5GC planning
Infrastructure planning

time to market
Introduce 5GC planning
5GC deployment consideration
In Telco network – The availability is strictly request so redundancy must be considered very carefully
during the network planning

Active/standby Active-active Pool-based

d phiòng ti thiu

NRF, NSSF, UDM, PCF NRF, NSSF, SMSF, UDM, PCF SMF, UPF, and AMF
Introduce 5GC planning
5GC deployment consideration
THANKS

You might also like