5G Second Phase Explained -  - E-Book

5G Second Phase Explained E-Book

0,0
107,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

5G SECOND PHASE EXPLAINED A one-stop reference that offers an accessible guide to an understanding of the enhanced core technologies of 5G 5G Second Phase Explained - The 3GPP Release 16 Enhancements offers an authoritative and essential guide to the new functionalities of the Release 16 that complement the first phase of the 5G. From the author of 5G Explained comes the next step resource that includes detailed descriptions that provide a clear understanding to the full version of the 5G technologies and their impacts on the Phase 1 networks. The author--an industry expert--not only reviews the most up-to-date functionalities of the Release 16 but includes information on the forthcoming Release 17 as well as material on future developments. The book explores the highly unique aspects of the Release 16, which can help technical personnel's efforts to deliver essential information in a practical way. The two books, 5G Explained and 5G Second Phase Explained, offer a comprehensive understanding of 5G. This important guide: * Offers a summary of the newest and key features of 5G * Presents a one-stop reference for an understanding of the core technologies of 5G * Contains a new book that expands on the author's 5G Explained * Puts the focus on security and deployment aspects of 5G enhancements Written for technical personnel of network operators, network element and user device manufacturers, 5G Second Phase Explained offers a guide to an understanding of network deployment and device designing of 5G technologies.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 639

Veröffentlichungsjahr: 2021

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



5G Second Phase Explained

The 3GPP Release 16 Enhancements

 

Jyrki TJ. Penttinen

GSMA North America

 

 

This edition first published 2021

© 2021 John Wiley & Sons, Ltd.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available http://www.wiley.com/go/permissions.

The right of Jyrki T.J. Penttinen to be identified as the author of the editorial material in this work has been asserted in accordance with the law.

Registered Offices

John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA

John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

Editorial Office

The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats.

Limit of Liability/Disclaimer of Warranty

While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

Library of Congress Cataloging-in-Publication Data

Names: Penttinen, Jyrki, 1967- author. | John Wiley & Sons, Inc., publisher.

Title: 5G second phase explained : the 3GPP release 16 enhancements / Jyrki Teppo Juho Penttinen, GSMA North America.

Description: Hoboken, NJ : John Wiley & Sons, Inc., 2021. | Includes bibliographical references and index.

Identifiers: LCCN 2020047582 (print) | LCCN 2020047583 (ebook) | ISBN 9781119645504 (hardback) | ISBN 9781119645559 (pdf) | ISBN 9781119645535 (epub) | ISBN 9781119645566 (ebook)

Subjects: LCSH: 5G mobile communication systems. | Long-Term Evolution (Telecommunications).

Classification: LCC TK5103.25 .P46 2021 (print) | LCC TK5103.25 (ebook) | DDC 621.3845/6—dc23

LC record available at https://lccn.loc.gov/2020047582

LC ebook record available at https://lccn.loc.gov/2020047583

Cover image: © Nicomenijes/Getty Images

Cover design by Wiley

Set in 9.5/12.5pt STIX Two Text by Integra Software Services Pvt. Ltd, Pondicherry, India

