110,99 €
Comprehensive Handbook Demystifies 5G for Technical and Business Professionals in Mobile Telecommunication Fields
Much is being said regarding the possibilities and capabilities of the emerging 5G technology, as the evolution towards 5G promises to transform entire industries and many aspects of our society. 5G for the Connected World offers a comprehensive technical overview that telecommunication professionals need to understand and take advantage of these developments.
The book offers a wide-ranging coverage of the technical aspects of 5G (with special consideration of the 3GPP Release 15 content), how it enables new services and how it differs from LTE. This includes information on potential use cases, aspects of radio and core networks, spectrum considerations and the services primarily driving 5G development and deployment.
The text also looks at 5G in relation to the Internet of Things, machine to machine communication and technical enablers such as LTE-M, NB-IoT and EC-GSM. Additional chapters discuss new business models for telecommunication service providers and vertical industries as a result of introducing 5G and strategies for staying ahead of the curve. Other topics include:
While some familiarity with the basics of 3GPP networks is helpful, 5G for the Connected World is intended for a variety of readers. It will prove a useful guide for telecommunication professionals, standardization experts, network operators, application developers and business analysts (or students working in these fields) as well as infrastructure and device vendors looking to develop and integrate 5G into their products, and to deploy 5G radio and core networks.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 965
Veröffentlichungsjahr: 2019
Cover
About the Editors
List of Contributors
Foreword by Tommi Uitto
Foreword by Karri Kuoppamaki
Preface
Acknowledgements
Introduction
Terminology
1 Drivers and Motivation for 5G
1.1 Drivers for 5G
1.2 ITU‐R and IMT 2020 Vision
1.3 NGMN (Next Generation Mobile Networks)
1.4 5GPPP (5G Public‐Private Partnership)
1.5 Requirements for Support of Known and New Services
1.6 5G Use Cases
1.7 Business Models
1.8 Deployment Strategies
1.9 3GPP Role and Timelines
References
2 Wireless Spectrum for 5G
2.1 Current Spectrum for Mobile Communication
2.2 Spectrum Considerations for 5G
2.3 Identified New Spectrum
2.4 Spectrum Regulations
2.5 Characteristics of Spectrum Available for 5G
2.6 NR Bands Defined by 3GPP
References
3 Radio Access Technology
3.1 Evolution Toward 5G
3.2 Basic Building Blocks
3.3 Downlink Physical Layer
3.4 Uplink Physical Layer
3.5 Radio Protocols
3.6 Mobile Broadband
References
4 Next Generation Network Architecture
4.1 Drivers and Motivation for a New Architecture
4.2 Architecture Requirements and Principles
4.3 5G System Architecture
4.4 NG RAN Architecture
4.5 Non‐Standalone and Standalone Deployment Options
4.6 Identifiers
4.7 Network Slicing
4.8 Multi‐Access Edge Computing
4.9 Data Storage Architecture
4.10 Network Capability Exposure
4.11 Interworking and Migration
4.12 Non‐3GPP Access
4.13 Fixed Mobile Convergence
4.14 Network Function Service Framework
4.15 IMS Services
4.16 Emergency Services
4.17 Location Services
4.18 Short Message Service
4.19 Public Warning System
4.20 Protocol Stacks
4.21 Charging
4.22 Summary and Outlook of 5G System Features
4.23 Terminology and Definitions
References
5 Access Control and Mobility Management
5.1 General Principles
5.2 Mobility States and Functionalities
5.3 Initial Access and Registration
5.4 Connected Mode Mobility
5.5 Idle Mode mobility and UE Reachability
5.6 RRC Inactive State mobility and UE Reachability
5.7 Beam Level Mobility
5.8 Support for High Speed Mobility
5.9 Support for Ultralow Latency and Reliable Mobility
5.10 UE Mobility Restrictions and Special Modes
5.11 Inter‐System (5GS‐EPS) Mobility
5.12 Outlook
References
6 Sessions, User Plane, and QoS Management
6.1 Introduction
6.2 Basic Principles of PDU Sessions
6.3 Ultra‐reliable Low Latency Communication
6.4 QoS Management in 5GS
6.5 User Plane Transport
6.6 Policy Control and Application Impact on Traffic Routing
6.7 Session Management
6.8 SMF Programming UPF Capabilities
References
7 Security
7.1 Drivers, Requirements and High‐Level Security Vision
7.2 Overall 5G Security Architecture
7.3 3GPP Specific Security Mechanisms
7.4 SDN Security
7.5 NFV Security
7.6 Network Slicing Security
7.7 Private Network Infrastructure
References
8 Critical Machine Type Communication
8.1 Introduction
8.2 Key Performance Indicators
8.3 Solutions
References
9 Massive Machine Type Communication and the Internet of Things
9.1 Massive M2M Versus IoT
9.2 Requirements and Challenges
9.3 Technology Evolution
9.4 EPS Architecture Evolution
9.5 Cellular Internet of Things
9.6 GERAN
9.7 LTE‐M
9.8 NB‐IoT
9.9 5G for M2M
9.10 Comparison of EPS and 5GS
9.11 Future Enhancements
9.12 Other Technologies
References
10 Summary and Outlook
10.1 Summary
10.2 Outlook
Appendix of 3GPP Reference Points
Index
End User License Agreement
Chapter 1
Table 1.1 User experience requirements.
Table 1.2 System performance requirements.
Table 1.3 Performance requirements for time critical communication.
Table 1.4 Performance requirements for high data rate and traffic density scenar...
Table 1.5 Performance requirements for vehicles platooning.
Table 1.6 Performance requirements for advanced driving.
Table 1.7 Performance requirements for extended sensors.
Table 1.8 Performance requirements for remote driving.
Table 1.9 3GPP milestones up to Release 16.
Chapter 2
Table 2.1 Frequency bands studied for WRC‐19 and allocated for mobile service on...
Table 2.2 Frequency bands studied for WRC‐19 and not allocated for mobile servic...
Table 2.3 Main license‐exempt spectrum.
Table 2.4 Mean EIRP (Equivalent Isotropic Radiated Power) limits for RF output p...
Table 2.5 Material penetration losses.
Table 2.6 Operating bands for NR at below 6 GHz defined in 3GPP Rel‐15.
Table 2.7 Operating bands for NR above 6 GHz defined in 3GPP Rel‐15.
Chapter 3
Table 3.1 Subcarrier spacing, nominal BW and frequency range.
Table 3.2 Implementation for single code rate and block size.
Table 3.3 Implementations for multiple code rates and block sizes.
Table 3.4 NR LDPC base graphs.
Table 3.5 Sets of LDPC lifting size.
Table 3.6 SS Block subcarrier spacings in given bands.
Table 3.7 PBCH content.
Table 3.8 Physical channels for messages in NR RACH procedure.
Table 3.9 Long sequence PRACH preambles.
Table 3.10 Base formats for short sequence‐based PRACH preambles.
Table 3.11 Number of RACH occasions within a slot.
Table 3.12 Supported header compression protocols and profiles.
Chapter 4
Table 4.1 NF types in terms of states.
Table 4.2 Used terminology.
Table 4.3 NF services provided by AMF.
Table 4.4 NF services provided by SMF.
Table 4.5 NF services provided by UDM.
Table 4.6 NF services provided by NRF.
Chapter 5
Table 5.1 Characteristics of RRC states in 5G.
Chapter 6
Table 6.1 Delay critical 5QI QoS characteristics.
