107,99 €
5G SECOND PHASE EXPLAINED A one-stop reference that offers an accessible guide to an understanding of the enhanced core technologies of 5G 5G Second Phase Explained - The 3GPP Release 16 Enhancements offers an authoritative and essential guide to the new functionalities of the Release 16 that complement the first phase of the 5G. From the author of 5G Explained comes the next step resource that includes detailed descriptions that provide a clear understanding to the full version of the 5G technologies and their impacts on the Phase 1 networks. The author--an industry expert--not only reviews the most up-to-date functionalities of the Release 16 but includes information on the forthcoming Release 17 as well as material on future developments. The book explores the highly unique aspects of the Release 16, which can help technical personnel's efforts to deliver essential information in a practical way. The two books, 5G Explained and 5G Second Phase Explained, offer a comprehensive understanding of 5G. This important guide: * Offers a summary of the newest and key features of 5G * Presents a one-stop reference for an understanding of the core technologies of 5G * Contains a new book that expands on the author's 5G Explained * Puts the focus on security and deployment aspects of 5G enhancements Written for technical personnel of network operators, network element and user device manufacturers, 5G Second Phase Explained offers a guide to an understanding of network deployment and device designing of 5G technologies.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 639
Veröffentlichungsjahr: 2021
Jyrki TJ. Penttinen
GSMA North America
This edition first published 2021
© 2021 John Wiley & Sons, Ltd.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available http://www.wiley.com/go/permissions.
The right of Jyrki T.J. Penttinen to be identified as the author of the editorial material in this work has been asserted in accordance with the law.
Registered Offices
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
Editorial Office
The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats.
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
Library of Congress Cataloging-in-Publication Data
Names: Penttinen, Jyrki, 1967- author. | John Wiley & Sons, Inc., publisher.
Title: 5G second phase explained : the 3GPP release 16 enhancements / Jyrki Teppo Juho Penttinen, GSMA North America.
Description: Hoboken, NJ : John Wiley & Sons, Inc., 2021. | Includes bibliographical references and index.
Identifiers: LCCN 2020047582 (print) | LCCN 2020047583 (ebook) | ISBN 9781119645504 (hardback) | ISBN 9781119645559 (pdf) | ISBN 9781119645535 (epub) | ISBN 9781119645566 (ebook)
Subjects: LCSH: 5G mobile communication systems. | Long-Term Evolution (Telecommunications).
Classification: LCC TK5103.25 .P46 2021 (print) | LCC TK5103.25 (ebook) | DDC 621.3845/6—dc23
LC record available at https://lccn.loc.gov/2020047582
LC ebook record available at https://lccn.loc.gov/2020047583
Cover image: © Nicomenijes/Getty Images
Cover design by Wiley
Set in 9.5/12.5pt STIX Two Text by Integra Software Services Pvt. Ltd, Pondicherry, India
Cover
Title page
Copyright
About the Author
Preface
Acknowledgments
List of Abbreviations
Chapter 1: Introduction
1.1 General
1.1.1 Focus of This Book
1.1.2 Generations
1.2 Principles of 5G
1.2.1 Open Source
1.2.2 Justifications for 5G
1.3 Standardization
1.3.1 Release 16 Key Features
1.3.2 The Phases of 5G
1.3.3 How to Find 5G-Related Specifications
1.3.4 Release 17
1.3.5 Later Phases and 6G
1.4 Introduction to the Book
Chapter 2: Requirements
2.1 Overview
2.2 Background
2.3 Development of the Ecosystem
2.3.1 New Needs
2.3.2 Enhanced 5G Functionality
2.4 Introduction to Requirements
2.5 World Radiocommunication Conference
2.6 Building Blocks of 5G: eMBB/URLLC/mMTC
2.7 5G Requirements of the ITU
2.7.1 Process
2.7.2 Documents
2.7.3 Peak Data Rate
2.7.4 Peak Spectral Efficiency
2.7.5 User Experienced Data Rate
2.7.6 Fifth Percentile User Spectral Efficiency
2.7.7 Average Spectral Efficiency
2.7.8 Area Traffic Capacity
2.7.9 Latency
2.7.10 Connection Density
2.7.11 Energy Efficiency
2.7.12 Reliability
2.7.13 Mobility
2.7.14 Mobility Interruption Time
2.7.15 Bandwidth
2.8 The Technical Specifications of the 3GPP
2.8.1 Releases
2.8.2 Security Requirements for 5G
2.9 Ngmn
2.9.1 User Experience
2.9.2 Device Requirements
2.9.3 Enhanced Services
2.10 Mobile Network Operators
2.11 Mobile Device Manufacturers
2.12 Consumer Requirements
2.13 Vertical Requirements
2.13.1 SME Business
2.13.2 Transport and Traffic
2.13.3 Health Care
2.13.4 Critical Infrastructure
2.13.5 Aviation and Drones
2.13.6 Virtual Reality
2.13.7 Other Verticals
Chapter 3: Phase 2 System Architecture and Functionality
3.1 Introduction
3.1.1 General
3.1.2 Release 16 Development
3.1.3 Radio Network
3.1.4 Core Network
3.1.5 Transport Network
3.1.6 5G NFs of Release 16
3.2 Release 16 Enhancements
3.2.1 LTE in Release 16
3.2.2 5G of Release 16
3.2.3 Fixed-Mobile Convergence
3.2.4 Control and User Plane Separation of EPC Nodes
3.2.5 Java and APIs in 5G
3.2.6 Identifiers
3.2.7 Multicast/Broadcast in 5G
3.3 5G Network Architecture in Release 16
3.3.1 System Architecture
3.3.2 Non-roaming Reference Architecture
3.3.3 Roaming Reference Architecture
3.3.4 Interworking with Non-3GPP Networks
3.3.5 5G User and Control Plane
3.3.6 Edge Computing
3.4 Dual Connectivity
3.4.1 Multi-radio Dual Connectivity with EPC
3.4.2 Multi-radio Dual Connectivity with 5GC
3.4.3 Dual Connectivity Network Interfaces
3.5 NG-RAN Architecture
3.5.1 Interfaces
3.5.2 Functions of gNB and ng-eNB
3.6 5G Interfaces and Reference Points
3.6.1 Service-Based Interfaces
3.6.2 Reference Points
3.7 IMS in 5G