Contents

Cover

Title page

Copyright

About the Author

Preface

Acknowledgments

List of Abbreviations

Chapter 1: Introduction

1.1 General

1.1.1 Focus of This Book

1.1.2 Generations

1.2 Principles of 5G

1.2.1 Open Source

1.2.2 Justifications for 5G

1.3 Standardization

1.3.1 Release 16 Key Features

1.3.2 The Phases of 5G

1.3.3 How to Find 5G-Related Specifications

1.3.4 Release 17

1.3.5 Later Phases and 6G

1.4 Introduction to the Book

Chapter 2: Requirements

2.1 Overview

2.2 Background

2.3 Development of the Ecosystem

2.3.1 New Needs

2.3.2 Enhanced 5G Functionality

2.4 Introduction to Requirements

2.5 World Radiocommunication Conference

2.6 Building Blocks of 5G: eMBB/URLLC/mMTC

2.7 5G Requirements of the ITU

2.7.1 Process

2.7.2 Documents

2.7.3 Peak Data Rate

2.7.4 Peak Spectral Efficiency

2.7.5 User Experienced Data Rate

2.7.6 Fifth Percentile User Spectral Efficiency

2.7.7 Average Spectral Efficiency

2.7.8 Area Traffic Capacity

2.7.9 Latency

2.7.10 Connection Density

2.7.11 Energy Efficiency

2.7.12 Reliability

2.7.13 Mobility

2.7.14 Mobility Interruption Time

2.7.15 Bandwidth

2.8 The Technical Specifications of the 3GPP

2.8.1 Releases

2.8.2 Security Requirements for 5G

2.9 Ngmn

2.9.1 User Experience

2.9.2 Device Requirements

2.9.3 Enhanced Services

2.10 Mobile Network Operators

2.11 Mobile Device Manufacturers

2.12 Consumer Requirements

2.13 Vertical Requirements

2.13.1 SME Business

2.13.2 Transport and Traffic

2.13.3 Health Care

2.13.4 Critical Infrastructure

2.13.5 Aviation and Drones

2.13.6 Virtual Reality

2.13.7 Other Verticals

Chapter 3: Phase 2 System Architecture and Functionality

3.1 Introduction

3.1.1 General

3.1.2 Release 16 Development

3.1.3 Radio Network

3.1.4 Core Network

3.1.5 Transport Network

3.1.6 5G NFs of Release 16

3.2 Release 16 Enhancements

3.2.1 LTE in Release 16

3.2.2 5G of Release 16

3.2.3 Fixed-Mobile Convergence

3.2.4 Control and User Plane Separation of EPC Nodes

3.2.5 Java and APIs in 5G

3.2.6 Identifiers

3.2.7 Multicast/Broadcast in 5G

3.3 5G Network Architecture in Release 16

3.3.1 System Architecture

3.3.2 Non-roaming Reference Architecture

3.3.3 Roaming Reference Architecture

3.3.4 Interworking with Non-3GPP Networks

3.3.5 5G User and Control Plane

3.3.6 Edge Computing

3.4 Dual Connectivity

3.4.1 Multi-radio Dual Connectivity with EPC

3.4.2 Multi-radio Dual Connectivity with 5GC

3.4.3 Dual Connectivity Network Interfaces

3.5 NG-RAN Architecture

3.5.1 Interfaces

3.5.2 Functions of gNB and ng-eNB

3.6 5G Interfaces and Reference Points

3.6.1 Service-Based Interfaces

3.6.2 Reference Points

3.7 IMS in 5G

Chapter 4: Phase 2 Radio Network and User Equipment

4.1 Overview

4.1.1 Key Specifications

4.1.2 Summary of Key Release 16 Enhancements

4.2 Radio Network

4.2.1 5G MIMO and Adaptive Antennas

4.2.2 5G Radio Access

4.2.3 5G gNB Functions

4.2.4 3GPP RAN Interfaces

4.2.5 The Split Architecture of RAN

4.2.6 IAB

4.2.7 5G Network Layers

4.2.8 IAB Protocol Stacks

4.3 User Equipment

4.3.1 Background

4.3.2 Terminal States

4.4 Cloud RAN

4.4.1 Introduction

4.4.2 Open RAN Terminology

4.4.3 Open RAN Alliance

4.4.4 Open RAN Reference Architecture

4.4.5 Logical Architecture of O-RAN

4.5 5G Spectrum

4.5.1 Advances of 5G Frequencies

4.5.2 ITU-R WRC-19 Results

4.5.3 RF Bands

4.6 5G Radio Aspects

4.6.1 Bandwidth

4.6.2 Duplex

4.6.3 SUL

4.6.4 Dynamic Spectrum Sharing

4.6.5 5G Antennas

4.6.6 Radio Performance

4.6.7 OFDM in Release 16

4.6.8 Modulation

4.6.9 Coding

4.6.10 OFDM

4.6.11 Modulation

4.6.12 Frame Structure

4.6.13 5G Channels

4.6.14 General Protocol Architecture

4.6.15 Physical Layer Procedures

4.6.16 Physical Layer Measurements

4.6.17 Quality of Service

Chapter 5: Core and Transport Network

5.1 Overview

5.1.1 The 5G Pillars

5.1.2 5G Core Network Services

5.2 Network Functions Virtualization

5.2.1 SDN

5.2.2 NFV

5.3 5G Cloud Architecture

5.3.1 Concept

5.3.2 Data Center as a Base for 5G Architecture

5.3.3 Network as a Service

5.4 Network Functions Overview

5.4.1 5G Release 15 and 16 Network Functions

5.4.2 5G Core Network Aspects

5.5 NFs Enhanced in Release 16

5.5.1 5G-EIR

5.1.2 AF

5.5.3 AMF

5.5.4 AUSF

5.5.5 LMF

5.5.6 N3IWF

5.5.7 NEF

5.5.8 NRF

5.5.9 NSSF

5.5.10 NWDAF

5.5.11 PCF

5.5.12 SEPP

5.5.13 SMF

5.5.14 SMSF

5.5.15 UDM

5.5.16 UDR

5.5.17 UDSF

5.5.18 UPF

5.6 Additional NFs of Release 16

5.6.1 CAPIF

5.6.2 GMLC

5.6.3 I-SMF and V-SMF

5.6.4 I-UPF

5.6.5 NSSAAF

5.6.6 SCP

5.6.7 TNGF

5.6.8 TWIF

5.6.9 UCMF

5.6.10 W-AGF

5.7 5GC Functionalities

5.7.1 Network Function Discovery

5.7.2 Network Slicing

5.8 Transport Network

5.9 IMS for 4G and 5G Voice Service

5.9.1 IMS Architecture

5.9.2 Voice Service

5.9.3 Roaming

5.9.4 Key Definitions

5.9.5 VoLTE Infrastructure Options

5.9.6 Fallback Mechanisms

5.9.7 Circuit-Switched Fallback

5.9.8 Single Radio Voice Call Continuity

5.9.9 Interworking in 4G/5G

5.9.10 Requirements for IMS Voice

Chapter 6: Release 16 Features and Use Cases

6.1 Introduction to Release 16 Use Cases

6.1.1 5G Pillars

6.1.2 Technical Reports as a Foundation

6.1.3 Use Cases Identified by Industry

6.1.4 Market Needs for Release 16

6.2 Use Cases for 5G Release 16

6.2.1 Network Slicing

6.2.2 Network Functions Virtualization

6.2.3 SDN

6.2.4 Use Cases for Cloud-Based Functions

6.2.5 Quality of Service

6.2.6 Session Continuity

6.2.7 IMS Voice Calls in 5G

6.2.8 SMS in 5G

6.2.9 Dual Connectivity

6.2.10 Network Exposure

6.2.11 Policy

6.2.12 Network Function Service Framework

6.3 5G Use Cases

6.3.1 Overview

6.3.2 Use Cases of 3GPP TR 22.891

6.3.3 The 3GPP Use Cases of SMARTER

6.3.4 Enhancement of Ultra-Reliable Low Latency Communications

6.3.5 5GS Enhanced Support of Vertical and LAN Services

6.3.6 Advanced V2X Support

6.3.7 Satellite Access in 5G

6.3.8 Wireless and Wireline Convergence Enhancement

6.3.9 Location-Based Services

6.3.10 Mission Critical Services

6.3.11 Public Warning System

6.3.12 Streaming and TV

6.3.13 Cloud-Based Functions and Edge

6.3.14 Virtual Reality, Augmented Reality, and Extended Reality

6.3.15 SON

6.3.16 Support for Energy Saving

6.3.17 Enablers for Network Automation Architecture for 5G

6.3.18 5G Voice

6.3.19 Sidelink

6.3.20 Verticals Support

6.3.21 Non-public Networks

6.4 Release 17 and Beyond

6.4.1 Drones (Unmanned Aerial System)

6.4.2 MBMS

6.4.3 Machine Learning and Artificial Intelligence

6.4.4 Use Cases of 6G

Chapter 7: Security

7.1 Overview

7.1.1 5G Security Architecture

7.1.2 Security Functions

7.1.3 Enhanced 5G Security

7.2 5G Network Security Procedures

7.2.1 Keys in 5G

7.2.2 5G Identifiers

7.2.3 Network Key Storage and Procedures

7.2.4 5G Key Derivation

7.2.5 Security Aspects of Network Slicing

7.3 SIM in the 5G Era

7.3.1 Background

7.3.2 UICC Profiles in 5G

7.3.3 Changes in Authentication

7.3.4 SIM Evolution

7.3.5 eSIM

7.3.6 eSIM Architecture

7.3.7 Technical Solution

7.3.8 Security Certification of 5G SIM and Subscription Management

7.4 Other Security Aspects

7.4.1 Security Certification of Data Centers

7.4.2 GSMA Security Controls

Chapter 8: 5G Network Planning and Optimization

8.1 Network Design Principles

8.1.1 Introduction

8.1.2 Base Architectural Models

8.1.3 3GPP Split Options

8.1.4 Deployment Scenarios of ETSI

8.2 5G Radio Network Planning

8.2.1 Overview

8.2.2 Radio Channel Modeling

8.2.3 5G Radio Link Budget Considerations

8.2.4 5G Radio Link Budget in Bands Above 6 GHz

8.2.5 Sidelink Deployment Scenarios

8.3 RAN Deployment

8.3.1 O-RAN Deployment Scenarios

8.3.2 3GPP Functional Split Options of 5G

8.4 5G Core Network Planning

8.4.1 Overall Considerations

8.4.2 Virtualization

8.4.3 MEC

8.4.4 Transport Network Considerations

8.4.5 Deployment Options of ITU

8.4.6 Dimensioning of the Core and Transport

8.5 Network Slice Planning

8.5.1 Overview

8.5.2 Network Slice Ecosystem Roles

8.5.3 Network Slice Planning Principles

8.5.4 Network Slice Templates of the GSMA

8.5.5 Network Slice as a Service

8.5.6 Network Slice Management

8.6 EMF Considerations

8.6.1 Safety Regulation

8.6.2 Scientific Understanding

8.6.3 Safety Distance

8.6.4 Snapshot of Studies

8.7 5G Measurements and Analytics

8.7.1 Key Measurement Types

8.7.2 In-Built Network Analytics

8.7.3 Minimization of Drive Tests

Appendix

Index

End User License Agreement

List of Tables

Chapter 1

Table 1.1 Some of the key entities standardizing or contributing to 5G ev...

Table 1.2 Some of the key features of 3GPP Release 16.

Chapter 2

Table 2.1 Key requirements of the ITU IMT-2020, based on M.2083 [7].

Table 2.2 Description of 5G dimensions.

Table 2.3 Key 5G documents and specifications of the 3GPP.

Table 2.4 Some of the 5G-related Permanent Reference Documents (PRDs)...

Table 2.5 NGMN Alliance’s device requirements.

Table 2.6 Some potential uses of 5G for consumers.

Chapter 3

Table 3.1 The key components of 5G, and mapping with the 4G LTE system.

Table 3.2 Terminology for 5G NodeB variants as per Release 16 3GPP TS...

Table 3.3 Release 16 service-based interfaces of the 5G system. Please...

Table 3.4 Release 16 service-based reference points of the 5G system.

Table 3.5 Reference points and SBA interfaces for IMS support.

Chapter 4

Table 4.1 Some of the key technical specifications of the 3GPP NR inter...

Table 4.2 The key 3GPP TR detailing 5G-specific Radio Frequency (RF) ba...

Table 4.3 Key functionalities of 5G gNB and ng-eNB as interpreted from...

Table 4.4 5G NR-RAN interfaces of Release 16 as per 3GPP TS 38.401...

Table 4.5 Some of the key 5G specifications describing the UE

Table 4.6 The 3GPP frequency bands and frequency ranges for the LTE as in...

Table 4.7 The NR bands and frequency ranges as interpreted from 3GPP TS 38...

Table 4.8 3GPP Release 16 5G frequency range definitions. Please note that...