Chapter 8
Table 8.1 Low latency and high reliability use cases.
Table 8.2 List of technology components for latency reduction.
Table 8.3 OFDM numerologies for 5G NR (normal CP length).
Table 8.4 Reduced processing time for slot‐based scheduling.
Table 8.5 Standardized delay critical 5G QoS values.
Table 8.6 List of technology components for enhancing reliability.
Table 8.7 SINR gain due to higher AL with 40‐bit DCI.
Table 8.8 Simulation parameters for compact DCI.
Table 8.9 SINR gain with 30‐bit DCI versus 40‐bit DCI.
Table 8.10 Overall error probability for different options of PDCCH repetition.
Chapter 9
Table 9.1 Radio and system architecture feature evolution for M2M.
Table 9.2 Set of logical channels for EC‐GSM‐IoT.
Table 9.3 CC parameters for EC‐GSM‐IoT packet traffic channel.
Table 9.4 CC parameters for EC‐GSM‐IoT DL common control channels (sent in TN 1,...
Table 9.5 CC parameters for EC‐GSM‐IoT UL common control channel (single timeslo...
Table 9.6 Radio parameters of DL channels for EC‐GSM‐IoT network synchronization...
Table 9.7 Coverage enhancement modes A and B.
Table 9.8 LTE‐M link budget.
Table 9.9 NB‐IoT channels and signals.
Table 9.10 Number of signalling messages for NB‐IoT data transmission.
Table 9.11 NB‐IoT link budget for in‐band deployment mode.
Table 9.12 Other technologies for M2M/IoT.
Chapter 1
Figure 1.1 Market characteristics (people and things).
Figure 1.2 IMT 2020 usage scenarios.
Figure 1.3 5G use case categories.
Figure 1.4 FWA using cmWave or mmWave 5G radio.
Figure 1.5 5G for in‐vehicle infotainment.
Figure 1.6 5G for truck platooning.
Figure 1.7 5G for Industry 4.0.
Figure 1.8 Non‐standalone and standalone deployment options.
Figure 1.9 3GPP organizational structure.
Figure 1.10 3GPP timeline for 5G.
Chapter 2
Figure 2.1 Data usage per mobile broadband subscription – average volume for OE...
Figure 2.2 METIS‐II concept for spectrum management and sharing for 5G mobile n...
Figure 2.3 Definition of distances for pathloss models.
Chapter 3
Figure 3.1 Data rate evolution from 3GPP UMTS Release '99 to 3GPP LTE Release ...
Figure 3.2 KT 5G‐SIG user plane protocol architecture [9].
Figure 3.3 5G‐TF system architecture.
Figure 3.4 Bi‐direction frame type in KT 5G‐SIG and 5GTF.
Figure 3.5 Conventional CP‐OFDMA transmitter block diagram.
Figure 3.6 Example PSD realizations for different waveform candidates.
Figure 3.7 Transmitter unit test setup.
Figure 3.8 Receiver unit test setup.
Figure 3.9 Spectrum allocation on 2.6 GHz in Germany.
Figure 3.10 Bi‐directional slot with DL symbol, flexible symbols and UL symbol.
Figure 3.11 System bandwidth, initial BWP and configured BWP.
Figure 3.12 Digital baseband beamforming architecture, with K input streams and...
Figure 3.13 RF beamforming architecture, with B input streams with B Transmitte...
Figure 3.14 Hybrid beamforming architecture, with B input streams with B Transm...
Figure 3.15 Tanner graph for parity check matrix in Eq. (3.1).
Figure 3.16 Dimensions of LDPC base graphs.
Figure 3.17 Coding chain for LDPC.
Figure 3.18 Basic building block of polar codes.
Figure 3.19 Encoding graph of length‐4 polar codes.
Figure 3.20 Coding chain of the NR polar coding.
Figure 3.21 SS Block structure.
Figure 3.22 PSS time and frequency offset ambiguity of (a) LTE PSS sequence (le...
Figure 3.23 Detection latency for LTE and NR for 5 ms PSS/SSS transmission peri...
Figure 3.24 Detection latency for LTE and NR when LTE is having 5 ms and NR 20 ...
Figure 3.25 DMRS mapping on REs in an PRB based on Physical Cell ID.
Figure 3.26 SS Block positions within a slot as a function of SS Block subcarri...
Figure 3.27 SS Block positions within a slot as a function of SS Block subcarri...
Figure 3.28 Time multiplexing of SS Block and RMSI transmission.
Figure 3.29 Option (a) Frequency multiplexing of SS Block and RMSI transmission...
Figure 3.30 Option (b) Frequency multiplexing of SS Block and RMSI transmission...
Figure 3.31 PRACH preamble formats A1 with two different starting symbols withi...
Figure 3.32 Control plane protocol stack.
Figure 3.33 User plane protocol stack.
Figure 3.34 MgNB bearers for dual connectivity [36].
Figure 3.35 Downlink logical channel mapping to transport channels.
Figure 3.36 Uplink logical channel mapping to transport channels.
Figure 3.37 MAC PDU structure in DL.
Figure 3.38 MAC PDU structure in UL.
Figure 3.39 MAC sub‐header structures.
Figure 3.40 Beam failure detection principle.
Figure 3.41 Beam failure recovery principle.
Figure 3.42 RLC SDU segmentation into RLC PDUs.
Figure 3.43 Wall penetration loss for O2I below 6GHz.
Figure 3.44 Wall penetration loss for O2I at mmWave frequencies.
Chapter 4
Figure 4.1 Architecture domains.
Figure 4.2 Flexible connectivity model.
Figure 4.3 Service based architecture – use of service discovery.
Figure 4.4 Exposure control.
Figure 4.5 RAN architecture principles.
Figure 4.6 Inter system, multi‐access interworking view.
Figure 4.7 Non‐roaming 5G system architecture.
Figure 4.8 Roaming 5G system architecture with local breakout.
Figure 4.9 5G core with SBA framework.
Figure 4.10 Compute and storage separation – data storage architecture.
Figure 4.11 5G RAN scenarios.
Figure 4.12 5G RAN functional architecture.
Figure 4.13 NG‐RAN architecture.
Figure 4.14 Logical NG‐RAN architecture with split options.
Figure 4.15 Lower‐layer split architecture and options.
Figure 4.16 Service‐aware placement of RAN functions.
Figure 4.17 Control‐plane architecture for MR‐DC with 5GC or EPC connectivity.
Figure 4.18 Control‐plane and user‐plane interfaces for MR‐DC with 5GC or EPC c...
Figure 4.19 User‐plane architecture for MR‐DC and EN‐DC.
Figure 4.20 3GPP Option 2 NR standalone architecture with 5G Core.
Figure 4.23 3GPP Option 7 E‐UTRA non‐standalone architecture with 5G Core.
Figure 4.24 NR non‐standalone architecture with EPS (also referred to as Option...
Figure 4.25 User plane architecture options.
Figure 4.26 Network slices.
Figure 4.27 Network slice with 5G system.
Figure 4.28 Network slice selection call flow.
Figure 4.29 Interworking between (e)Decor and 5G slicing.
Figure 4.30 Interworking between APN and 5G slicing.
Figure 4.31 Multi‐access edge computing framework.
Figure 4.32 Session establishment and initial UPF selection.
Figure 4.33 Reselection of UPF and application following UE mobility.
Figure 4.34 No state NF.
Figure 4.35 Stateless NFs.