Chapter 4: Phase 2 Radio Network and User Equipment
4.1 Overview
4.1.1 Key Specifications
4.1.2 Summary of Key Release 16 Enhancements
4.2 Radio Network
4.2.1 5G MIMO and Adaptive Antennas
4.2.2 5G Radio Access
4.2.3 5G gNB Functions
4.2.4 3GPP RAN Interfaces
4.2.5 The Split Architecture of RAN
4.2.6 IAB
4.2.7 5G Network Layers
4.2.8 IAB Protocol Stacks
4.3 User Equipment
4.3.1 Background
4.3.2 Terminal States
4.4 Cloud RAN
4.4.1 Introduction
4.4.2 Open RAN Terminology
4.4.3 Open RAN Alliance
4.4.4 Open RAN Reference Architecture
4.4.5 Logical Architecture of O-RAN
4.5 5G Spectrum
4.5.1 Advances of 5G Frequencies
4.5.2 ITU-R WRC-19 Results
4.5.3 RF Bands
4.6 5G Radio Aspects
4.6.1 Bandwidth
4.6.2 Duplex
4.6.3 SUL
4.6.4 Dynamic Spectrum Sharing
4.6.5 5G Antennas
4.6.6 Radio Performance
4.6.7 OFDM in Release 16
4.6.8 Modulation
4.6.9 Coding
4.6.10 OFDM
4.6.11 Modulation
4.6.12 Frame Structure
4.6.13 5G Channels
4.6.14 General Protocol Architecture
4.6.15 Physical Layer Procedures
4.6.16 Physical Layer Measurements
4.6.17 Quality of Service
Chapter 5: Core and Transport Network
5.1 Overview
5.1.1 The 5G Pillars
5.1.2 5G Core Network Services
5.2 Network Functions Virtualization
5.2.1 SDN
5.2.2 NFV
5.3 5G Cloud Architecture
5.3.1 Concept
5.3.2 Data Center as a Base for 5G Architecture
5.3.3 Network as a Service
5.4 Network Functions Overview
5.4.1 5G Release 15 and 16 Network Functions
5.4.2 5G Core Network Aspects
5.5 NFs Enhanced in Release 16
5.5.1 5G-EIR
5.1.2 AF
5.5.3 AMF
5.5.4 AUSF
5.5.5 LMF
5.5.6 N3IWF
5.5.7 NEF
5.5.8 NRF
5.5.9 NSSF
5.5.10 NWDAF
5.5.11 PCF
5.5.12 SEPP
5.5.13 SMF
5.5.14 SMSF
5.5.15 UDM
5.5.16 UDR
5.5.17 UDSF
5.5.18 UPF
5.6 Additional NFs of Release 16
5.6.1 CAPIF
5.6.2 GMLC
5.6.3 I-SMF and V-SMF
5.6.4 I-UPF
5.6.5 NSSAAF
5.6.6 SCP
5.6.7 TNGF
5.6.8 TWIF
5.6.9 UCMF
5.6.10 W-AGF
5.7 5GC Functionalities
5.7.1 Network Function Discovery
5.7.2 Network Slicing
5.8 Transport Network
5.9 IMS for 4G and 5G Voice Service
5.9.1 IMS Architecture
5.9.2 Voice Service
5.9.3 Roaming
5.9.4 Key Definitions
5.9.5 VoLTE Infrastructure Options
5.9.6 Fallback Mechanisms
5.9.7 Circuit-Switched Fallback
5.9.8 Single Radio Voice Call Continuity
5.9.9 Interworking in 4G/5G
5.9.10 Requirements for IMS Voice
Chapter 6: Release 16 Features and Use Cases
6.1 Introduction to Release 16 Use Cases
6.1.1 5G Pillars
6.1.2 Technical Reports as a Foundation
6.1.3 Use Cases Identified by Industry
6.1.4 Market Needs for Release 16
6.2 Use Cases for 5G Release 16
6.2.1 Network Slicing
6.2.2 Network Functions Virtualization
6.2.3 SDN
6.2.4 Use Cases for Cloud-Based Functions
6.2.5 Quality of Service
6.2.6 Session Continuity
6.2.7 IMS Voice Calls in 5G
6.2.8 SMS in 5G
6.2.9 Dual Connectivity
6.2.10 Network Exposure
6.2.11 Policy
6.2.12 Network Function Service Framework
6.3 5G Use Cases
6.3.1 Overview
6.3.2 Use Cases of 3GPP TR 22.891
6.3.3 The 3GPP Use Cases of SMARTER
6.3.4 Enhancement of Ultra-Reliable Low Latency Communications
6.3.5 5GS Enhanced Support of Vertical and LAN Services
6.3.6 Advanced V2X Support
6.3.7 Satellite Access in 5G
6.3.8 Wireless and Wireline Convergence Enhancement
6.3.9 Location-Based Services
6.3.10 Mission Critical Services
6.3.11 Public Warning System
6.3.12 Streaming and TV
6.3.13 Cloud-Based Functions and Edge
6.3.14 Virtual Reality, Augmented Reality, and Extended Reality
6.3.15 SON
6.3.16 Support for Energy Saving
6.3.17 Enablers for Network Automation Architecture for 5G
6.3.18 5G Voice
6.3.19 Sidelink
6.3.20 Verticals Support
6.3.21 Non-public Networks
6.4 Release 17 and Beyond
6.4.1 Drones (Unmanned Aerial System)
6.4.2 MBMS
6.4.3 Machine Learning and Artificial Intelligence
6.4.4 Use Cases of 6G
Chapter 7: Security
7.1 Overview
7.1.1 5G Security Architecture
7.1.2 Security Functions
7.1.3 Enhanced 5G Security
7.2 5G Network Security Procedures
7.2.1 Keys in 5G
7.2.2 5G Identifiers
7.2.3 Network Key Storage and Procedures
7.2.4 5G Key Derivation
7.2.5 Security Aspects of Network Slicing
7.3 SIM in the 5G Era
7.3.1 Background
7.3.2 UICC Profiles in 5G
7.3.3 Changes in Authentication
7.3.4 SIM Evolution
7.3.5 eSIM
7.3.6 eSIM Architecture
7.3.7 Technical Solution
7.3.8 Security Certification of 5G SIM and Subscription Management
7.4 Other Security Aspects
7.4.1 Security Certification of Data Centers
7.4.2 GSMA Security Controls
Chapter 8: 5G Network Planning and Optimization
8.1 Network Design Principles
8.1.1 Introduction
8.1.2 Base Architectural Models
8.1.3 3GPP Split Options
8.1.4 Deployment Scenarios of ETSI
8.2 5G Radio Network Planning
8.2.1 Overview
8.2.2 Radio Channel Modeling
8.2.3 5G Radio Link Budget Considerations
8.2.4 5G Radio Link Budget in Bands Above 6 GHz
8.2.5 Sidelink Deployment Scenarios
8.3 RAN Deployment
8.3.1 O-RAN Deployment Scenarios
8.3.2 3GPP Functional Split Options of 5G
8.4 5G Core Network Planning
8.4.1 Overall Considerations
8.4.2 Virtualization
8.4.3 MEC
8.4.4 Transport Network Considerations
8.4.5 Deployment Options of ITU
8.4.6 Dimensioning of the Core and Transport
8.5 Network Slice Planning
8.5.1 Overview
8.5.2 Network Slice Ecosystem Roles
8.5.3 Network Slice Planning Principles
8.5.4 Network Slice Templates of the GSMA
8.5.5 Network Slice as a Service
8.5.6 Network Slice Management
8.6 EMF Considerations
8.6.1 Safety Regulation
8.6.2 Scientific Understanding
8.6.3 Safety Distance
8.6.4 Snapshot of Studies
8.7 5G Measurements and Analytics
8.7.1 Key Measurement Types
8.7.2 In-Built Network Analytics
8.7.3 Minimization of Drive Tests
Appendix
Index
End User License Agreement
Chapter 1
Table 1.1 Some of the key entities standardizing or contributing to 5G ev...
Table 1.2 Some of the key features of 3GPP Release 16.
Chapter 2
Table 2.1 Key requirements of the ITU IMT-2020, based on M.2083 [7].