Table 4.9 The key characteristics of the 4G and 5G radio interface.

Table 4.10 The modulation schemes of 5G.

Chapter 5

Table 5.1 The Release 15 NFs.

Table 5.2 The additional NFs presented in Release 16.

Table 5.3 The IMS core elements. Please refer to Figures 5.34 and 5.35 for...

Table 5.4 The additional elements that can be deployed to support VoLTE...

Chapter 6

Table 6.1 C-IoT categories for LTE.

Table 6.2 The comparison of E-SMLC and SLP.

Chapter 7

Table 7.1 The interfaces of 3GPP security architecture [1].

Table 7.2 The 5G keys.

Table 7.3 5G keys and their respective storage and procedures

Chapter 8

Table 8.1 Summary of 4G and 5G deployment options as defined in 3GPP TS...

Table 8.2 The principle of the DL RLB.

Table 8.3 The principle of the UL RLB.

Table 8.4 Summary of the selected mmWave propagation studies [13].

Table 8.5 Summary of the 5G split options as interpreted from 3GPP TR 38....

Table 8.6 The main tasks of the protocol layers of the 5G RAN.

Table 8.7 The roles of the RU, DU, and CU.

Table 8.8 The roles in the network slicing ecosystem.

Table 8.9 Example of an NEST for URRLC as per GSMA PRD NG.116 V3.0 [37].

Table 8.10 Resources for additional information on health aspects.

Table 8.11 Examples of 5G measurement equipment

Appendix

Table 1 Snapshot of the 3GPP Technical Specifications (TS) and Technical Reports (TR)...

List of Illustrations

Chapter 1

Figure 1.1 Mobile generations vs. downlink data speed evolution.

Figure 1.2 Key functionalities of 5G.

Figure 1.3 Forecast of the share of the utilization of 2G, 3G, 4G, and...

Figure 1.4 The timeline for 3GPP 5G, Release 16 and beyond [23, 24], a...

Figure 1.5 Template of 3GPP TS and TR.

Figure 1.6 3GPP Release roadmap towards 6G.

Figure 1.7 Contents of this book.

Chapter 2

Figure 2.1 5G dimensions and their capabilities as per the ITU IMT-2020. A...

Figure 2.2 The building blocks of 5G. eMBB, URLLC, and mMTC are the main d...

Figure 2.3 The 5G network can provide feasible control and communications...

Chapter 3

Figure 3.1 Mapping of the key 4G and 5G elements. Releases 15 and 16 bring...

Figure 3.2 Principle of fixed wireless convergence [8].

Figure 3.3 Reference point presentation of the 5G system architecture for...

Figure 3.4 Non-roaming 5G system architecture, presented via service-based...

Figure 3.5 Reference point format of the non-roaming architecture for the...

Figure 3.6 An example of the 5G architecture in a roaming case, presented...

Figure 3.7 5G core network architecture for non-roaming via non-3GPP acc...

Figure 3.8 Non-roaming architecture for interworking between 5G system...

Figure 3.9 The principle of the 5G NG and Uu UP [16].

Figure 3.10 The CP for Uu and NG.

Figure 3.11 The high-level EN-DC architecture.

Figure 3.12 5G Multi-radio access technology DC.

Figure 3.13 CP connectivity for EN-DC and MR-DC with 5GC.

Figure 3.14 UP connectivity for EN-DC and MR-DC with 5GC.

Figure 3.15 The overall 5G architecture in Releases 15 and 16 as defined...

Figure 3.16 System architecture to support SBA in the IMS.

Figure 3.17 System architecture to support SBA in the IMS in reference p...

Figure 3.18 The IMS call scenario in visited and home 5G network use cas...

Chapter 4

Figure 4.1 The protocol stacks for NG and Xn interfaces.

Figure 4.2 The high-level split architecture of the 5G gNB [12].

Figure 4.3 The functional split of UP and CP in gNB based on DU, as per...

Figure 4.4 The IAB architecture of Release 16 5G [12].

Figure 4.5 The high-level 5G UP and CP protocols.

Figure 4.6 The frame structure of the RLC and PDCP.

Figure 4.7 Protocol stack for F1-U of IAB.

Figure 4.8 Protocol stack for F1-C of IAB.

Figure 4.9 Protocol stack for IAB F1-C traffic delivered via the MeNB.

Figure 4.10 The state model for 4G and 5G systems as interpreted from...

Figure 4.11 Cloud-based 5G RAN architecture model.

Figure 4.12 The principle of C-RAN and C-Core of 5G.

Figure 4.13 Open RAN architecture as interpreted from the O-RAN Alli...

Figure 4.14 The 5G gNB protocol stack of the O-RAN model.

Figure 4.15 The logical architecture of the O-RAN.

Figure 4.16 The 3GPP split model for DU and CU.

Figure 4.17 The low and mid-bands of 5G and their bandwidths. The wi...

Figure 4.18 The high bands of 5G. These are the new mmWave blocks ...

Figure 4.19 Logical and transport channel mapping in 5G [42].

Figure 4.20 The principle of mapping 5G channels.

Chapter 5

Figure 5.1 The principle of NFV.

Figure 5.2 The principle of SDN and comparison with a traditional...

Figure 5.3 The 5G NFs in 3GPP Release 15 and 16 networks.

Figure 5.4 The interfaces of the AMF.

Figure 5.5 The interfaces of the AUSF.

Figure 5.6 The interfaces of the LMF.

Figure 5.7 The interfaces of the N3IWF.

Figure 5.8 The interfaces of the NEF.

Figure 5.9 The interfaces of the NRF (which can be divided into home...

Figure 5.10 The interfaces of the NSSF.

Figure 5.11 The interfaces of the NWDAF.

Figure 5.12 The interfaces of the PCF.

Figure 5.13 The principle of the SEPP for interconnecting 3GPP networks.

Figure 5.14 The interfaces of the SMF. Please note that the SMF also...

Figure 5.15 The protocols for the N1 mode used in 5G SMS delivery.

Figure 5.16 A conceptual example of UDM deployment.

Figure 5.17 The interfaces of the UDR.

Figure 5.18 The interfaces of the UDSF. It is an optional functiona...

Figure 5.19 The interfaces of the UPF.

Figure 5.20 The 3GPP northbound interface.

Figure 5.21 The goal of the 3GPP is to unify the northbound interface.

Figure 5.22 A reference point architecture for the 5G location servi...

Figure 5.23 Redundant transmission with two N3 tunnels between the PSA...

Figure 5.24 Two N3 and N9 tunnels between the NG-RAN and PSA UPF for...

Figure 5.25 Non-roaming and LBO roaming architecture for supporting...

Figure 5.26 The principle of network slicing in core network deployment.

Figure 5.27 Example of the network slice set and cloud implementation.

Figure 5.28 The principle of service assurance for 5G network slicing.

Figure 5.29 The principle of network slicing in 5G.

Figure 5.30 Network slice forms virtual networks optimized for diffe...

Figure 5.31 The groups A, B, and C to support multiple network slices...

Figure 5.32 Principle of the 5G-XHaul CP.

Figure 5.33 Example of 5G-XHaul UP deployment.

Figure 5.34 The conceptual presentation of the main IMS components that...

Figure 5.35 VoLTE configuration.

Figure 5.36 The S8HR roaming architecture.

Figure 5.37 The connectivity between 4G, 3G, and 2G.

Figure 5.38 The principle of CSFB from 4G to 2G and 3G.

Figure 5.39 The principle of SRVCC from 4G to 2G/3G. The MSC Server in...

Figure 5.40 The principle of SRVCC from 5G to 3G.

Figure 5.41 5G interworking architecture as defined by the 3GPP.

Figure 5.42 The principle of IMS interconnection for 4G and 5G networks.

Chapter 6

Figure 6.1 The principle of the NFV concept.

Figure 6.2 Principle of 5G SSC modes.

Figure 6.3 Use cases as identified from 3GPP TR 22.891 [1].

Figure 6.4 Potential use cases as identified in TR 22.891 continued [1]...