Figure 4.36 State‐efficient NFs.
Figure 4.37 Stateful NFs.
Figure 4.38 AMF structure.
Figure 4.39 Routing N1/N2 messages to any AMF.
Figure 4.40 Network capability exposure with bulk subscription.
Figure 4.41 EPS to 5GS migration.
Figure 4.42 EPS to 5GS migration – system selection and routing.
Figure 4.43 5GS‐EPS interworking architecture.
Figure 4.44 Single registration mode UE.
Figure 4.45 Dual registration mode UE.
Figure 4.46 UE and network support.
Figure 4.47 5G common (multi‐access) core.
Figure 4.48 Establishment of the signaling connectivity between a UE and the 5G...
Figure 4.49 FMC use cases.
Figure 4.50 Integration of wireline access into the 5G Core.
Figure 4.51 NF and NF service.
Figure 4.52 NF, NF service and NF service operation.
Figure 4.53 System procedures and NF services.
Figure 4.54 Self‐contained service.
Figure 4.55 Re‐usable services.
Figure 4.56 Request‐Response NF service illustration.
Figure 4.57 Subscribe‐Notify NF service illustration 1.
Figure 4.58 Subscribe‐Notify NF service illustration 2.
Figure 4.59 Network function discovery framework.
Figure 4.60 System fallback toward E‐UTRAN/EPC (EPS fallback).
Figure 4.61 RAT fallback toward E‐UTRA/5GC.
Figure 4.62 Non‐roaming location services architecture.
Figure 4.63 Non‐roaming architecture for SMS over NAS.
Figure 4.64 PWS architecture.
Figure 4.65 NGAP protocol stack.
Figure 4.66 Control plane between AN and SMF.
Figure 4.67 NAS transport for SM, SMS and other services.
Figure 4.68 Control plane before the signaling IPsec SA is established between ...
Figure 4.69 Control plane after the signaling IPsec SA is established between U...
Figure 4.70 Control plane for establishment of user‐plane via N3IWF.
Figure 4.71 User plane protocol stack.
Figure 4.72 User plane protocol stack for untrusted non‐3GPP access.
Figure 4.73 NG‐RAN user plane protocol stack for gNB with F1 interface.
Figure 4.74 NG‐RAN user plane protocol stack for MN/SN in dual connectivity mod...
Figure 4.75 AS and NAS layer.
Chapter 5
Figure 5.1 States in the MM sublayer.
Figure 5.2 States for the CM.
Figure 5.3 States in the SM sublayer.
Figure 5.4 Traffic pattern illustration.
Figure 5.5 5G RRC state machine and state transitions.
Figure 5.6 5G RRC state machine embedded with NAS State machine.
Figure 5.7 UE states and state transitions for NR and interworking with E‐UTRA.
Figure 5.8 Initial registration procedure (UE context not fetched from another ...
Figure 5.9 Initial registration procedure (UE context fetched from the old AMF)...
Figure 5.10 Inter‐gNB‐DU mobility using SCG SRB (SRB3) for intra‐NR.
Figure 5.11 Inter‐gNB‐DU mobility using MCG SRB in EN‐DC.
Figure 5.12 Change of SN – MN initiated.
Figure 5.13 Change of SN – SN initiated.
Figure 5.14 SN change procedure – MN initiated.
Figure 5.15 SN change procedure – SN initiated.
Figure 5.16 MN initiated inter‐MN handover with or without SN change.
Figure 5.17 Inter‐MN handover with/without MN initiated SN change procedure.
Figure 5.18 Master node to eNB change procedure.
Figure 5.19 MN to ng‐eNB/gNB change procedure.
Figure 5.20 Xn based inter NG‐RAN handover.
Figure 5.21 Inter NG‐RAN node N2 based handover.
Figure 5.22 Conditional handover.
Figure 5.23 Registration procedure due to mobility or periodic update.
Figure 5.24 Paging procedure.
Figure 5.25 Configuration of a RRC inactive state.
Figure 5.26 Received signal shadowing when the UE passes a street corner at 30 ...
Figure 5.27 A multi‐connected UE executing make‐before‐break handover while hav...
Figure 5.28 Mobility of a multi‐connected UE consisting of two independent laye...
Figure 5.29 Inter‐system change for a UE operating in single registration mode.
Figure 5.30 Inter‐system change for a UE operating in dual registration mode.
Chapter 6
Figure 6.1 5GS user plane – a PDU Session topology example.
Figure 6.2 5G PDU Session management – impacted interfaces (as seen from SMF an...
Figure 6.3 5G User plane – multiple concurrent (e.g. local/central) access to t...
Figure 6.4 Uplink classifier solution for multiple concurrent access to the sam...
Figure 6.5 IPv6 multi‐homing solution for multiple concurrent access to the sam...
Figure 6.6 Home routed roaming mode for a PDU Session.
Figure 6.7 Local breakout roaming mode for a PDU Session.
Figure 6.8 User plane architecture and user plane topology.
Figure 6.9 5G flow based QoS framework.
Figure 6.10 Controlling UL user plane QoS.
Figure 6.11 N3 backhaul transparently carries traffic of different PDU Session ...
Figure 6.12 High‐level call flow for PDU Session establishment.
Chapter 7
Figure 7.1 Stakeholders providing 5G services.
Figure 7.2 5G high‐level security vision.
Figure 7.3 Elements of a 5G security architecture.
Figure 7.4 Mutual authentication between UE and network using EAP‐AKA′.
Figure 7.5 Mutual authentication between UE and network using 5G AKA.
Figure 7.6 5G key hierarchy.
Figure 7.7 SDN security mechanisms.
Chapter 8
Figure 8.1 V2X communication and Edge Clouds.
Figure 8.2 Example procedure for DL data transmission.
Figure 8.3 Reliability regions for downlink scheduling‐based data transmissions...
Figure 8.4 Logical network view with Edge and Telco Clouds.
Figure 8.5 Network distances.
Figure 8.6 Low latency configuration.
Figure 8.7 Micro‐operator network for verticals.
Figure 8.8 MEC platform architecture.
Figure 8.9 Flexible slot structure in 5G NR.
Figure 8.10 Mini‐slot PDSCH scheduling.
Figure 8.11 Resource allocation framework for URLLC and eMBB multiplexing: down...
Figure 8.12 Example of preemptive scheduling.
Figure 8.13 Pause‐resume scheduling mechanism in uplink.
Figure 8.14 Example of multiple SR resource configuration.
Figure 8.15 URLLC transmission with UL grant free resource.
Figure 8.16 Intra‐UE puncturing.
Figure 8.17 UL grant free transmission.
Figure 8.18 UDSF as part of the 5G core architecture.
Figure 8.19 Example of micro‐diversity operation.
Figure 8.20 Example of baseline transmission and joint‐transmission: (a) baseli...
Figure 8.21 Performance comparison between baseline (regular unicast based tran...
Figure 8.22 Illustration of decoding ACK/NACK signals.
Figure 8.23 Performance of CQI report.
Figure 8.24 Example of DL HARQ processing with multi‐slot scheduling (Option 1)...
Figure 8.25 Example of individual scheduling for each blind repetition independ...
Figure 8.26 Reliable transmission of DL assignment information (Option 3).
Figure 8.27 PDCCH repetition before data transmission (Option 4).
Figure 8.28 Error probability for PDSCH decoding.
Figure 8.29 Example of UL HARQ processing.