Table 2.2 Description of 5G dimensions.
Table 2.3 Key 5G documents and specifications of the 3GPP.
Table 2.4 Some of the 5G-related Permanent Reference Documents (PRDs)...
Table 2.5 NGMN Alliance’s device requirements.
Table 2.6 Some potential uses of 5G for consumers.
Chapter 3
Table 3.1 The key components of 5G, and mapping with the 4G LTE system.
Table 3.2 Terminology for 5G NodeB variants as per Release 16 3GPP TS...
Table 3.3 Release 16 service-based interfaces of the 5G system. Please...
Table 3.4 Release 16 service-based reference points of the 5G system.
Table 3.5 Reference points and SBA interfaces for IMS support.
Chapter 4
Table 4.1 Some of the key technical specifications of the 3GPP NR inter...
Table 4.2 The key 3GPP TR detailing 5G-specific Radio Frequency (RF) ba...
Table 4.3 Key functionalities of 5G gNB and ng-eNB as interpreted from...
Table 4.4 5G NR-RAN interfaces of Release 16 as per 3GPP TS 38.401...
Table 4.5 Some of the key 5G specifications describing the UE
Table 4.6 The 3GPP frequency bands and frequency ranges for the LTE as in...
Table 4.7 The NR bands and frequency ranges as interpreted from 3GPP TS 38...
Table 4.8 3GPP Release 16 5G frequency range definitions. Please note that...
Table 4.9 The key characteristics of the 4G and 5G radio interface.
Table 4.10 The modulation schemes of 5G.
Chapter 5
Table 5.1 The Release 15 NFs.
Table 5.2 The additional NFs presented in Release 16.
Table 5.3 The IMS core elements. Please refer to Figures 5.34 and 5.35 for...
Table 5.4 The additional elements that can be deployed to support VoLTE...
Chapter 6
Table 6.1 C-IoT categories for LTE.
Table 6.2 The comparison of E-SMLC and SLP.
Chapter 7
Table 7.1 The interfaces of 3GPP security architecture [1].
Table 7.2 The 5G keys.
Table 7.3 5G keys and their respective storage and procedures
Chapter 8
Table 8.1 Summary of 4G and 5G deployment options as defined in 3GPP TS...
Table 8.2 The principle of the DL RLB.
Table 8.3 The principle of the UL RLB.
Table 8.4 Summary of the selected mmWave propagation studies [13].
Table 8.5 Summary of the 5G split options as interpreted from 3GPP TR 38....
Table 8.6 The main tasks of the protocol layers of the 5G RAN.
Table 8.7 The roles of the RU, DU, and CU.
Table 8.8 The roles in the network slicing ecosystem.
Table 8.9 Example of an NEST for URRLC as per GSMA PRD NG.116 V3.0 [37].
Table 8.10 Resources for additional information on health aspects.
Table 8.11 Examples of 5G measurement equipment
Appendix
Table 1 Snapshot of the 3GPP Technical Specifications (TS) and Technical Reports (TR)...
Chapter 1
Figure 1.1 Mobile generations vs. downlink data speed evolution.
Figure 1.2 Key functionalities of 5G.
Figure 1.3 Forecast of the share of the utilization of 2G, 3G, 4G, and...
Figure 1.4 The timeline for 3GPP 5G, Release 16 and beyond [23, 24], a...
Figure 1.5 Template of 3GPP TS and TR.
Figure 1.6 3GPP Release roadmap towards 6G.
Figure 1.7 Contents of this book.
Chapter 2
Figure 2.1 5G dimensions and their capabilities as per the ITU IMT-2020. A...
Figure 2.2 The building blocks of 5G. eMBB, URLLC, and mMTC are the main d...
Figure 2.3 The 5G network can provide feasible control and communications...
Chapter 3
Figure 3.1 Mapping of the key 4G and 5G elements. Releases 15 and 16 bring...
Figure 3.2 Principle of fixed wireless convergence [8].
Figure 3.3 Reference point presentation of the 5G system architecture for...
Figure 3.4 Non-roaming 5G system architecture, presented via service-based...
Figure 3.5 Reference point format of the non-roaming architecture for the...
Figure 3.6 An example of the 5G architecture in a roaming case, presented...
Figure 3.7 5G core network architecture for non-roaming via non-3GPP acc...
Figure 3.8 Non-roaming architecture for interworking between 5G system...
Figure 3.9 The principle of the 5G NG and Uu UP [16].
Figure 3.10 The CP for Uu and NG.
Figure 3.11 The high-level EN-DC architecture.
Figure 3.12 5G Multi-radio access technology DC.
Figure 3.13 CP connectivity for EN-DC and MR-DC with 5GC.
Figure 3.14 UP connectivity for EN-DC and MR-DC with 5GC.
Figure 3.15 The overall 5G architecture in Releases 15 and 16 as defined...
Figure 3.16 System architecture to support SBA in the IMS.
Figure 3.17 System architecture to support SBA in the IMS in reference p...
Figure 3.18 The IMS call scenario in visited and home 5G network use cas...
Chapter 4
Figure 4.1 The protocol stacks for NG and Xn interfaces.
Figure 4.2 The high-level split architecture of the 5G gNB [12].
Figure 4.3 The functional split of UP and CP in gNB based on DU, as per...
Figure 4.4 The IAB architecture of Release 16 5G [12].
Figure 4.5 The high-level 5G UP and CP protocols.
Figure 4.6 The frame structure of the RLC and PDCP.
Figure 4.7 Protocol stack for F1-U of IAB.
Figure 4.8 Protocol stack for F1-C of IAB.
Figure 4.9 Protocol stack for IAB F1-C traffic delivered via the MeNB.
Figure 4.10 The state model for 4G and 5G systems as interpreted from...
Figure 4.11 Cloud-based 5G RAN architecture model.
Figure 4.12 The principle of C-RAN and C-Core of 5G.
Figure 4.13 Open RAN architecture as interpreted from the O-RAN Alli...
Figure 4.14 The 5G gNB protocol stack of the O-RAN model.
Figure 4.15 The logical architecture of the O-RAN.
Figure 4.16 The 3GPP split model for DU and CU.
Figure 4.17 The low and mid-bands of 5G and their bandwidths. The wi...
Figure 4.18 The high bands of 5G. These are the new mmWave blocks ...
Figure 4.19 Logical and transport channel mapping in 5G [42].
Figure 4.20 The principle of mapping 5G channels.
Chapter 5
Figure 5.1 The principle of NFV.
Figure 5.2 The principle of SDN and comparison with a traditional...
Figure 5.3 The 5G NFs in 3GPP Release 15 and 16 networks.
Figure 5.4 The interfaces of the AMF.
Figure 5.5 The interfaces of the AUSF.
Figure 5.6 The interfaces of the LMF.
Figure 5.7 The interfaces of the N3IWF.
Figure 5.8 The interfaces of the NEF.
Figure 5.9 The interfaces of the NRF (which can be divided into home...
Figure 5.10 The interfaces of the NSSF.
Figure 5.11 The interfaces of the NWDAF.
Figure 5.12 The interfaces of the PCF.
Figure 5.13 The principle of the SEPP for interconnecting 3GPP networks.