Figure 6.5 Local switch-based user plane architecture in a non-roaming...

Figure 6.6 N19-based user plane architecture in a non-roaming scenario.

Figure 6.7 5G serves as a platform for vehicle communications.

Figure 6.8 Example of the NTN as per 3GPP TR 38.811 [21].

Figure 6.9 Non-roaming architecture of the 5G core network when the Fi...

Figure 6.10 Non-roaming architecture for a 5G core network with truste...

Figure 6.11 The merging of 5G and TSNs can benefit industrial verticals.

Figure 6.12 The logical TSN bridge as interpreted from 3GPP TS 23.501.

Figure 6.13 5G positioning architecture.

Figure 6.14 NG-RAN architecture supporting the PC5 interface as interpr...

Chapter 7

Figure 7.1 3GPP system security architecture for 5G.

Figure 7.2 5G network functions related to security (highlighted). Rel...

Figure 7.3 The 5G key hierarchy as interpreted from 3GPP TS 33.501 [1]....

Figure 7.4 The 5G key derivation as interpreted from 3GPP TS 33.501, R...

Figure 7.5 The removable, plug-in UICC FFs are also valid in the 5G era.

Figure 7.6 Some examples of eUICC elements.

Figure 7.7 UICC variants and respective commercial timelines.

Figure 7.8 Remote SIM provisioning system, LPA in the device [12].

Figure 7.9 Remote SIM provisioning system, LPA in the eUICC [12].

Chapter 8

Figure 8.1 Release 15 5G architecture. Radio access can take place via...

Figure 8.2 The Standalone (SA) and Non-Standalone (NSA) 4G/5G deployme...

Figure 8.3 4G EPC supports 5G connectivity by dividing the S-GW and P-...

Figure 8.4 Example of deployment of logical gNB/en-gNB as interpreted ...

Figure 8.5 The principle of the 5G RLB. The maximum coverage area depe...

Figure 8.6 The evolution of traditional site deployment relying on a c...

Figure 8.7 Principle of the 5G RLB parameters.

Figure 8.8 The principle of SUL.

Figure 8.9 The sideline communication scenarios as interpreted from TS...

Figure 8.10 Cloud deployment scenarios as interpreted from the guideli...

Figure 8.11 5G brings more diverse split options for the network compo...

Figure 8.12 The split options of 5G as per the definitions of the 3GPP...

Figure 8.13 MEC mapping with 5G architecture as interpreted from Ref....

Figure 8.14 The principle of GST and NEST [38].

Figure 8.15 The stages of the life cycle for network slicing management.

Figure 8.16 The spectrum and its typical sources and applications [40].

Figure 8.17 The received power from the base station decreases quickly...

Figure 8.18 The principle of MDT reporting.

Guide

Cover

Title page

Copyright

Table of Contents

About the Author

Preface

Acknowledgments

List of Abbreviations

Begin Reading

Appendix

Index

End User License Agreement

Pages

i

ii

iii

iv

v

vi

vii

viii

ix

x

xi

xii

xiii

xiv

xv

xvi

xvii

xviii

xix

xx

xxi

xxii

xxiii

xxiv

xxv

xxvi

xxvii

xxviii

xxix

xxx

xxxi

xxxii

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

About the Author

Dr Jyrki T.J. Penttinen, the author of 5G Second Phase Explained, started his activities in the mobile communications industry in 1987 by evaluating 1G and 2G radio networks. After he obtained his MSc (EE) grade from the Helsinki University of Technology (HUT) in 1994, he worked for Telecom Finland (Sonera and TeliaSonera Finland) and Xfera Spain (Yoigo) on 2G and 3G radio and core network architectures and performance aspects. In 2002 he established Finesstel Ltd, carrying out consultancy and technical training projects in Europe and the Americas during 2002–2003. Afterwards, he worked for Nokia and Nokia Siemens Networks in Mexico, Spain, and the United States from 2004 to 2013. During this time with mobile network operators and equipment manufacturers, Dr Penttinen was involved in operational and research activities related to system and architectural design, standardization, training, and technical management. His focus was on the radio interface of GSM, GPRS/EDGE, UMTS/HSPA, and DVB-H. From 2014 to 2018, in his position as program manager with G+D Mobile Security Americas, USA, his focus areas included mobile and IoT security and innovation with a special emphasis on 5G.

Since 2018, he has worked for GSMA North America as Senior Technology Manager assisting operator members with the adoption, design, development, and deployment of GSMA specifications and programs.

Dr Penttinen obtained his LicSc (Tech) and DSc (Tech) degrees from HUT (currently known as Aalto University, School of Science and Technology) in 1999 and 2011, respectively. In addition to his main work, he has given lectures and authored technical articles and books such as 5G Explained (2019), Wireless Communications Security (2017), The LTE-Advanced Deployment Handbook (2016), The Telecommunications Handbook (2015), The LTE/SAE Deployment Handbook (2011), and The DVB-H Handbook (2009). More information on his publications and articles can be found at his LinkedIn profile, www.linkedin.com/in/jypen, and at his author’s page at Amazon, www.amazon.com/author/jype.

Preface

5G has been a reality since 2019, after some early deployments of isolated 5G networks that were already partially compliant with the 3GPP technical standards. Since the publication of the very first complete set of Release 15-based 5G standards, the number of 5G radio networks has been increasing steadily. According to the forecast of the GSMA, 5G will account for as many as 1.2 billion connections by 2025. Along with the Release 16 standards that the 3GPP released in 2020, we can start enjoying gradually the full 5G experience with fast deployment of advanced features.

My previous 5G Explained book from Wiley, published in 2019, described the key functionalities as per 3GPP Release 15, a.k.a. the first phase of 5G with the focus on security and deployment aspects. Release 15 forms a foundation for 5G and facilitates fast deployment via many intermediate architectural options, while Release 16 makes 5G fully equipped with a variety of enhanced features and functions.

As can be interpreted from the accelerated development schedules of the 5G era, mobile communication technologies evolve faster than ever. Along with such important additions of Release 16, this new book thus complements the foundations laid down by the previous 5G Explained book, including key descriptions of the features defined in the second phase of 5G. The focus of this book is on new key use cases, enhanced security, and deployment aspects. These two books serve as a complementing set of references and form an up-to-date resource for demystifying 5G architecture and functions.

These 5G Explained books thus summarize the latest knowledge regarding the key features and functionality of the first and second phases of 5G, and provides readers with a common-sense summary of specifications and other information sources. I believe this modular approach is beneficial for network deployment, device designing, and education of personnel and students interested in telecommunication domains.

As has been the case with my previous books published by Wiley, I would highly appreciate all your feedback. For any questions and feedback, please do not hesitate to contact me directly via my LinkedIn profile at www.linkedin.com/in/jypen, and please feel free to comment on my related 5G blog at www.5g-simplified.com, which I use to summarize related updates of selected topics of these 5G Explained books.

Jyrki PenttinenAtlanta, GA, US

Acknowledgments

This book is a result of countless hours I have spent exploring 3GPP specifications and other relevant information sources to better understand the up-to-date architecture, functioning, and principles of the 5G system. Because the new representative of mobile generations has advanced at such a fast pace, the task has been highly fascinating yet challenging, especially the balancing of time. I thus want to express my warmest thanks for all the support and patience I have received from my wife Celia as well as my close family, Katriina, Pertti, Stephanie, Carolyne, and Miguel. I am also most thankful for the support of my colleagues and peers as well as all those who have provided me with feedback to my publications.

I also want to express my warmest gratitude to the Wiley team for their professional but gentle approach, which has ensured the successful delivery of this book.