Figure 8.30 Example of UL HARQ processing with multi‐slot scheduling.
Figure 8.31 Example of DL HARQ processing with multi‐slot scheduling.
Figure 8.32 Example of make‐before‐break handover.
Chapter 9
Figure 9.1 System architecture feature evolution for M2M.
Figure 9.2 MTC architecture.
Figure 9.3 SMS in MME architecture.
Figure 9.4 CIoT architecture.
Figure 9.5 Control plane data over SCEF or P‐GW.
Figure 9.6 C‐plane via SCEF.
Figure 9.7 User plane CIoT EPS optimization.
Figure 9.8 Connection suspend procedure according 3GPP TS 23.401.
Figure 9.9 Connection resume procedure according 3GPP TS 23.401.
Figure 9.10 SMS data path.
Figure 9.11 UE requesting coverage enhancement.
Figure 9.12 Reliable data service.
Figure 9.13 MBMS delivery to UEs with non‐synchronous power saving cycles.
Figure 9.14 QoS differentiation.
Figure 9.15 Control plane overload control.
Figure 9.16 Illustration of the application of coverage classes in a sensitivit...
Figure 9.17 Burst phase shift on UL for overlaid CDMA (examples of multiplexing...
Figure 9.18 LTE‐M downlink operation.
Cover
Table of Contents
Begin Reading
iii
vi
xvii
xviii
xix
xx
xxi
xxii
xxiii
xxv
xxvi
xxvii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
xxxix
xl
xli
xlii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
Edited by
Devaki Chandramouli
NokiaTexasUSA
Rainer Liebhart
NokiaMunichGermany
Juho Pirskanen
WirepasTampereFinland
This edition first published 2019
© 2019 John Wiley & Sons Ltd
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
The right of Devaki Chandramouli, Rainer Liebhart and Juho Pirskanen to be identified as the authors of the editorial material in this work has been asserted in accordance with law.
Registered Offices
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
Editorial Office
The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Wiley also publishes its books in a variety of electronic formats and by print‐on‐demand. Some content that appears in standard print versions of this book may not be available in other formats.
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
Library of Congress Cataloging‐in‐Publication Data
Names: Chandramouli, Devaki, editor. | Liebhart, Rainer, editor. | Pirskanen,
Juho, editor.
Title: 5G for the connected world / edited by Devaki Chandramouli, Nokia,
Texas, USA, Rainer Liebhart, Nokia, Munich, Germany, Juho Pirskanen, Wirepas, Tampere,
Finland.
Description: First edition. | Hoboken, NJ : John Wiley & Sons, Inc., 2019. |
Includes bibliographical references and index. |
Identifiers: LCCN 2018051891 (print) | LCCN 2018056369 (ebook) | ISBN
9781119247074 (AdobePDF) | ISBN 9781119247135 (ePub) | ISBN 9781119247081
(hardcover)
Subjects: LCSH: Mobile communication systems‐‐Technological innovations. |
Broadband communication systems--Technological innovations. | Wireless
sensor networks‐‐Technological innovations.
Classification: LCC TK5103.2 (ebook) | LCC TK5103.2 .A147 2019 (print) | DDC
621.3845/6‐‐dc23
LC record available at https://lccn.loc.gov/2018051891
Cover Design: Wiley
Cover Image: Iaremenko Sergii/Shutterstock
DEVAKI CHANDRAMOULI has over 18 years of experience in the telecommunication industry. She spent the early part of her career with Nortel Networks and is currently with Nokia. At Nortel, her focus was on the design and development of embedded software solutions for CDMA networks. Later, she represented Nortel on the Worldwide Interoperability for Microwave Access (WiMAX) Forum with a focus on WiMAX architecture and protocol development. At Nokia, her focus areas include architecture and protocol development of 5G System and EPS related topics. She has been instrumental in developing Nokia's vision for 5G System Architecture and she has also been instrumental in developing Nokia's strategy for radio and architecture standardization (phased) approach in the 3rd Generation Partnership Project (3GPP). She leads 5G System Architecture specification in 3GPP SA2 and continues to focus on active contribution toward evolution of 5G System work in SA2. She is now Head of North American Standardization in Nokia. She has co‐authored IEEE papers on 5G, co‐authored a book on “LTE for Public Safety” published by Wiley in 2015. She has (co‐)authored over 100 patents in wireless communications. Devaki received her B.E. in Computer Science from Madras University (India) and M.S. in Computer Science from University of Texas at Arlington (USA).
RAINER LIEBHART has 25 years of experience in the telecommunication industry. He held several positions within the former Siemens Fixed and Mobile Networks divisions and now in Nokia Mobile Networks. He started his career as SW Engineer, worked later as standardization expert in 3GPP and the European Telecommunications Standards Institute (ETSI) in the area of Internet Protocol Multimedia Subsystem (IMS), took over responsibilities as WiMAX and Mobile Packet Core System Architect and was head of the Mobile Core Network standardization team in Nokia Networks for more than eight years. He was also the Nokia Networks main delegate in 3GPP SA2 with the focus on Long‐Term Evolution/System Architecture Evolution (LTE/SAE). After working as Research Project Manager within Nokia Bell Labs with a focus on 5G, he is now Head of 5G Solution Architecture in the Mobile Networks Global Product Sales department of Nokia. He is (co‐)author of over 70 patents in the telecommunication area and co‐editor of the book “LTE for Public Safety” published at Wiley. Rainer Liebhart holds an M.S. in Mathematics from the Ludwig‐Maximilians University in Munich, Germany.
JUHO PIRSKANEN has 18 years of experience on technology development on wireless radio technologies such as 3G, HSPA, LTE and WLAN and most recently on 5G. He has held several positions in Nokia Networks, Nokia Wireless Modem, Renesas Mobile Corporation and Broadcom Corporation and then again at Nokia Networks for 5G research and standardization. He has participated actively for several years on different standardization forums such as 3GPP and IEEE802.11 by doing numerous technical presentations, being rapporteur of technical specifications and leading different delegations. His research work has resulted in more than 40 (co‐)authored patent families on different wireless technologies and several publications on radio interface solutions including 5G. On 5G his research focused on physical layer and radio protocol layer concepts and first implementations of the 5G radio solutions. In late 2017, he joined Wirepas having headquarters in Tampere, Finland. Wirepas develops de‐centralized wireless IoT mesh networks that can be used to connect, locate and identify lights, sensors, beacons, assets, machines and meters with unprecedented scale, density, flexibility and reliability. Juho Pirskanen holds a Master of Science in Engineering, from Tampere University of Technology, Finland.