Figure 5.14 The interfaces of the SMF. Please note that the SMF also...
Figure 5.15 The protocols for the N1 mode used in 5G SMS delivery.
Figure 5.16 A conceptual example of UDM deployment.
Figure 5.17 The interfaces of the UDR.
Figure 5.18 The interfaces of the UDSF. It is an optional functiona...
Figure 5.19 The interfaces of the UPF.
Figure 5.20 The 3GPP northbound interface.
Figure 5.21 The goal of the 3GPP is to unify the northbound interface.
Figure 5.22 A reference point architecture for the 5G location servi...
Figure 5.23 Redundant transmission with two N3 tunnels between the PSA...
Figure 5.24 Two N3 and N9 tunnels between the NG-RAN and PSA UPF for...
Figure 5.25 Non-roaming and LBO roaming architecture for supporting...
Figure 5.26 The principle of network slicing in core network deployment.
Figure 5.27 Example of the network slice set and cloud implementation.
Figure 5.28 The principle of service assurance for 5G network slicing.
Figure 5.29 The principle of network slicing in 5G.
Figure 5.30 Network slice forms virtual networks optimized for diffe...
Figure 5.31 The groups A, B, and C to support multiple network slices...
Figure 5.32 Principle of the 5G-XHaul CP.
Figure 5.33 Example of 5G-XHaul UP deployment.
Figure 5.34 The conceptual presentation of the main IMS components that...
Figure 5.35 VoLTE configuration.
Figure 5.36 The S8HR roaming architecture.
Figure 5.37 The connectivity between 4G, 3G, and 2G.
Figure 5.38 The principle of CSFB from 4G to 2G and 3G.
Figure 5.39 The principle of SRVCC from 4G to 2G/3G. The MSC Server in...
Figure 5.40 The principle of SRVCC from 5G to 3G.
Figure 5.41 5G interworking architecture as defined by the 3GPP.
Figure 5.42 The principle of IMS interconnection for 4G and 5G networks.
Chapter 6
Figure 6.1 The principle of the NFV concept.
Figure 6.2 Principle of 5G SSC modes.
Figure 6.3 Use cases as identified from 3GPP TR 22.891 [1].
Figure 6.4 Potential use cases as identified in TR 22.891 continued [1]...
Figure 6.5 Local switch-based user plane architecture in a non-roaming...
Figure 6.6 N19-based user plane architecture in a non-roaming scenario.
Figure 6.7 5G serves as a platform for vehicle communications.
Figure 6.8 Example of the NTN as per 3GPP TR 38.811 [21].
Figure 6.9 Non-roaming architecture of the 5G core network when the Fi...
Figure 6.10 Non-roaming architecture for a 5G core network with truste...
Figure 6.11 The merging of 5G and TSNs can benefit industrial verticals.
Figure 6.12 The logical TSN bridge as interpreted from 3GPP TS 23.501.
Figure 6.13 5G positioning architecture.
Figure 6.14 NG-RAN architecture supporting the PC5 interface as interpr...
Chapter 7
Figure 7.1 3GPP system security architecture for 5G.
Figure 7.2 5G network functions related to security (highlighted). Rel...
Figure 7.3 The 5G key hierarchy as interpreted from 3GPP TS 33.501 [1]....
Figure 7.4 The 5G key derivation as interpreted from 3GPP TS 33.501, R...
Figure 7.5 The removable, plug-in UICC FFs are also valid in the 5G era.
Figure 7.6 Some examples of eUICC elements.
Figure 7.7 UICC variants and respective commercial timelines.
Figure 7.8 Remote SIM provisioning system, LPA in the device [12].
Figure 7.9 Remote SIM provisioning system, LPA in the eUICC [12].
Chapter 8
Figure 8.1 Release 15 5G architecture. Radio access can take place via...
Figure 8.2 The Standalone (SA) and Non-Standalone (NSA) 4G/5G deployme...
Figure 8.3 4G EPC supports 5G connectivity by dividing the S-GW and P-...
Figure 8.4 Example of deployment of logical gNB/en-gNB as interpreted ...
Figure 8.5 The principle of the 5G RLB. The maximum coverage area depe...
Figure 8.6 The evolution of traditional site deployment relying on a c...
Figure 8.7 Principle of the 5G RLB parameters.
Figure 8.8 The principle of SUL.
Figure 8.9 The sideline communication scenarios as interpreted from TS...
Figure 8.10 Cloud deployment scenarios as interpreted from the guideli...
Figure 8.11 5G brings more diverse split options for the network compo...
Figure 8.12 The split options of 5G as per the definitions of the 3GPP...
Figure 8.13 MEC mapping with 5G architecture as interpreted from Ref....
Figure 8.14 The principle of GST and NEST [38].
Figure 8.15 The stages of the life cycle for network slicing management.
Figure 8.16 The spectrum and its typical sources and applications [40].
Figure 8.17 The received power from the base station decreases quickly...
Figure 8.18 The principle of MDT reporting.
Cover
Title page
Copyright
Table of Contents
About the Author
Preface
Acknowledgments
List of Abbreviations
Begin Reading
Appendix
Index
End User License Agreement
i
ii
iii
iv
v
vi
vii
viii
ix
x
xi
xii
xiii
xiv
xv
xvi
xvii
xviii
xix
xx
xxi
xxii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
Dr Jyrki T.J. Penttinen, the author of 5G Second Phase Explained, started his activities in the mobile communications industry in 1987 by evaluating 1G and 2G radio networks. After he obtained his MSc (EE) grade from the Helsinki University of Technology (HUT) in 1994, he worked for Telecom Finland (Sonera and TeliaSonera Finland) and Xfera Spain (Yoigo) on 2G and 3G radio and core network architectures and performance aspects. In 2002 he established Finesstel Ltd, carrying out consultancy and technical training projects in Europe and the Americas during 2002–2003. Afterwards, he worked for Nokia and Nokia Siemens Networks in Mexico, Spain, and the United States from 2004 to 2013. During this time with mobile network operators and equipment manufacturers, Dr Penttinen was involved in operational and research activities related to system and architectural design, standardization, training, and technical management. His focus was on the radio interface of GSM, GPRS/EDGE, UMTS/HSPA, and DVB-H. From 2014 to 2018, in his position as program manager with G+D Mobile Security Americas, USA, his focus areas included mobile and IoT security and innovation with a special emphasis on 5G.
Since 2018, he has worked for GSMA North America as Senior Technology Manager assisting operator members with the adoption, design, development, and deployment of GSMA specifications and programs.
Dr Penttinen obtained his LicSc (Tech) and DSc (Tech) degrees from HUT (currently known as Aalto University, School of Science and Technology) in 1999 and 2011, respectively. In addition to his main work, he has given lectures and authored technical articles and books such as 5G Explained (2019), Wireless Communications Security (2017), The LTE-Advanced Deployment Handbook (2016), The Telecommunications Handbook (2015), The LTE/SAE Deployment Handbook (2011), and The DVB-H Handbook (2009). More information on his publications and articles can be found at his LinkedIn profile, www.linkedin.com/in/jypen, and at his author’s page at Amazon, www.amazon.com/author/jype.