Jyrki PenttinenAtlanta, GA, US

Abbreviations

1G

1st generation of mobile communication systems

2G

2nd generation of mobile communication systems

3G

3rd generation of mobile communication systems

3GPP

3rd Generation Partnership Project

4G

4th generation of mobile communication systems

5G

5th generation of mobile communication systems

5GC

5G Core

5GS

5G System

5WWC

Wireless and Wireline Convergence for 5G system architecture

A/D

Analogue to Digital

AAA

Authentication, Authorization, and Accounting

AAA-P

AAA Proxy

AAA-S

AAA Server

AAS

Active Antenna System

ADAS

Advanced Driver Assistance System

AES

Advanced Encryption Standard

AF

Application Function

AGW

Access Gateway (IMS)

AI

Artificial Intelligence

AKA

Authentication and Key Agreement

AL

Application Layer (SMS)

ALG

Application Level Gateway (IMS)

AM

Acknowledged Mode

AMF

Access and Mobility Management Function

AMPS

Advanced Mobile Phone Service (1G)

AN

Access Network

ANR

Automatic Neighbor Cell Relation

AoA

Angle of Arrival

AoD

Angle of Departure

API

Access Point Identifier

API

Application Programming Interface

APN

Access Point Name

AR

Augmented Reality

ARP

Allocation and Retention Priority

ARPF

Authentication Credential Repository and Processing Function

AS

Access Stratum

AS

Application Server

ATSSS

Access Traffic Steering, Switch and Splitting

AUSF

Authentication Server Function

BBF

Broadband Forum

BBU

Baseband Unit

BER

Bit Error Rate

BGCF

Breakout Gateway Control Function

BH

Backhaul

BL

Bandwidth reduced Low complexity UE

BRG

Broadband Residential Gateway (5G)

BSS

Business Support System

C2

Command and Control

CA

Carrier Aggregation

CAG

Closed Access Group

CAM

Cooperative Awareness Message

CAPEX

Capital Expenditure

CAPI

Common north-bound APIs (EPC-5GC)

CAPIF

Common API Framework for 3GPP northbound APIs

CAS

Cell Acquisition Subframe

C-Core

Cloud Core

cdma2000

Code Division Multiple Access 2000 (3G)

CDR

Charging Data Record

CHEM

Coverage and Handoff Enhancements for Multimedia

CHF

Charging Function

CI

Certificate Issuer

C-IoT

Cellular IoT

CM sub

Connection Management Sublayer

CM

Connection Management

CMAS

Commercial Mobile Alert System

CO

Cloud Orchestrator

CoMP

Coordinated Multi-Point

CORD

Central Office Re-architected as Data Center

COTS

Commercial Off-the-Shelf

COUNT

Counter (security sequence)

CP

Control Plane

CP

Control Protocol (SMS)

CPA

Certified Public Accountants

CPC

Cyber-Physical Control

CPRI

Common Public Radio Interface

C-RAN

Cloud RAN

CRG

Cable Residential Gateway (5G)

CriC

Critical Communications

CS

Circuit Switched

CSC

Communication Service Customer

cSEPP

Consumer’s SEPP

CSFB

Circuit-Switched Fallback

CSI

Channel-State Information

CSI-RS

Channel-State Information Reference Signal

CSP

Communication Service Provider

CU

Centralized Unit

CU-CP

Centralized Unit, Control Plane

CUPS

Control and User Plane Separation

CU-UP

Centralized Unit, User Plane

CU-UP

CU User Plane

C-V2X

Cellular V2X

C-V2X

Cellular Vehicle-to-Everything

CWDM

Coarse Wavelength Division Multiplexing

D/A

Digital to Analogue

D2D

Device-to-Device

DANOS

Disaggregated Network Operating System

DAPS HO

Dual Active Protocol Stack-based Handover

DC

Dual Connectivity

DCSP

Data Centre Service Provider

DFT-s-OFDM

Discrete Fourier Transform spread OFDM

DL

Downlink

DLDC

Downlink Dual Carrier

DLOA

Digital Letter of Approval

DMRS

Demodulation Reference Signal

DN

Data Network

DNN

Data Network Name

DNS

Dynamic Name Server

DRB

Data Radio Bearer

DRX

Discontinuous Reception

DSF

Data Storage Function

DSS

Dynamic Spectrum Sharing

DU

Distributed Unit

DWDM

Dense Wavelength Division Multiplexing

E CID

Enhanced Cell ID

EAP

Extensible Authentication Protocol

EC-GSM-IoT

Extended Coverage GSM IoT

eCPRI

Evolved Common Public Radio Interface

eDual

Enhanced Dual Connectivity

EE

Energy Efficiency

EIR

Equipment Identity Register

eLCS

Enhanced Location Service

eMBB

Evolved Mobile Broadband

eMBMS

Evolved MBMS

eMIMO

Enhanced MIMO

eNB

Evolved NodeB (4G)

EN-DC

E-UTRA–NR Dual Connectivity

en-gNB

5G-RAN node for the EN-DC

ENUM

Electronic Number Mapping System

EPC

Evolved Packet Core (4G)

EPS

Evolved Packet System (4G)

ER

EAP Re-authentication

eSIM

Embedded SIM

E-SMLC

Evolved Serving Mobile Location Centre

eSSP

Embedded Smart Secure Platform

ETN

Edge Transport Node

ETSI

European Telecommunication Standards Institute

eUICC

Embedded UICC

EUM

eUICC Manufacturer

E-UTRA

Evolved UMTS Terrestrial Radio Access (4G)

eV2X

Enhanced Vehicle-to-Everything

FB

Fallback

FCC

Federal Communications Commission (USA)

FDA

Food and Drug Administration (USA)

FDD

Frequency Division Duplex

FEC

Forward Error Coding

FeMBMS

Further Enhanced MBMS

FF

Form Factor (SIM)

FH

Fronthaul

FMC

Fixed-Mobile Convergence (BBF)

FN-BRG

Fixed Network Broadband Residential Gateway (5G)

FN-CRG

Fixed Network Cable Residential Gateway (5G)

FN-RG

Fixed Network Residential Gateway (5G)

FQDN

Fully Qualified Domain Name

FR1

Frequency Range 1

FR2

Frequency Range 2

FRMCS

Mobile Communications System for Railways

FWA

Fixed Wireless Access

GBR

Guaranteed Bit Rate

GMLC

Gateway Mobile Location Centre

GMT

Group Message Delivery

gNB

Next Generation NodeB (5G)

GNSS

Global Navigation Satellite System

GPRS

General Packet Radio Service

GPS

Global Positioning System

GPSI

Generic Public Subscription Identifier

gPTP

Generalized Precision Timing Protocol

GSA

Global Mobile Suppliers Association

GSM

Global System for Mobile Communications (2G)

GSMA

GSM Association

GSM-R

GSM Railway

GST

Generic Network Slice Template

GUAMI

Globally Unique AMF Identifier

GUTMA

Global UTM Association

HAP

High Altitude Platform

HARQ

Hybrid Automatic Repeat Request

HB

High Band

HD

High Definition

HIBS

High Altitude IMT Base Stations

HLS

High Layer Split

HO

Handover

HPLMN

Home Public Land Mobile Network

HR

Home Routed

hSEPP

Home Security Edge Protection Proxy

HSPA

High Speed Packet Access (3G)

HSS

Home Subscription Server

HTTP

Hypertext Transfer Protocol

HW

Hardware

IAB

Integrated Access and Backhaul

IAB-MT

Mobile Terminating Integrated Access and Backhaul

IATN

Inter-Area Transport Node

IBCF

Interconnection Border Control Function

ICI

Inter-Carrier Interference

I-CSCF

Interrogating Call Session Control Function

IEEE

Institute of Electrical and Electronics Engineers

IETF

Internet Engineering Task Force

I-IoT

Industrial IoT

IKE

Internet Key Exchange

IMEI

International Mobile Equipment Identity

IMPI

IP Multimedia Private Identity

IMPU

IP Multimedia Public Identity

IMS

IP Multimedia Subsystem

IMSI

International Mobile Subscriber Identity

IMT

International Mobile Telecommunication

IMT-2000

International Mobile Telecommunications (3G)

IMT-2020

International Mobile Telecommunications (5G)

IMT-Advanced

International Mobile Telecommunications (4G)

IoT

Internet of Things

IP

Internet Protocol

IPUPS

Inter-PLMN UP Security

IPX

Internet Protocol Packet Exchange

IS-95

Interim Standard (2G)