Subramanya Chandrashekar
Nokia
Bangalore
India
Betsy Covell
Nokia
Naperville
USA
Sami Hakola
Nokia
Oulu
Finland
Volker Held
Nokia
Munich
Germany
Hannu Hietalahti
Nokia
Oulu
Finland
Jürgen Hofmann
Nokia
Munich
Germany
Keeth Jayasinghe
Nokia
Espoo
Finland
Toni Levanen
Tampere University
Tampere
Finland
Zexian Li
Nokia
Espoo
Finland
Andreas Maeder
Nokia
Munich
Germany
Jarmo Makinen
Nokia
Espoo
Finland
Tuomas Niemela
Nokia
Espoo
Finland
Karri Ranta‐aho
Nokia
Espoo
Finland
Rapeepat Ratasuk
Nokia
Naperville
USA
Rauno Ruismäki
Nokia
Espoo
Finland
Peter Schneider
Nokia
Munich
Germany
Mikko Säily
Nokia
Espoo
Finland
Thomas Theimer
Nokia
Munich
Germany
Laurent Thiebaut
Nokia
Paris‐Saclay
France
Samuli Turtinen
Nokia
Oulu
Finland
Mikko Uusitalo
Nokia
Espoo
Finland
Fred Vook
Nokia
Naperville
USA
Sung Hwan Won
Nokia
Seoul
South Korea
It has been said that hyper‐successes often happen in business when three distinct and major inflection points or disruptions coincide. Not just one, not two, but three. With that theory, we can explain the hyper‐success of GSM. First, there was a new global and open standard for mobile communication technology, driving up volumes and allowing for an ecosystem to emerge. Second, deregulation took place, allowing for competition with the incumbent, previously monopolistic operators. Third, electronics had evolved to a point, where mobile devices have become affordable for a bigger mass of the population. And sure enough, mobile telephony proliferated throughout the world and made people's lives more enjoyable, secure, efficient and effective. Obviously, businesses also benefited from the ability of their employees to stay connected with one another and Internet regardless of their location. With the advent of 5G, we have the ingredients for something equally profound to happen. You see, the introduction of 5G as a wireless technology is more or less coinciding with adoption of both cloud computing and Artificial Intelligence (AI)/Machine Learning (ML) by operators. Looking back, we can certainly be satisfied with the improvements that 3G and 4G brought as mobile communication technologies, as well as the new device paradigms, pricing models and business models that were introduced in parallel with them. But 5G can become a much bigger step for the humankind, relatively speaking, than 3G and 4G did at their time of introduction and adoption. With the extreme mobile broadband aspects of 5G, we have so much speed and capacity that it is difficult to see how we could run out of it with applications and use cases known today. With design criterion of one million connected objects per square kilometer, we can say that 5G has been designed for the Internet of Things (IoT) from the outset. It will be more affordable and technically feasible than ever before to embed radio sensors and transceivers in physical objects. With ultra‐reliable low‐latency communication (URLLC) performance criteria and functionalities in 5G, we open a host of new use cases and business potential as we can be certain enough about a reliable and robust connection to a physical object accurately in space and time. In addition to such superior wireless connectivity and capacity, we then have virtually infinite computing capacity thanks to cloud computing. And not just any computing, not linear or simplistically deterministic computing, but rather computing that learns with AI, ML, including deep learning. A self‐improving machine that can collect data and command objects in a wireless manner. Furthermore, a technology called network slicing will allow us to logically segregate different performance sets by using the common cloud infrastructure end‐to‐end, rather than building separate physical networks for separate use cases. It is difficult to see why just about any physical or physical/digital business process could not be automated with such technology. Therefore, we can expect 5G, together with Cloud and AI/ML, to have, relatively speaking, a bigger, more profound impact on enterprise than previous generations of mobile communications have had. For consumers, we are lifting and eradicating many barriers to use mobile technology to its full potential. To put it another way, we are creating ubiquitous embedded computing, not just islands of computing, not just communication networks. We are seamlessly interweaving physical and digital worlds. We will have a perfect, programmable model of the physical world in digital space. Welcome to the 5G future. The authors are deeply involved in the work on 5G – network slicing technology as an example – and are in a prime position to provide valuable first‐hand insights on 5G‐related 3GPP activities and all relevant technical details.
Tommi Uitto
President
Mobile Networks
Nokia
Wireless connectivity touches almost every aspect of our daily lives, and LTE has delivered the ubiquitous high‐speed wireless broadband experience for us. This has unlocked the potential of mobile video and the mobile innovation that rides on those networks that we interact with every day. Lyft, Uber, Snapchat, Venmo, Square, Instagram … these are companies that simply would not exist without LTE. In addition to new innovations, global leaders such as Facebook, Alphabet, Amazon, and Netflix adapted their businesses to benefit from mobile broadband and their growth exploded!
As a result, mobile data use keeps growing, and there seems to be no end for consumer demand for more. Additionally, the need for more sophisticated mobile broadband services as well as new industries and users adopting the power of mobile broadband will push the limit on LTE technology creating a need for the next generation of mobile technology – 5G.
The next‐generation of wireless technology, 5G, will not only enhance and improve the services we enjoy today, but will also transform entire industries, from agriculture to transportation and manufacturing to become more capable, efficient, and intelligent. In other words, the evolution toward 5G is a key component in the digital transformation of almost every industry as well as of society. As such, 5G is an integral component of our continued Un‐Carrier journey into the future.
Although the promise and vision of 5G is well described, the 5G system behind it is somewhat covered in a veil of mystery. This book explaining the new 5G system from an end‐to‐end perspective, from vision and business motivation to spectrum considerations and then the technology from Radio to Core Network and service architecture demystifies what the 5G system is about. I would like to thank the authors for doing an excellent job in translating this complex topic into a book, and I hope it will serve as a useful tool for anyone wanting to understand what 5G really is all about.
Karri Kuoppamaki
Vice President
Network Technology
Development and Strategy
T‐Mobile USA
After the considerable success of LTE, why do we need a new system with a new radio and a new core? First, 5G will boost some of the LTE key performance indicators to a new horizon: capacity, latency, energy efficiency, spectral efficiency, and reliability. We will describe the relevant radio and core features to enable optimizations (5G to be 10, 100, or 1000 times better than LTE) in these areas in respective chapters of the book. But this is only half of the 5G story. With the service‐based architecture 5G Core supports natively a cloud‐based architecture, the higher layer split of the radio protocol as specified by 3GPP paves the path for a cloud‐based implementation of the radio network or parts of it and network slicing will open totally new revenue streams for operators by offering their network as a service to vertical industries. Slicing will enable operators implementing logical networks for diverse use cases (e.g. industrial applications) in an optimal way on their physical hardware. The 5G System also supports compute and storage separation natively, and introduces enablers to support the ability to perform dynamic run time load (re‐)balancing with no impact to user's services. In addition, open interfaces and the possibility to expose data from network functions to third parties via open APIs enables operators to monetize these contextual real‐time and non‐real‐time data or simply use the data to optimize network deployment and configuration. Operators can broker information to different industries like providers of augmented reality services, traffic steering systems, factories, logistical systems, and utilities. Real‐time big data analytics will play a crucial role for this brokering model.
In a nutshell, the main intention of this book is to explain what 5G is from a technical point of view (considering 3GPP Release 15 content), how it can be used to enable new services, and how it differs from LTE. The book covers potential 5G use cases, radio and core aspects, and deals also with spectrum considerations and new services seen as drivers for 5G. Although 5G will not support IoT and massive machine‐type‐communication from the very beginning in 3GPP Rel‐15, we felt that this topic is extremely important and thus we provided a detailed description about IoT, M2M, and technical enablers like LTE‐M, NB‐IoT, GSM, 5G in this book.
Some familiarity of the reader with the basics of 3GPP networks, especially with LTE/EPC, would be helpful, but this is not a pre‐requisite to understand the main parts of this book. The reader can find a more detailed description of the book's content in the introduction section.
This book is intended for a variety of readers such as telecommunication professionals, standardization experts, network operators, analysts, and students. It is also intended for infrastructure and device vendors planning to implement 5G in their products, and regulators who want to learn more about 5G and its future applicability for a large variety of use cases. We hope everyone interested in the subject of this book benefits from the content provided.