5G has been a reality since 2019, after some early deployments of isolated 5G networks that were already partially compliant with the 3GPP technical standards. Since the publication of the very first complete set of Release 15-based 5G standards, the number of 5G radio networks has been increasing steadily. According to the forecast of the GSMA, 5G will account for as many as 1.2 billion connections by 2025. Along with the Release 16 standards that the 3GPP released in 2020, we can start enjoying gradually the full 5G experience with fast deployment of advanced features.
My previous 5G Explained book from Wiley, published in 2019, described the key functionalities as per 3GPP Release 15, a.k.a. the first phase of 5G with the focus on security and deployment aspects. Release 15 forms a foundation for 5G and facilitates fast deployment via many intermediate architectural options, while Release 16 makes 5G fully equipped with a variety of enhanced features and functions.
As can be interpreted from the accelerated development schedules of the 5G era, mobile communication technologies evolve faster than ever. Along with such important additions of Release 16, this new book thus complements the foundations laid down by the previous 5G Explained book, including key descriptions of the features defined in the second phase of 5G. The focus of this book is on new key use cases, enhanced security, and deployment aspects. These two books serve as a complementing set of references and form an up-to-date resource for demystifying 5G architecture and functions.
These 5G Explained books thus summarize the latest knowledge regarding the key features and functionality of the first and second phases of 5G, and provides readers with a common-sense summary of specifications and other information sources. I believe this modular approach is beneficial for network deployment, device designing, and education of personnel and students interested in telecommunication domains.
As has been the case with my previous books published by Wiley, I would highly appreciate all your feedback. For any questions and feedback, please do not hesitate to contact me directly via my LinkedIn profile at www.linkedin.com/in/jypen, and please feel free to comment on my related 5G blog at www.5g-simplified.com, which I use to summarize related updates of selected topics of these 5G Explained books.
Jyrki PenttinenAtlanta, GA, US
This book is a result of countless hours I have spent exploring 3GPP specifications and other relevant information sources to better understand the up-to-date architecture, functioning, and principles of the 5G system. Because the new representative of mobile generations has advanced at such a fast pace, the task has been highly fascinating yet challenging, especially the balancing of time. I thus want to express my warmest thanks for all the support and patience I have received from my wife Celia as well as my close family, Katriina, Pertti, Stephanie, Carolyne, and Miguel. I am also most thankful for the support of my colleagues and peers as well as all those who have provided me with feedback to my publications.
I also want to express my warmest gratitude to the Wiley team for their professional but gentle approach, which has ensured the successful delivery of this book.
Jyrki PenttinenAtlanta, GA, US
1G
1st generation of mobile communication systems
2G
2nd generation of mobile communication systems
3G
3rd generation of mobile communication systems
3GPP
3rd Generation Partnership Project
4G
4th generation of mobile communication systems
5G
5th generation of mobile communication systems
5GC
5G Core
5GS
5G System
5WWC
Wireless and Wireline Convergence for 5G system architecture
A/D
Analogue to Digital
AAA
Authentication, Authorization, and Accounting
AAA-P
AAA Proxy
AAA-S
AAA Server
AAS
Active Antenna System
ADAS
Advanced Driver Assistance System
AES
Advanced Encryption Standard
AF
Application Function
AGW
Access Gateway (IMS)
AI
Artificial Intelligence
AKA
Authentication and Key Agreement
AL
Application Layer (SMS)
ALG
Application Level Gateway (IMS)
AM
Acknowledged Mode
AMF
Access and Mobility Management Function
AMPS
Advanced Mobile Phone Service (1G)
AN
Access Network
ANR
Automatic Neighbor Cell Relation
AoA
Angle of Arrival
AoD
Angle of Departure
API
Access Point Identifier
API
Application Programming Interface
APN
Access Point Name
AR
Augmented Reality
ARP
Allocation and Retention Priority
ARPF
Authentication Credential Repository and Processing Function
AS
Access Stratum
AS
Application Server
ATSSS
Access Traffic Steering, Switch and Splitting
AUSF
Authentication Server Function
BBF
Broadband Forum
BBU
Baseband Unit
BER
Bit Error Rate
BGCF
Breakout Gateway Control Function
BH
Backhaul
BL
Bandwidth reduced Low complexity UE
BRG
Broadband Residential Gateway (5G)
BSS
Business Support System
C2
Command and Control
CA
Carrier Aggregation
CAG
Closed Access Group
CAM
Cooperative Awareness Message
CAPEX
Capital Expenditure
CAPI
Common north-bound APIs (EPC-5GC)
CAPIF
Common API Framework for 3GPP northbound APIs
CAS
Cell Acquisition Subframe
C-Core
Cloud Core
cdma2000
Code Division Multiple Access 2000 (3G)
CDR
Charging Data Record
CHEM
Coverage and Handoff Enhancements for Multimedia
CHF
Charging Function
CI
Certificate Issuer
C-IoT
Cellular IoT
CM sub
Connection Management Sublayer
CM
Connection Management
CMAS
Commercial Mobile Alert System
CO
Cloud Orchestrator
CoMP
Coordinated Multi-Point
CORD
Central Office Re-architected as Data Center
COTS
Commercial Off-the-Shelf
COUNT
Counter (security sequence)
CP
Control Plane
CP
Control Protocol (SMS)
CPA
Certified Public Accountants
CPC
Cyber-Physical Control
CPRI
Common Public Radio Interface
C-RAN
Cloud RAN
CRG
Cable Residential Gateway (5G)
CriC
Critical Communications
CS
Circuit Switched
CSC
Communication Service Customer
cSEPP
Consumer’s SEPP
CSFB
Circuit-Switched Fallback
CSI
Channel-State Information
CSI-RS
Channel-State Information Reference Signal
CSP
Communication Service Provider
CU
Centralized Unit
CU-CP
Centralized Unit, Control Plane
CUPS
Control and User Plane Separation
CU-UP
Centralized Unit, User Plane
CU-UP
CU User Plane
C-V2X
Cellular V2X
C-V2X
Cellular Vehicle-to-Everything
CWDM
Coarse Wavelength Division Multiplexing
D/A
Digital to Analogue
D2D
Device-to-Device
DANOS
Disaggregated Network Operating System
DAPS HO
Dual Active Protocol Stack-based Handover
DC
Dual Connectivity
DCSP
Data Centre Service Provider
DFT-s-OFDM
Discrete Fourier Transform spread OFDM
DL
Downlink
DLDC
Downlink Dual Carrier
DLOA