ISD

Inter-Site Distance

ISI

Inter-Symbol Interference

I-SMF

Intermediate SMF

iSSP

Integrated Smart Secure Platform

ITU

International Telecommunications Union

ITU-R

Radio section of the International Telecommunications Union

ITU-T

Telecommunications section of the International Telecommunications Union

I-UPF

Intermediate UPF

JTACS

Japan Total Access Communications System (1G)

KDF

Key Derivation Function

KPI

Key Performance Indicator

LAA

Licensed Assisted Access

LAN

Local Area Network

LB

Low Band

LBO

Local Breakout

LBS

Location-Based Service

LCS

Location Service

LDPC

Low-Density Parity Check

LDS

Local Discovery Service

LDSd

LDS in device

LI

Lawful Interception

LMF

Location Management Function

LOS

Line Of Sight

LPA

Local Profile Assistant

LPAd

LPA in device

LPD

Local Profile Download

LPDd

LPD in device

LPLT

Low Power Low Tower

LPWA

Low-Power Wide Area

LTE

Long Term Evolution (4G)

LTE-A

LTE-Advanced (4G)

LUI

Local User Interface

LUId

LUI in device

M2M

Machine-to-Machine

MAP

Mobile Application Part

MB

Mid-Band

MBMS

Multimedia Broadcast Multicast Service

MC

Mission Critical

MC

Multi-Carrier

MCC

Mobile Country Code

MCData

Mission Critical Data

MCE

Mobile Cloud Engine

MCG

Master Cell Group

MCPPT

Mission-Critical Push-to-Talk

MCS

Modulation and Coding Scheme

MCVideo

Mission Critical Video

MCX

Mission Critical Service

MDT

Minimization of Drive Tests

ME

Mobile Equipment

MEC

Mobile-Edge Computing

MeNB

Master eNB

MeNB

See MN

MGCF

Media Gateway Control Function (IMS)

MGW

Media Gateway (IMS)

MIMO

Multiple In, Multiple Out

mIoT

Massive IoT

MIoT

Mobile IoT (combined NB-IoT and LTE-M)

ML

Machine Learning

MME

Mobility Management Entity

MMF2

Machine-to-Machine Form Factor

mMTC

Massive Machine Type Communications

MMtel

Multimedia Telephony Service

MN

Master Node

MNC

Mobile Network Code

MNO

Mobile Network Operator

MO

Mobile Originated

MOCN

Multi-Operator Core Network

MO-EDT

Mobile Originated Early Data Transmission

MPMT

Medium Power Medium Tower

MPS

Multimedia Priority Service

MR

Multi-Radio

MRB

Media Resource Broker

MRCP

Media Resource Function Processor

MR-DC

Multi-RAT Dual Connectivity

MRF

Media Resource Function

MRFC

Media Resource Function Controller

MS

Mobile Station

MSC

Mobile Switching Center

MSIN

Mobile Subscriber Identification Number

MSISDN

Mobile Station ISDN Number

MSR

Multi-Standard Radio specifications

MT

Mobile Terminal

MT

Mobile Terminated

MTC

Machine Type Communications

MTSI

Multimedia Telephony Service for IMS

MU-MIMO

Multi-User MIMO

N3IWF

Non-3GPP Interworking Function

N5CW

Non-5G-Capable over WLAN

NaaS

Network as a Service

NAI

Network Access Identifier

NAS

Non-access Stratum

NB

NodeB

NBI

Northbound Interface

NB-IoT

Narrow-Band IoT

NCC

Next Hop Chaining Counter

NCR

Neighbor Cell Relations

NE-DC

NR–E-UTRA Dual Connectivity

NEF

Network Exposure Function

NEO

Network Operations

NEP

Network Equipment Provider

NEST

Network Slice Type

NF

Network Function

NFV

Network Functions Virtualization

NFVI

Network Function Virtualization Infrastructure

NG-AP

NG Application Protocol

NGC

Next Generation Core (5G)

ng-eBB

5G Next Generation NodeB (enhanced 4G eNodeB)

NGEN-DC

NG-RAN–E-UTRA-NR Dual Connectivity (also: NE-DC)

NGFI

Next Generation Fronthaul Interface

NGMN

Next Generation Mobile Network

NG-RAN

Next Generation Radio Access Network (5G)

NH

Next Hop

NID

Network Identifier

NIDD

Non-IP Data Delivery

NLOS

Non-line Of Sight

NMO

Network Management and Orchestration

NMT

Nordic Mobile Telephone (1G)

NNI

Network-Network Interface

NOMA

Non-orthogonal Multiple Access

NOP

Network Operator

NPN

Non-public Network

NR

New Radio (5G)

NR-DC

NR–NR Dual Connectivity

NRF

Network Repository Function

NRT

Non-real Time

NR-U

NR on Unlicensed spectrum (5G)

NS

Network Slicing

NSA

Non-standalone

NSaaS

Network Slice as a Service

NSaaSC

NSaaS Customer

NSaaSP

NSaaS Provider

NSC

Network Slice Customer

NSI

Network Slice Instance

NSP

Network Slice Provider

NSSAA

Network Slice Specific Authentication and Authorization

NSSAAF

Network Slice Specific Authentication and Authorization Function

NSSAI

Network Slice Selection Assistance Information

NSSF

Network Slice Selection Function

NTN

Non-terrestrial Network

NTP

National Toxicology Program (USA)

NWDA

Network Data Analytics

NWDAF

Network Data Analytics Function

OAM

Operations Administration and Maintenance

OCP

Open Compute Project

O-CU

O-RAN Central Unit

O-DU

O-RAN Distributed Unit

OFDM

Orthogonal Frequency Division Multiplexing

OLT

Optical Line Terminal

ONAP

Open Network Automation Platform

ONU

Optical Network Unit

OOB

Out of Band leakage

OPEX

Operating Expenditure

O-RAN

Open Radio Access Network

O-RU

O-RAN Radio Unit

OS

Operating System

OSC

Orthogonal Sub-Channel

OSS

Operations Support System

OTDOA

Observed Time Difference of Arrival

P2MP

Point-to-Multipoint

PAPR

Peak-to-Average Power Ratio

PBCH

Physical Broadcast Channel

PCF

Policy Control Function

P-CSCF

Proxy Call Session Control Function

PDCCH

Physical Downlink Control Channel

PDN

Packet Data Network

PDSCH

Physical Downlink Shared Channel

PDU

Packet Data Unit

PEI

Permanent Equipment Identifier

PFD

Packet Flow Description

P-GW

Packet Data Network Gateway

Phy

Physical layer

PLMN

Public Land Mobile Network

PM

Performance Management

PNI-NPN

Public Network Integrated NPN

PoC

Proof of Concept

PON

Passive Optical Network

PRACH

Physical Random Access Channel

PRD

Permanent Reference Document (GSMA)

ProSe

Proximity Service

PRS

Positioning Reference Signal

pSEPP

Producer’s SEPP

PSS

Primary Synchronization Signal

PTP

Point-to-Point

PT-RS

Phase-Tracking Reference Signal

PTT

Push-to-Talk

PUCCH

Physical Uplink Control Channel

PUR

Preconfigured Uplink Resource

PUSCH

Physical/Primary Uplink Shared Channel

PWS

Public Warning System

QAM

Quadrature Amplitude Modulation

QCI

QoS Class Identifier

QoE

Quality of Experience

QoS

Quality of Service

QPSK

Quadrature Phase Shift Keying

RA

Random Access

RACH

Random Access Channel

RAN

Radio Access Network

RAT

Radio Access Technology

RCS

Rich Communications Services

RDS

Reliable Data Service

RET

Remote Electrical Tilt

RF

Radio Frequency

RG

Residential Gateway (5G)

RIC

Radio Access Network Intelligent Controller (O-RAN)

RL

Relay Layer (SMS)

RLC

Radio Link Control

RLF

Radio Link Failure

RN

Remote Node

R-NIB

Radio-Network Information Base

RNL

Radio Network Layer

RoI

Return on Investment

ROM

Receive Only Mode

RP

Relay Protocol (SMS)