The race towards 5G has already begun in major markets round the world like North America, China, Japan, and South Korea. To be first on the market with 5G is a key differentiator between operators and vertical industries. The year 2018 will be the first where 5G commercial networks are deployed in some key markets, even on a medium or large scale. People will start benefitting from the huge and broad step forward 5G is bringing to them individually with faster traffic downloads, faster setup times, lower latency, higher connection reliability and to the whole society with smarter cities, factories and traffic control coping with the challenges of the future. This brings us close to the vision of a truly connected world where everyone and everything are potentially connected with each other.
The Editors
December 2018
The book has benefited from the extensive contribution and review of many subject matter experts and their proposals for improvements. The editors would like to thank in particular the following people for their extensive contribution and review that helped to complete this book:
Subramanya Chandrashekar, Betsy Covell, Sami Hakola, Volker Held, Hannu Hietalahti, Jürgen Hofmann, Günther Horn, Keeth Jayasinghe, Toni Levanen, Zexian Li, Andreas Maeder, Jarmo Makinen, Tuomas Niemela, Karri Ranta‐aho, Rapeepat Ratasuk, Rauno Ruismäki, Mikko Säily, Peter Schneider, Thomas Theimer, Laurent Thiebaut, Samuli Turtinen, Mikko Uusitalo, Fred Vook, Sung Hwan Won.
We would also like to thank Sandra Grayson, Louis Vasanth Manoharan, Rajitha Selvarajan and Mary Malin from Wiley for their continuous support during the editing process.
Finally, we thank our families for their patience and cooperation during the writing of the book.
The editors appreciate any comments and proposals for enhancements and corrections in future editions of the book. Feedback can be sent directly to devaki.chandramouli@nokia.com, rainer.liebhart@nokia.com, juho.pirskanen@gmail.com.
This book explains the new 5G system from an end‐to‐end perspective, starting from the 5G vision and business drivers, deployment and spectrum options going to the radio and core network architectures and fundamental features including topics like QoS, mobility and session management, network slicing and 5G security. The book also contains an extensive discussion of IoT‐related features in GSM, LTE, and 5G. As indicated in the preface, some familiarity of the reader with basic concepts of mobile networks and especially with LTE/EPC is beneficial, although not a must for all chapters.
Chapter 1 will address the drivers and motivation for 5G. It will also provide insights into 5G use cases, requirements from various sources, like NGMN, ITU‐R and 5GPPP, and its ability to support new services. In addition, it will touch on the business models enabled by the new radio and core architecture, and on possible deployment strategies. Furthermore, it will provide insights into organizations involved in defining use cases, requirements and developing the 5G eco system. It also provides an overview of the 3GPP timeline and content of Release 15 and Release 16. This chapter does not require detailed technical knowledge about mobile networks.
Chapter 2 provides insights into spectrum considerations for the new 5G radio regarding all possible bands. Additionally, readers will get a good understanding of the characteristics of available new spectrum for 5G that sets fundamental requirements for radio design deployment and how spectrum is used, based on available channel models and measurements. It will also provide information about regional demands for licensed and unlicensed spectrum and about new regulatory approaches for spectrum licensing in the 5G era.
Chapter 3 describes the new 5G radio access technology. It includes the evolution of LTE access towards 5G, description of new waveforms, massive MIMO, and beamforming technologies, which are key features of the new 5G radio. This chapter will also explain the physical layer frame structure with its necessary features and functionalities. Furthermore, the chapter will explain the complete physical layer design and procedures in both downlink and uplink. Finally, the chapter explains the radio protocols operating on top of the 5G physical layer and procedures required to build the complete 5G radio access system. This chapter will also discuss solutions on how 5G caters to the extreme bandwidth challenge, considering challenges providing broadband access in indoor, rural, sub‐urban, and urban areas.
Chapter 4 provides detailed insights into the drivers and motivations for the new 5G system. It gives an overview of the System Architecture, RAN architecture, architectural requirements, basic principles for the new architecture, and the role of technology enablers in developing this new architecture. It provides a comparison with EPS, describes the essence of the 5G system, newly introduced features, and explains how interworking between EPS and the 5G system will work in detail. This chapter details the key features including network slicing, data storage principles for improved network resiliency and information exposure, generic exposure framework, architectural enablers for mobile edge computing, support for non‐3GPP access, fixed‐mobile convergence, support for IMS, SMS, location services, public warning system, and charging. It also includes a summary of control and user plane protocol stacks.
Chapter 5 describes the 5G mobility management principles followed in radio and core network. It will also provide a comparison of 5G mobility management with existing mobility management in LTE/EPC. This will include a description of 5G mobility states, connected and idle mode mobility for standalone and non‐standalone deployments. It will also include procedures for interworking towards LTE/EPC. Furthermore, it will provide insights into how mobility support for ultra‐high reliability applications or highly mobile devices is achieved in 5G, considering single connectivity and multi‐connectivity features.
Chapter 6 provides an overview of Session Management and QoS principles in 5G. It defines the data connectivity provided by the 5GS (PDU sessions, PDU session continuity modes, traffic offloading, etc.). It describes the 5GS QoS framework (QoS Flows, parameters of 5GS QoS, reflective QoS, etc.). Finally, it gives an overview of how applications can influence traffic routing and policy control for PDU sessions.
Chapter 7 provides insights into the 5G security vision and architecture. It explains device and network domain security principles and procedures based on 3GPP standards. This also includes a description of the key hierarchy used within the 5G security framework. In addition, this chapter provides an overview of NFV, SDN, and network slicing security challenges and corresponding solutions.
Chapter 8 provides an overview of ultra‐low latency and high reliability use cases, their challenges and requirements, e.g. remote control, industrial automation, public safety, and V2X communication. It also provides an overview of radio and core network related solutions enabling low latency and high reliability from an end‐to‐end perspective.
Chapter 9 provides a description of 5G solutions and features supporting massive machine type communication and IoT devices. The chapter outlines the requirements and challenges imposed by a massive number of devices connected to cellular networks. In addition, the chapter also gives a detailed overview of how M2M and IoT communication is supported with technologies like LTE‐M, NB‐IoT, and GSM along with System Architecture enhancements supported for M2M and IoT devices.
Chapter 10 is meant as a summary and wrap‐up of the whole book, highlighting the most important facts about 5G and providing an outlook of new features that can be expected in future 3GPP releases.