Digital Letter of Approval
DMRS
Demodulation Reference Signal
DN
Data Network
DNN
Data Network Name
DNS
Dynamic Name Server
DRB
Data Radio Bearer
DRX
Discontinuous Reception
DSF
Data Storage Function
DSS
Dynamic Spectrum Sharing
DU
Distributed Unit
DWDM
Dense Wavelength Division Multiplexing
E CID
Enhanced Cell ID
EAP
Extensible Authentication Protocol
EC-GSM-IoT
Extended Coverage GSM IoT
eCPRI
Evolved Common Public Radio Interface
eDual
Enhanced Dual Connectivity
EE
Energy Efficiency
EIR
Equipment Identity Register
eLCS
Enhanced Location Service
eMBB
Evolved Mobile Broadband
eMBMS
Evolved MBMS
eMIMO
Enhanced MIMO
eNB
Evolved NodeB (4G)
EN-DC
E-UTRA–NR Dual Connectivity
en-gNB
5G-RAN node for the EN-DC
ENUM
Electronic Number Mapping System
EPC
Evolved Packet Core (4G)
EPS
Evolved Packet System (4G)
ER
EAP Re-authentication
eSIM
Embedded SIM
E-SMLC
Evolved Serving Mobile Location Centre
eSSP
Embedded Smart Secure Platform
ETN
Edge Transport Node
ETSI
European Telecommunication Standards Institute
eUICC
Embedded UICC
EUM
eUICC Manufacturer
E-UTRA
Evolved UMTS Terrestrial Radio Access (4G)
eV2X
Enhanced Vehicle-to-Everything
FB
Fallback
FCC
Federal Communications Commission (USA)
FDA
Food and Drug Administration (USA)
FDD
Frequency Division Duplex
FEC
Forward Error Coding
FeMBMS
Further Enhanced MBMS
FF
Form Factor (SIM)
FH
Fronthaul
FMC
Fixed-Mobile Convergence (BBF)
FN-BRG
Fixed Network Broadband Residential Gateway (5G)
FN-CRG
Fixed Network Cable Residential Gateway (5G)
FN-RG
Fixed Network Residential Gateway (5G)
FQDN
Fully Qualified Domain Name
FR1
Frequency Range 1
FR2
Frequency Range 2
FRMCS
Mobile Communications System for Railways
FWA
Fixed Wireless Access
GBR
Guaranteed Bit Rate
GMLC
Gateway Mobile Location Centre
GMT
Group Message Delivery
gNB
Next Generation NodeB (5G)
GNSS
Global Navigation Satellite System
GPRS
General Packet Radio Service
GPS
Global Positioning System
GPSI
Generic Public Subscription Identifier
gPTP
Generalized Precision Timing Protocol
GSA
Global Mobile Suppliers Association
GSM
Global System for Mobile Communications (2G)
GSMA
GSM Association
GSM-R
GSM Railway
GST
Generic Network Slice Template
GUAMI
Globally Unique AMF Identifier
GUTMA
Global UTM Association
HAP
High Altitude Platform
HARQ
Hybrid Automatic Repeat Request
HB
High Band
HD
High Definition
HIBS
High Altitude IMT Base Stations
HLS
High Layer Split
HO
Handover
HPLMN
Home Public Land Mobile Network
HR
Home Routed
hSEPP
Home Security Edge Protection Proxy
HSPA
High Speed Packet Access (3G)
HSS
Home Subscription Server
HTTP
Hypertext Transfer Protocol
HW
Hardware
IAB
Integrated Access and Backhaul
IAB-MT
Mobile Terminating Integrated Access and Backhaul
IATN
Inter-Area Transport Node
IBCF
Interconnection Border Control Function
ICI
Inter-Carrier Interference
I-CSCF
Interrogating Call Session Control Function
IEEE
Institute of Electrical and Electronics Engineers
IETF
Internet Engineering Task Force
I-IoT
Industrial IoT
IKE
Internet Key Exchange
IMEI
International Mobile Equipment Identity
IMPI
IP Multimedia Private Identity
IMPU
IP Multimedia Public Identity
IMS
IP Multimedia Subsystem
IMSI
International Mobile Subscriber Identity
IMT
International Mobile Telecommunication
IMT-2000
International Mobile Telecommunications (3G)
IMT-2020
International Mobile Telecommunications (5G)
IMT-Advanced
International Mobile Telecommunications (4G)
IoT
Internet of Things
IP
Internet Protocol
IPUPS
Inter-PLMN UP Security
IPX
Internet Protocol Packet Exchange
IS-95
Interim Standard (2G)
ISD
Inter-Site Distance
ISI
Inter-Symbol Interference
I-SMF
Intermediate SMF
iSSP
Integrated Smart Secure Platform
ITU
International Telecommunications Union
ITU-R
Radio section of the International Telecommunications Union
ITU-T
Telecommunications section of the International Telecommunications Union
I-UPF
Intermediate UPF
JTACS
Japan Total Access Communications System (1G)
KDF
Key Derivation Function
KPI
Key Performance Indicator
LAA
Licensed Assisted Access
LAN
Local Area Network
LB
Low Band
LBO
Local Breakout
LBS
Location-Based Service
LCS
Location Service
LDPC
Low-Density Parity Check
LDS
Local Discovery Service
LDSd
LDS in device
LI
Lawful Interception
LMF
Location Management Function
LOS
Line Of Sight
LPA
Local Profile Assistant
LPAd
LPA in device
LPD
Local Profile Download
LPDd
LPD in device
LPLT
Low Power Low Tower
LPWA
Low-Power Wide Area
LTE
Long Term Evolution (4G)
LTE-A
LTE-Advanced (4G)
LUI
Local User Interface
LUId
LUI in device
M2M
Machine-to-Machine
MAP
Mobile Application Part
MB
Mid-Band
MBMS
Multimedia Broadcast Multicast Service
MC
Mission Critical
MC
Multi-Carrier
MCC
Mobile Country Code
MCData
Mission Critical Data
MCE
Mobile Cloud Engine
MCG
Master Cell Group
MCPPT
Mission-Critical Push-to-Talk
MCS
Modulation and Coding Scheme
MCVideo
Mission Critical Video
MCX
Mission Critical Service
MDT
Minimization of Drive Tests
ME
Mobile Equipment
MEC
Mobile-Edge Computing
MeNB
Master eNB
MeNB
See MN
MGCF
Media Gateway Control Function (IMS)
MGW
Media Gateway (IMS)
MIMO
Multiple In, Multiple Out
mIoT
Massive IoT
MIoT
Mobile IoT (combined NB-IoT and LTE-M)
ML
Machine Learning
MME
Mobility Management Entity
MMF2
Machine-to-Machine Form Factor
mMTC
Massive Machine Type Communications
MMtel
Multimedia Telephony Service
MN
Master Node
MNC
Mobile Network Code
MNO
Mobile Network Operator
MO
Mobile Originated
MOCN
Multi-Operator Core Network
MO-EDT
Mobile Originated Early Data Transmission
MPMT
Medium Power Medium Tower
MPS
Multimedia Priority Service
MR
Multi-Radio
MRB
Media Resource Broker
MRCP
Media Resource Function Processor
MR-DC
Multi-RAT Dual Connectivity
MRF
Media Resource Function
MRFC
Media Resource Function Controller
MS
Mobile Station
MSC
Mobile Switching Center
MSIN
Mobile Subscriber Identification Number
MSISDN
Mobile Station ISDN Number
MSR
Multi-Standard Radio specifications
MT
Mobile Terminal
MT
Mobile Terminated
MTC
Machine Type Communications
MTSI
Multimedia Telephony Service for IMS
MU-MIMO
Multi-User MIMO
N3IWF
Non-3GPP Interworking Function
N5CW
Non-5G-Capable over WLAN
NaaS
Network as a Service
NAI
Network Access Identifier
NAS
Non-access Stratum
NB
NodeB
NBI
Northbound Interface
NB-IoT
Narrow-Band IoT
NCC
Next Hop Chaining Counter
NCR
Neighbor Cell Relations
NE-DC
NR–E-UTRA Dual Connectivity
NEF
Network Exposure Function
NEO
Network Operations
NEP
Network Equipment Provider
NEST
Network Slice Type
NF
Network Function
NFV
Network Functions Virtualization
NFVI
Network Function Virtualization Infrastructure
NG-AP
NG Application Protocol
NGC
Next Generation Core (5G)
ng-eBB