RRC

Radio Resource Control

RRH

Remote Radio Head

RRM

Radio Resource Management

RRU

Radio Remote Unit

RTP

Real-Time Transport Protocol

RTT

Roundtrip Time

Rx

Receiver

S8HR

S8 Home Routed

SA

Standalone

SA

System Architecture group (3GPP)

SAR

Specific Absorption Rate

SAS

Security Accreditation Scheme

SAS

Service Access Point

SAS-SM

Security Accreditation Scheme for Subscription Management

SAS-UP

Security Accreditation Scheme for UICC Production

SBA

Service-Based Architecture

SBI

Southbound Interface

SCA

Smart Card Association

SCAS

Security Assurance Specification

SCG

Secondary Cell Group

SCM

Security Context Management

SCMF

Security Context Management Function

SCP

Service Communication Proxy

S-CSCF

Serving Call Session Control Function (IMS)

SC-TDMA

Single Carrier Time Division Multiple Access

SCTP

Stream Control Transmission Protocol

SD

Slice Differentiator

SDN

Software Defined Networking

SDO

Standard Development Organization

SDP

Session Description Protocol

SDU

Service Data Unit

SE

Secure Element

SEAF

Security Anchor Function

SEAL

Service Enabler Architecture Layer

SEG

Secure Gateway

SeNB

Secondary eNB

SEPP

Security Edge Protection Proxy

SFN

Single Frequency Network

SgNB

See SN

S-GW

Serving Gateway

SIB

System Information Block

SIDF

Subscription Identifier De-Concealing Function

SIM

Subscriber Identity Module

SINR

Signal-to-Noise and Interference Ratio

SIP

Session Initiation Protocol (IMS)

SLA

Service Level Agreement/Assurance

SLC

SUPL Location Center

SLF

Subscriber Location Function

SLP

SUPL Location Platform

SM

Session Management

SM

Short Message

SMARTER

Services and Markets Technology Enablers

SMC

Security Mode Command

SMC

Short Message Control

SM-DP+

Subscription Manager Data Preparation

SM-DS

Subscription Manager Discovery Server

SMF

Session Management Function

SMR

Short Message Relay

SMS

Short Message Service

SMSF

Short Message Service Function

SN

Secondary Node

SN

Serving Network

SNPN

Stand-Alone Non-Public Network

SNR

Signal-to-Noise Ratio

S-NSSAI

Single NSSAI

SOC

Service Organization Control

SoC

System on Chip

SON

Self-Organizing Network

SPC

SUPL Positioning Center

SPCF

Security Policy Control Function

SRS

Sounding Reference Signal

SRVCC

Single Radio Voice Call Continuity

SSC

Session and Service Continuity

SSP

Smart Secure Platform

SSS

Secondary Synchronization Signal

SST

Slice/Service Type

SUCI

Subscription Concealed Identifier

SUL

Supplementary Uplink

SU-MIMO

Single User MIMO

SUPI

Subscription Permanent Identifier

SUPL

Secure User Plane Location

SW

Software

TA

Tracking Area

TACS

Total Access Communication System (1G)

TAP

Transferred Account Procedure

TAS

Telephony Application Server

TBS

Terrestrial Beacon System

TCAP

Transaction Capabilities Application Part

TDD

Time Division Duplex

TDOA

Time Difference of Arrival

TIF

Transport Intelligent Function

TIP

Telecom Infra Project

TI-SCCP

Transport Independent Signaling Connection Control Part

TL

Transfer Layer (SMS)

TLS

Transport Layer Security

TMA

Tower-Mounted Amplifier

TMA

Telefonía Móvil Automática (1G)

TN

Transport Node

TNAN

Trusted Non-3GPP Access Network

TNAP

Trusted Non-3GPP Access Point

TNGF

Trusted Non-3GPP Gateway Function

TNL

Transport Network Layer

TNS

Time-Sensitive Networking

TP

Transmission Point

TR

Technical Report (3GPP)

TrGW

Transition Gateway (IMS)

TRP

Transmission and Reception Point

TS

Technical Specification (3GPP)

TSN

Time-Sensitive Networking

TSON

Time Shared Optical Network

TT

TSN Translator

TTI

Transmission Time Interval

TWAP

Trusted WLAN Access Point

TWIF

Trusted WLAN Interworking Function

Tx

Transmitter

UAS

Unmanned Aerial System

UAV

Unmanned Aerial Vehicle

UCMF

UE radio Capability Management Function

UDC

Uplink Data Compression

UDM

Unified Data Management

UDR

Unified Data Repository

UDSF

Unstructured Data Storage Function

UE

User Equipment

UI

User Identifier

UICC

Universal Integrated Circuit Card

UL

Uplink

UL-CL

Uplink Classifier

UM

Unacknowledged Mode

UMTS

Universal Mobile Telecommunications System (3G)

UNI

User-Network Interface

UP

User Plane

UPF

User Plane Function

URLLC

Ultra-Reliable Low Latency Communications

USIM

Universal Subscriber Identity Module

UST

Universal SIM Toolkit

UTM

Unmanned Aircraft Systems Traffic Management

UTM

Unmanned Traffic Management

UX

User Experience

V2I

Vehicle-to-Infrastructure

V2V

Vehicle-to-Vehicle

V2X

Vehicle-to-Everywhere

VAMOS

Voice services over Adaptive Multi-user channels on One Slot

vBBU

Virtualized BBU

ViLTE

Video over LTE

VISP

Virtualization Infrastructure Service Provider

VM

Virtual Machine

VNF

Virtual Network Functions

VoLTE

Voice over LTE (4G)

VoNR

Voice over New Radio (5G)

VoWiFi

Voice over Wi-Fi

VPLMN

Visited Public Land Mobile Network

VPN

Virtual Private Network

VR

Virtual Reality

vSEPP

Visited Network Security Edge Protection Proxy

V-SMF

Visited SMF

W-AGF

Wireline Access Gateway Function

WDM

Wavelength Division Multiplexing

WHO

World Health Organization

WiMAX

WirelessMAN-Advanced

WRC

World Radiocommunication Conference

WUS

Wakeup Signal

WWC

Wireless and Wireline Convergence

XR

Extended Reality

1 Introduction

1.1 General

1.1.1 Focus of This Book

The fifth generation of mobile communication became a reality during 2019 as the 3rd Generation Partnership Project (3GPP) released the first set of Release 15 Technical Specifications (TS) and respective equipment, both network elements and mobile devices, to be available for commercial deployments.

Nevertheless, 3GPP Release 15 refers to the very first phase of 5G, which provides an initial, “light” version of the renewed system. In terms of 3GPP, the second phase, as defined by the Release 16 set of specifications, adds the remaining functionalities, increasing performance and becoming compliant with the strict requirements of International Mobile Telecommunications 2020 (IMT-2020) defined by the ITU-R (the radio section of the International Telecommunications Union). This is an essential step as IMT-2020 sets the reference for the interoperable, full version of the 5G, which all the parties involved with the 5G ecosystem can agree refers to the global and uniform 5G.

While the first phase of 5G is designed to augment the data rates by enhanced Mobile Broadband (eMBB) mode, Release 16 adds needed functionality to support the other base pillars of 5G as defined by the ITU, i.e., massive Machine Type Communications (mMTC) and Ultra Reliable Low Latency Communications (URLLC). The benefit of mMTC is the possibility of tackling a vast number of simultaneously communicating Internet of Things (IoT) devices, which form the very basis for the new connected society concept. URLLC, in turn, provides extremely low latency together with high availability of services for the special needs of critical communications. In addition, Release 16 brings with it more advanced means for highly efficient network management thanks to evolved self-optimizing networks and machine learning platforms.

There is a variety of novelty technologies available for adaptation into system architectures such as Network Functions Virtualization (NFV) and Software Defined Networking (SDN). Virtualization will also change the traditional business models, and open doors for completely new stakeholders such as data center operators and applications supporting Virtual Reality (VR) and Augmented Reality (AR).