2G
2nd Generation
3G
3rd Generation
3GPP
3rd Generation Partnership Project
4G
4th Generation
5G
5th Generation
5G NR
5G New Radio
5G RG
5G Residential Gateway
5GAA
5G Automotive Association
5GACIA
5G for Connected Industries and Automation
5GC
5G Core
5G‐GUTI
5G Globally Unique Temporary Identifier
5GIA
5G Infrastructure Association
5GPPP
5G Public‐Private Partnership
5QI
5G QoS Identifier
5G‐SIG
5G Special Interest Group
5GS
5G System
5G‐S‐TMSI
5G S‐Temporary Mobile Subscription Identifier
5GTF
5G Task Force
6G
6th Generation
AAA
Authentication, Authorization and Accounting
AC
Access Class
ACC
Adaptive Cruise Control
ACK
Acknowledgement
ADSL
Asymmetric Digital Subscriber Line
AES
Advanced Encryption Standard
AF
Application Function
AGCH
Access Grant Channel
AI
Artificial Intelligence
AKA
Authentication and Key Agreement
AL
Aggregation Level
AM
Acknowledged Mode
AMF
Access and Mobility Management Function
AOA
Angle of Arrival
AOD
Angle of Departure
API
Application Programming Interface
APN
Access Point Name
AR
Augmented Reality
ARQ
Automatic Repeat Request
ARIB
Association of Radio Industries and Businesses
ARP
Allocation and Retention Policy
ARPC
Average Revenue Per Customer
ARPD
Average Revenue Per Device
ARPF
Authentication Credential Repository and Processing Function
ARPU
Average Revenue Per User
ARQ
Automatic Repeat Request
AS
Access Stratum
AS
Application Server
ASN.1
Abstract Syntax Notation Number 1
ATIS
Alliance for Telecommunications Industry Solutions
AUSF
Authentication Server Function
AV
Authentication Vector
BBF
Broad‐Band Forum
BCCH
Broadcast Control Channel
BCH
Broadcast Channel
BFD
Beam Failure Detection
BFI
Beam Failure Instance
BFR
Beam Failure Recovery
BG
Base Graph
BLE
Bluetooth Low Energy
BLER
Block Error Rate
BNG
Broadband Network Gateway
BPSK
Binary Phase Sift Keying BS
BS
Base Station
BSD
Bucket Size Duration
BSR
Buffer Status Report
BSIC
Base Station Identity Code
BSS
Base Station Subsystem
BTS
Base Transceiver Station
BWP
Bandwidth Part
CAPEX
Capital Expenditures
CBC
Cell Broadcast Centre
CBE
Cell Broadcast Entity
CBRA
Contention Based Random Access
CBS
Cell Broadcast Service
CC
Coverage Class
CCCH
Common Control Channel
CCE
Control Channel Element
CCSA
China Communication Standards Association
CDF
Charging Data Function
CDMA
Code Division Multiple Access
CDN
Content Delivery Network
CDR
Charging Data Record
CE
Coverage Enhancement
CE
Control Elements
CFRA
Contention Free Random Access
CGF
Charging Gateway Function
CHF
Charging Function
CIoT
Cellular IoT
C‐ITS
Cooperative Intelligent Transportation Systems
CK
Cyphering Key
CM
Connection Management
cmWave
centimeter Wave frequencies
cMTC
critical Machine Type Communication
CN
Core Network
CoMP
Coordinated Multipoint Transmission
CORESET
Control Resource Set
CP
Control Plane
CP
Cyclic Prefix
CPE
Customer Premises Equipment
CP‐OFDMA
Cyclic Prefix Orthogonal Frequency‐Division Multiple Access
CPRI
Common Public Radio Interface
CQI
Channel Quality Indicator
C‐RAN
Centralized RAN
CRC
Cyclic Redundancy Check
C‐RNTI
Cell Radio Network Temporary Identifier
CS
Circuit Switched
CSI
Channel State Information
CSI‐RS
Channel State Information Reference Signal
CSFB
Circuit‐Switched Fallback
CSS
Common Search Space
CU
Central Unit
CUPS
Control/User Plane Separation
DCCH
Dedicated Control Channel
DCI
Downlink Control Information
DECOR
Dedicated Core Network
DEI
Drop Eligible Indicator
DFT‐s‐OFDM
Discrete Fourier Transform‐spread‐OFDM
DHCP
Dynamic Host Configuration Protocol
DL
Downlink (Network to UE)
DMRS
Demodulation Reference Signal
DN
Data Network
DNAI
Data Network Access Identifier
DNN
Data Network Name
DoS
Denial of Service
DRB
Data Radio Bearer
DRX
Discontinuous Reception
DTCH
Dedicated Traffic Channel
DSL
Digital Subscriber Line
DU
Distributed Unit
E2E
End‐to‐End
EAB
Extended Access Barring
EAP
Extensible Authentication Protocol
EASE
EGPRS Access Security Enhancements
EC
European Commission
EC
Extended Coverage
EC‐GSM‐IoT
Extended Coverage for GSM based Internet of Things
eCPRI
enhanced CPRI
EC SI
Extended Coverage System Information
eDECOR
Enhanced Dedicated Core Network
EDGE
Enhanced Data Rates for GSM Evolution
eDRX
Extended idle mode DRX
EGPRS
Enhanced GPRS
EIR
Equipment Identity Register
EIRP
Equivalent Isotropic Radiated Power
eMBB
enhanced Mobile Broadband
EMM
EPS Mobility Management
EMSK
Extended Master Session Key
EN‐DC
E‐UTRAN ‐ New Radio ‐ Dual‐Connectivity
EPC
Evolved Packet Core
ePDG
Enhanced Packet Data Gateway
EPS
Evolved Packet System
E‐SIM
Embedded SIM
ESM
EPS Session Management
E‐SMLC
Enhanced SMLC
ETH
Ethernet
ETSI
European Telecommunications Standards Institute
EU
European Union
E‐UTRAN
Evolved Universal Mobile Telecommunications System Terrestrial RAN
eUTRAN
Evolved Universal Mobile Telecommunications System Terrestrial RAN
FAR
Forwarding Action Rule
FAR
False Alarm Rate
FCC
Federal Communications Commission
FCCH
Frequency Correction Channel
FDD
Frequency Division Duplex
FFT
Fast Fourier Transform
FH
Frequency Hopping
FMC
Fixed Mobile Convergence
FN
Frame Number
F‐OFDM
Filtered OFDM
FQDN
Fully Qualified Domain Name
FR
Frequency Range
FUA
Fixed Uplink Allocation
FWA
Fixed Wireless Access
GBR
Guaranteed Bitrate
GERAN
GSM / EDGE RAN
GFBR
Guaranteed Flow Bitrate
GGSN
Gateway GPRS Support Node
GMLC
Gateway Mobile Location Centre
gNB
Gigabit NodeB, Next Generation NodeB
GPRS
General Packet Radio Service
GPSI
Generic Public Subscription Identifier
GSM
Global System for Mobile communications
GSMA
GSM Association
GTP
GPRS Tunneling Protocol
GUAMI
Globally Unique AMF Identifier
GUTI
Globally unique temporary UE identity
HARQ
Hybrid Automatic Repeat Request
HBRT
Hardware‐Based Root of Trust
HD
High Definition
HLcom
High Latency Communication
HLR
Home Location Register
HLS
High‐Layer Split
HPLMN
Home PLMN
HR
Home Routed
HSDPA
High Speed Downlink Packet Access
HSPA
High Speed Packet Access
HSS
Home Subscriber Server
HSUPA
High Speed Uplink Packet Access
HTTP
Hypertext Transfer Protocol
HW
Hardware
I 4.0
Industry 4.0
IaaS
Infrastructure as a Service
ICT
Information and Communication Technology
ID
Identity
IETF
Internet Engineering Task Force
IK
Integrity Key
IKEv2
Internet Key Exchange Version 2
IMS
IP Multimedia Subsystem
IMSI
International Mobile Subscriber Identity
IMT