5G Next Generation NodeB (enhanced 4G eNodeB)
NGEN-DC
NG-RAN–E-UTRA-NR Dual Connectivity (also: NE-DC)
NGFI
Next Generation Fronthaul Interface
NGMN
Next Generation Mobile Network
NG-RAN
Next Generation Radio Access Network (5G)
NH
Next Hop
NID
Network Identifier
NIDD
Non-IP Data Delivery
NLOS
Non-line Of Sight
NMO
Network Management and Orchestration
NMT
Nordic Mobile Telephone (1G)
NNI
Network-Network Interface
NOMA
Non-orthogonal Multiple Access
NOP
Network Operator
NPN
Non-public Network
NR
New Radio (5G)
NR-DC
NR–NR Dual Connectivity
NRF
Network Repository Function
NRT
Non-real Time
NR-U
NR on Unlicensed spectrum (5G)
NS
Network Slicing
NSA
Non-standalone
NSaaS
Network Slice as a Service
NSaaSC
NSaaS Customer
NSaaSP
NSaaS Provider
NSC
Network Slice Customer
NSI
Network Slice Instance
NSP
Network Slice Provider
NSSAA
Network Slice Specific Authentication and Authorization
NSSAAF
Network Slice Specific Authentication and Authorization Function
NSSAI
Network Slice Selection Assistance Information
NSSF
Network Slice Selection Function
NTN
Non-terrestrial Network
NTP
National Toxicology Program (USA)
NWDA
Network Data Analytics
NWDAF
Network Data Analytics Function
OAM
Operations Administration and Maintenance
OCP
Open Compute Project
O-CU
O-RAN Central Unit
O-DU
O-RAN Distributed Unit
OFDM
Orthogonal Frequency Division Multiplexing
OLT
Optical Line Terminal
ONAP
Open Network Automation Platform
ONU
Optical Network Unit
OOB
Out of Band leakage
OPEX
Operating Expenditure
O-RAN
Open Radio Access Network
O-RU
O-RAN Radio Unit
OS
Operating System
OSC
Orthogonal Sub-Channel
OSS
Operations Support System
OTDOA
Observed Time Difference of Arrival
P2MP
Point-to-Multipoint
PAPR
Peak-to-Average Power Ratio
PBCH
Physical Broadcast Channel
PCF
Policy Control Function
P-CSCF
Proxy Call Session Control Function
PDCCH
Physical Downlink Control Channel
PDN
Packet Data Network
PDSCH
Physical Downlink Shared Channel
PDU
Packet Data Unit
PEI
Permanent Equipment Identifier
PFD
Packet Flow Description
P-GW
Packet Data Network Gateway
Phy
Physical layer
PLMN
Public Land Mobile Network
PM
Performance Management
PNI-NPN
Public Network Integrated NPN
PoC
Proof of Concept
PON
Passive Optical Network
PRACH
Physical Random Access Channel
PRD
Permanent Reference Document (GSMA)
ProSe
Proximity Service
PRS
Positioning Reference Signal
pSEPP
Producer’s SEPP
PSS
Primary Synchronization Signal
PTP
Point-to-Point
PT-RS
Phase-Tracking Reference Signal
PTT
Push-to-Talk
PUCCH
Physical Uplink Control Channel
PUR
Preconfigured Uplink Resource
PUSCH
Physical/Primary Uplink Shared Channel
PWS
Public Warning System
QAM
Quadrature Amplitude Modulation
QCI
QoS Class Identifier
QoE
Quality of Experience
QoS
Quality of Service
QPSK
Quadrature Phase Shift Keying
RA
Random Access
RACH
Random Access Channel
RAN
Radio Access Network
RAT
Radio Access Technology
RCS
Rich Communications Services
RDS
Reliable Data Service
RET
Remote Electrical Tilt
RF
Radio Frequency
RG
Residential Gateway (5G)
RIC
Radio Access Network Intelligent Controller (O-RAN)
RL
Relay Layer (SMS)
RLC
Radio Link Control
RLF
Radio Link Failure
RN
Remote Node
R-NIB
Radio-Network Information Base
RNL
Radio Network Layer
RoI
Return on Investment
ROM
Receive Only Mode
RP
Relay Protocol (SMS)
RRC
Radio Resource Control
RRH
Remote Radio Head
RRM
Radio Resource Management
RRU
Radio Remote Unit
RTP
Real-Time Transport Protocol
RTT
Roundtrip Time
Rx
Receiver
S8HR
S8 Home Routed
SA
Standalone
SA
System Architecture group (3GPP)
SAR
Specific Absorption Rate
SAS
Security Accreditation Scheme
SAS
Service Access Point
SAS-SM
Security Accreditation Scheme for Subscription Management
SAS-UP
Security Accreditation Scheme for UICC Production
SBA
Service-Based Architecture
SBI
Southbound Interface
SCA
Smart Card Association
SCAS
Security Assurance Specification
SCG
Secondary Cell Group
SCM
Security Context Management
SCMF
Security Context Management Function
SCP
Service Communication Proxy
S-CSCF
Serving Call Session Control Function (IMS)
SC-TDMA
Single Carrier Time Division Multiple Access
SCTP
Stream Control Transmission Protocol
SD
Slice Differentiator
SDN
Software Defined Networking
SDO
Standard Development Organization
SDP
Session Description Protocol
SDU
Service Data Unit
SE
Secure Element
SEAF
Security Anchor Function
SEAL
Service Enabler Architecture Layer
SEG
Secure Gateway
SeNB
Secondary eNB
SEPP
Security Edge Protection Proxy
SFN
Single Frequency Network
SgNB
See SN
S-GW
Serving Gateway
SIB
System Information Block
SIDF
Subscription Identifier De-Concealing Function
SIM
Subscriber Identity Module
SINR
Signal-to-Noise and Interference Ratio
SIP
Session Initiation Protocol (IMS)
SLA
Service Level Agreement/Assurance
SLC
SUPL Location Center
SLF
Subscriber Location Function
SLP
SUPL Location Platform
SM
Session Management
SM
Short Message
SMARTER
Services and Markets Technology Enablers
SMC
Security Mode Command
SMC
Short Message Control
SM-DP+
Subscription Manager Data Preparation
SM-DS
Subscription Manager Discovery Server
SMF
Session Management Function
SMR
Short Message Relay
SMS
Short Message Service
SMSF
Short Message Service Function
SN
Secondary Node
SN
Serving Network
SNPN
Stand-Alone Non-Public Network
SNR
Signal-to-Noise Ratio
S-NSSAI
Single NSSAI
SOC
Service Organization Control
SoC
System on Chip
SON
Self-Organizing Network
SPC
SUPL Positioning Center
SPCF
Security Policy Control Function
SRS
Sounding Reference Signal
SRVCC
Single Radio Voice Call Continuity
SSC
Session and Service Continuity
SSP
Smart Secure Platform
SSS
Secondary Synchronization Signal
SST
Slice/Service Type
SUCI
Subscription Concealed Identifier
SUL
Supplementary Uplink
SU-MIMO
Single User MIMO
SUPI
Subscription Permanent Identifier
SUPL
Secure User Plane Location
SW
Software
TA
Tracking Area
TACS
Total Access Communication System (1G)
TAP
Transferred Account Procedure
TAS
Telephony Application Server
TBS
Terrestrial Beacon System
TCAP
Transaction Capabilities Application Part
TDD
Time Division Duplex
TDOA
Time Difference of Arrival
TIF
Transport Intelligent Function
TIP
Telecom Infra Project
TI-SCCP
Transport Independent Signaling Connection Control Part
TL
Transfer Layer (SMS)
TLS
Transport Layer Security
TMA
Tower-Mounted Amplifier
TMA
Telefonía Móvil Automática (1G)
TN
Transport Node
TNAN
Trusted Non-3GPP Access Network
TNAP
Trusted Non-3GPP Access Point
TNGF
Trusted Non-3GPP Gateway Function
TNL
Transport Network Layer
TNS
Time-Sensitive Networking
TP
Transmission Point
TR
Technical Report (3GPP)
TrGW
Transition Gateway (IMS)
TRP
Transmission and Reception Point