The second phase of 5G is already sufficiently capable of providing a functional and performant platform for highly advanced service types in a dynamic manner by using of a variety of use cases. This happens via Network Slicing (NS), which is available for deployment along with Release 16.

One of the important aspects in this evolution is to guarantee a sufficient level of interoperability between 5G networks for fluent user experiences. 3GPP standards as such are insufficient in this area as we have seen already with previous generations. Thus, there is a need to set guidelines for a feasible, minimum set of features and methods that would work among all operators within the ecosystem. As an example, the GSM Association (GSMA) is in a key position to define such recommendations for, e.g., roaming scenarios for voice and text services as well as for the interworking of packet data connections and subscription management over all the involved networks.

This book presents new key functionalities of Release 16 that complement the first phase of 5G. The book is thus an addition to the contents of the already published 5G Explained book, providing further descriptions to understand the complete picture of the full version of 5G. Whereas the first book presented the basics, this second book complements it by presenting up-to-date functionalities of Release 16, and some of the indications of the technological topics under development for the forthcoming Release 17 and beyond. This new book adds relevant descriptions in a modular way so that the reader can reference both books.

1.1.2 Generations

A number of countries launched their initial 5G networks by the end of 2019. The year 2019 was in fact of utmost importance for 5G smartphone launches, and the World Radiocommunication Conference 2019 (WRC-19) added and aligned 5G frequency bands for the further optimization of radio.

End-users have been able to use commercial mobile communication networks since the 1980s. The systems at that time were first generation, and offered mainly voice service via analogue channels [1].

1G refers to analogue, automatic mobile networks that handled only voice calls, although data transfer was possible via a data modem adapted to the terminal, or via a handful of devices embedding such functionality into the device itself. The initial systems used vehicle-mounted and portable devices for voice communications. The weight of such devices was typically several kilograms. Some examples of this first phase of 1G were Nordic NMT-450, French Radiocom 2000, Spanish TMA, German Netz-C, the UK’s TACS, Japanese JTACS, and American AMPS. As 1G matured, hand-held devices also became popular. The first ones were big and heavy compared to modern devices. An example of this latter phase was the NMT-900 system, which was launched in Nordic countries in 1986–1987.

2G represents digital systems that integrate data services and messaging. Examples of this generation are Global System for Mobile Communications (GSM) and Interim Standard-95 (IS-95). GSM was launched commercially in 1991, and unlike other 2G variants at that time, it was based on a Subscriber Identity Module (SIM) that housed subscription-related data.

SIM has evolved ever since. It is still a useful platform for storing a user’s unique key, which is the basis for authentication and authorization of the user, and serves also for radio interface encryption. It is a hardware-based Secure Element (SE). 5G will rely on SIM, too, in one or another form.

2G data speeds were originally as low as 9.6 kb/s, and the service used circuit-switched connectivity. The ETSI/3GPP designed General Packet Radio Service (GPRS) that operators started to deploy in commercial markets as early as 2000, based on the European Telecommunication Standards Institute (ETSI) Release 97. It opened up the era of mobile packet-switched IP data over cellular networks. The data speed has increased along with the further evolution of GSM. Using multislot and multicarrier technologies, speed can nowadays be over 1 Mb/s depending on the service support on the network and device, e.g., by applying dual carrier and multislot techniques such as Downlink Dual Carrier (DLDC). Also, the voice capacity of GSM can be enhanced by offering the same number of voice calls within a reduced spectrum by applying Orthogonal Sub-Channel (OSC) and VAMOS (Voice services over Adaptive Multi-user channels on One Slot (VAMOS) [2].

Due to low spectral efficiency and security, the importance of 2G is decreasing and operators are refarming it for use with other systems. Nevertheless, 2G is still used in many markets for consumer and Machine-to-Machine (M2M) communications such as wireless alarm systems; therefore, only time will tell when 2G will no longer be relevant.

3G was a result of further development of multimedia-capable systems that provided much faster data speeds. 3G is thus a mobile multimedia platform. ITU’s IMT-2000 sets the performance requirements for 3G systems. There are various commercial 3G systems such as US-originated cdma2000 and 3GPP-based Universal Mobile Telecommunications Service/High Speed Packet Access (UMTS/HSPA). 3G networks have evolved since their commercial launch at the beginning of 2000, and today they are capable of supporting tens of Mb/s data speeds.

4G continued with the “tradition” of renewed generations. The ITU-R designed a set of IMT-Advanced requirements for 4G systems. There are two commercial systems complying with them: LTE-Advanced (LTE-A) specified as of 3GPP Release 10, and WirelessMAN-Advanced (WiMAX), which is based on the IEEE 802.16 evolution. Oftentimes in the commercial field, the industry considers that Long Term Evolution (LTE) Releases 8 and 9 belong to the 4G era, and there have been operators interpreting even HSPA+ to be part of 4G. Nevertheless, referring strictly to IMT-Advanced, they are merely representatives of 3G technologies. Nowadays, the significance of WiMAX has decreased considerably, leaving LTE-A as the only relevant representative of the 4G era. Today, 4G offers hundreds of Mb/s data speeds.

5G refers to systems beyond IMT-Advanced that comply with the new ITU IMT-2020 requirements. 5G provides much higher data speeds. 3GPP specified the “full version” of 5G, i.e. Release 16, in the second half of 2020. The initial 5G, as defined in 3GPP Release 15, is oftentimes called phase 1 5G, whereas Release 16 represents phase 2 5G. The latter will comply with the strict requirements of IMT-2020, making it a complete 5G that provides customers with a full set of services and highest performance.

As new generations take over and customers start enjoying their enhanced and much more spectrum-efficient performance, previous generations gradually lose their users and can eventually be decommissioned, as can be seen from the example set by 1G systems in 2000. Although 2G and 3G still have important use bases, including IoT devices, operators may already be considering decommissioning strategies.

Meanwhile, many operators refarm 2G and possibly 3G bands to 4G and 5G to optimize the use of the spectrum. In this transition phase, the already existing base station sites and possibly part of their equipment are reusable, including power supplies and transport lines.

Each generation goes through a series of enhancements during its lifecycle. Since the very initial deployments of 2G, the data services of each generation have continued evolving, providing users with constantly enhancing performance and capacity. As depicted in Figure 1.1, we can see that each new generation has provided at least 10-fold data speed ranges for customers compared to the previous generation.

Figure 1.1 Mobile generations vs. downlink data speed evolution.

5G is no exception; so, while LTE-A is capable of delivering some hundreds of Mb/s up to about the 1 Gb/s range, the eMBB mode of 5G can be assumed to handle Downlink (DL) data speeds of around 10–20 Gb/s.

3GPP TS 22.261 presents the service requirements for the next generation of new services and markets for Releases 15, 16, and 17 [3]. The document released in July 2020, V17.3.0 (2020–2007), describes the service and operational requirements for a 5G system, including User Equipment (UE), Next Generation Radio Access Network (NG-RAN), and 5G core network, while the requirements for the Dual Connectivity (DC) between 5G Evolved UMTS Terrestrial Radio Access (5G E-UTRA) and New Radio (NR) in the scenarios for the 5G Evolved UTRA Network (5G E-UTRAN) connected to 4G Evolved Packet Core (EPC) are presented in 3GPP TS 22.278 [4].

1.2 Principles of 5G

5G refers to the fifth generation of mobile communication systems. It represents mobile telecommunication standards beyond 4G LTE, and will comply with the strict IMT-2020 requirements of the ITU-R.

5G provides much faster data speeds with very low latency compared to legacy systems. 5G also supports a higher number of devices communicating simultaneously. 5G is capable of handling much more demanding mobile services than was ever possible before, including tactile Internet and VR applications, which will provide completely new and highly attractive user experiences.

As LTE and its evolution, LTE-A, have been a success story serving a growing base of customers, one might ask why we need yet another generation. The answer follows the same pattern as all the previous generations: as their performance reaches a practical limit, it makes more sense to provide services using more spectral, efficient, and performant new systems instead of trying to enhance legacy platforms.