International Mobile Telecommunications
IMT‐2020
ITU‐R process for defining 5G IMT technologies
InH
Indoor Hotspot
IoT
Internet of Things
IP
Internet Protocol
IPR
Intellectual Property Rights
IPsec
Internet Protocol Security
IR
Incremental Redundancy
ISDN
Integrated Services Digital Network
ISG
Industry Specification Group
ISI
Inter Symbol Interference
ISM
Industrial Scientific and Medical
ITS
Intelligent Traffic Systems
ITU
International Telecommunications Union
ITU‐R
ITU Radiocommunication Sector
IWF
Interworking Function
IWK
Interworking
KPI
Key Performance Indicator
LADN
Local Area Data Network
LAI
Location Area Identity
LAN
Local Area Network
LBO
Local Breakout
LCG
Logical Channel Group
LCH
Logical Channel
LCP
Logical Channel Prioritization
LCS
Location Services
LDPC
Low‐Density Parity Check coding
LLR
Log‐Likelihood Ratio
LLS
Low‐Layer Split
LMF
Location Management Function
LOS
Line of Sight
LPWA
Low Power Wide Area
LRF
Location Retrieval Function
LSA
Licensed Shared Access
LSB
Least Significant Bit
LTE
Long Term Evolution
LTE‐M
LTE category M1
M2M
Machine to Machine
MAC
Media Access Control
MC
Multi‐Connectivity
MCS
Modulation and Coding Scheme
MBMS
Multimedia Broadcast / Multicast Service
MCC
Mobile Country Code
MCG
Master Cell Group
MCL
Maximum Coupling Loss
MDBV
Maximum Data Burst Volume
ME
Mobile Equipment
MEC
Multi‐Access Edge Computing
MeNB
Master eNB
METIS
Mobile and wireless communications Enablers for the Twenty‐twenty Information Society
MFBR
Maximum Flow Bitrate
MFCN
Mobile/Fixed Communication Network
MIB
Master Information Block
MIB‐NB
Master Information Block ‐ Narrowband
MICO
Mobile Initiated Communication Only
ML
Machine Learning
MM
Mobility Management
MME
Mobility Management Entity
mMIMO
massive Multiple‐Input‐Multiple‐Output
mmWave
millimeter Wave frequencies
mMTC
massive Machine Type Communication
MN
Master Node
MNC
Mobile Network Code
MNO
Mobile Network Operator
MOTD
Multilateration Observed Time Difference
MPDCCH
MTC Physical Downlink Control Channel
MR‐DC
Multi RAT Dual Connectivity
MS
Millisecond
MSB
Most Significant Bit
MSG1…4
Message 1 to 4 in RACH procedure
MSI
Minimum System Information
MSC
Mobile Switching Centre
MSISDN
Mobile Subscriber ISDN Number
MSK
Master Session Key
MTA
Multilateration Timing Advance
MTC
Machine Type Communication
N3IWF
Non‐3GPP Interworking Function
NaaS
Network as a Service
NACK
Negative Acknowledgement
NAI
Network Access Identifier
NAPS
Northbound API for SCEF ‐ SCS/AS Interworking
NAS
Non‐Access Stratum
NAT
Network Address Translation
NB‐IoT
Narrow Band IoT
NCC
Network Color Code
NE‐DC
NR E‐UTRAN ‐ Dual Connectivity
NEF
Network Exposure Function
NF
Network Function
NFV
Network Function Virtualization
NGAP
Next Generation Application Protocol
NGEN‐DC
Next Generation EN‐DC
NGMN
Next Generation Mobile Networks
NG‐RAN
Next Generation RAN
NIDD
Non‐IP Data Delivery
NLOS
Non‐Line of Sight
NPBCH
Narrowband Physical Broadcast Channel
NPDCCH
Narrowband Physical Downlink Control Channel
NPDSCH
Narrowband Physical Downlink Shared Channel
NPRACH
Narrowband Physical Random Access Channel
NPSS
Narrowband Primary Synchronization Signal
NPUSCH
Narrowband Physical Uplink Shared Channel
NPV
Net Present Value
NR
New Radio
NRF
Network Repository Function
NRT
Non‐Real Time
NS
Network Slice
NSA
Non‐Standalone
NSSAI
Network Slice Selection Assistance Information
NSSF
Network Slice Selection Function
NSSS
Narrowband Secondary Synchronization Signal
O&M
Operation and Maintenance
OA&M
Operations, Administration & Maintenance
OAM
Orbital Angular Momentum
OAuth
Open Authorization
OECD
Organization for Economic Co‐operation and Development
OFDM
Orthogonal Frequency‐Division Multiplexing
ONF
Open Networking Foundation
OPEX
Operating Expenses
OSI
Other System Information
OTT
Over‐the‐Top
PA
Power Amplifier
PaaS
Platform as a Service
PACCH
Packet Associated Control Channel
PAPR
Peak to Average Power Ratio
PBCH
Physical Broadcast Channel
PC
Personal Computer
PCA
Packet Control Acknowledgement
PCC
Policy and Charging Control
PCCH
Paging Control Channel
PCell
Primary Cell
PCF
Policy Control Function
PCH
Paging Channel
PCI
Physical Cell Identity
PCO
Protocol Configuration Options
PCP
Priority Code Point
PDB
Packet Delay Budget
PDCCH
Physical Downlink Control Channel
PDCP
Packet Data Convergence Protocol
PDN
Packet Data Network
PDP
Packet Data Protocol
PDSCH
Physical Downlink Shared Channel
PDTCH
Packet Data Traffic Channel
PDU
Protocol Data Unit
PEI
Permanent Equipment Identifier
PEO
Power Efficient Operation
PER
Packet Error Rate
PFCP
Packet Forwarding Control Protocol
PFD
Packet Flow Descriptor
P‐GW
PDN Gateway
PGW‐C
P‐GW Control Plane Function
PGW‐U
P‐GW User Plane Function
PH
Power Headroom
PHY
Physical Layer
PHR
Power Headroom Report
PICH
Paging Indication Channel
PLMN
Public Land Mobile Network
PMI
Precoding Matrix Indicator
PoC
Proof of Concept
PON
Passive Optical Network
PPDR
Public Protection and Disaster Relief
PRACH
Physical Random Access Channel
PRB
Physical Resource Blocks
P‐RNTI
Paging RNTI
PS
Packet Switched
PSA
PDU Session Anchor
PSCell
Primary Secondary Cell
PSD
Power Spectral Density
PSM
Power Save Mode
PSTN
Public Switched Telephone Network
PSS
Primary Synchronization Signal
PTW
Paging Time Window
PUSCH
Physical Uplink Shared Channel
PWS
Public Warning System
QAM
Quadrature Amplitude Modulation
QC‐LDPC
Quasi‐Cyclic LDPC
QFI
QoS Flow Identifier
QoE
Quality of Experience
QoS
Quality of Service
QPSK
Quaternary Phase‐Shift Keying
R
Code Rates in channel coding
RA
Routing Area
RA
Random Access
RACH
Random Access Channel
RAN
Radio Access Network
RAR
Random Access Response
RAT
Radio Access Technology
RAU
Routing Area Updating
RB
Radio Bearer
RCC
Radio Frequency Color Code
RDI
Reflective QoS flow to DRB mapping Indication
RDS
Reliable Data Service
RF
Radio Frequency
RFC
Request for Comments
RG
Residential Gateway
RI
Rank Indicator
RIT
Radio Interface Technology
RLC
Radio Link Control Protocol
RLF
Radio Link Failure
RM
Registration Management
RM
Reed‐Muller
RMSI
Remaining Minimum System Information
RNTI
Radio Network Temporary Identifier
RO
RACH Occasion
RoHC
Robust Header Compression
RQI
Reflective QoS Attribute
RQoS
Reflective QoS
RRC
Radio Resource Control Protocol
RSRP
Reference Signal Received Power
RSRQ
Reference Signal Received Quality