TS
Technical Specification (3GPP)
TSN
Time-Sensitive Networking
TSON
Time Shared Optical Network
TT
TSN Translator
TTI
Transmission Time Interval
TWAP
Trusted WLAN Access Point
TWIF
Trusted WLAN Interworking Function
Tx
Transmitter
UAS
Unmanned Aerial System
UAV
Unmanned Aerial Vehicle
UCMF
UE radio Capability Management Function
UDC
Uplink Data Compression
UDM
Unified Data Management
UDR
Unified Data Repository
UDSF
Unstructured Data Storage Function
UE
User Equipment
UI
User Identifier
UICC
Universal Integrated Circuit Card
UL
Uplink
UL-CL
Uplink Classifier
UM
Unacknowledged Mode
UMTS
Universal Mobile Telecommunications System (3G)
UNI
User-Network Interface
UP
User Plane
UPF
User Plane Function
URLLC
Ultra-Reliable Low Latency Communications
USIM
Universal Subscriber Identity Module
UST
Universal SIM Toolkit
UTM
Unmanned Aircraft Systems Traffic Management
UTM
Unmanned Traffic Management
UX
User Experience
V2I
Vehicle-to-Infrastructure
V2V
Vehicle-to-Vehicle
V2X
Vehicle-to-Everywhere
VAMOS
Voice services over Adaptive Multi-user channels on One Slot
vBBU
Virtualized BBU
ViLTE
Video over LTE
VISP
Virtualization Infrastructure Service Provider
VM
Virtual Machine
VNF
Virtual Network Functions
VoLTE
Voice over LTE (4G)
VoNR
Voice over New Radio (5G)
VoWiFi
Voice over Wi-Fi
VPLMN
Visited Public Land Mobile Network
VPN
Virtual Private Network
VR
Virtual Reality
vSEPP
Visited Network Security Edge Protection Proxy
V-SMF
Visited SMF
W-AGF
Wireline Access Gateway Function
WDM
Wavelength Division Multiplexing
WHO
World Health Organization
WiMAX
WirelessMAN-Advanced
WRC
World Radiocommunication Conference
WUS
Wakeup Signal
WWC
Wireless and Wireline Convergence
XR
Extended Reality
The fifth generation of mobile communication became a reality during 2019 as the 3rd Generation Partnership Project (3GPP) released the first set of Release 15 Technical Specifications (TS) and respective equipment, both network elements and mobile devices, to be available for commercial deployments.
Nevertheless, 3GPP Release 15 refers to the very first phase of 5G, which provides an initial, “light” version of the renewed system. In terms of 3GPP, the second phase, as defined by the Release 16 set of specifications, adds the remaining functionalities, increasing performance and becoming compliant with the strict requirements of International Mobile Telecommunications 2020 (IMT-2020) defined by the ITU-R (the radio section of the International Telecommunications Union). This is an essential step as IMT-2020 sets the reference for the interoperable, full version of the 5G, which all the parties involved with the 5G ecosystem can agree refers to the global and uniform 5G.
While the first phase of 5G is designed to augment the data rates by enhanced Mobile Broadband (eMBB) mode, Release 16 adds needed functionality to support the other base pillars of 5G as defined by the ITU, i.e., massive Machine Type Communications (mMTC) and Ultra Reliable Low Latency Communications (URLLC). The benefit of mMTC is the possibility of tackling a vast number of simultaneously communicating Internet of Things (IoT) devices, which form the very basis for the new connected society concept. URLLC, in turn, provides extremely low latency together with high availability of services for the special needs of critical communications. In addition, Release 16 brings with it more advanced means for highly efficient network management thanks to evolved self-optimizing networks and machine learning platforms.
There is a variety of novelty technologies available for adaptation into system architectures such as Network Functions Virtualization (NFV) and Software Defined Networking (SDN). Virtualization will also change the traditional business models, and open doors for completely new stakeholders such as data center operators and applications supporting Virtual Reality (VR) and Augmented Reality (AR).
The second phase of 5G is already sufficiently capable of providing a functional and performant platform for highly advanced service types in a dynamic manner by using of a variety of use cases. This happens via Network Slicing (NS), which is available for deployment along with Release 16.
One of the important aspects in this evolution is to guarantee a sufficient level of interoperability between 5G networks for fluent user experiences. 3GPP standards as such are insufficient in this area as we have seen already with previous generations. Thus, there is a need to set guidelines for a feasible, minimum set of features and methods that would work among all operators within the ecosystem. As an example, the GSM Association (GSMA) is in a key position to define such recommendations for, e.g., roaming scenarios for voice and text services as well as for the interworking of packet data connections and subscription management over all the involved networks.
This book presents new key functionalities of Release 16 that complement the first phase of 5G. The book is thus an addition to the contents of the already published 5G Explained book, providing further descriptions to understand the complete picture of the full version of 5G. Whereas the first book presented the basics, this second book complements it by presenting up-to-date functionalities of Release 16, and some of the indications of the technological topics under development for the forthcoming Release 17 and beyond. This new book adds relevant descriptions in a modular way so that the reader can reference both books.
A number of countries launched their initial 5G networks by the end of 2019. The year 2019 was in fact of utmost importance for 5G smartphone launches, and the World Radiocommunication Conference 2019 (WRC-19) added and aligned 5G frequency bands for the further optimization of radio.
End-users have been able to use commercial mobile communication networks since the 1980s. The systems at that time were first generation, and offered mainly voice service via analogue channels [1].
1G refers to analogue, automatic mobile networks that handled only voice calls, although data transfer was possible via a data modem adapted to the terminal, or via a handful of devices embedding such functionality into the device itself. The initial systems used vehicle-mounted and portable devices for voice communications. The weight of such devices was typically several kilograms. Some examples of this first phase of 1G were Nordic NMT-450, French Radiocom 2000, Spanish TMA, German Netz-C, the UK’s TACS, Japanese JTACS, and American AMPS. As 1G matured, hand-held devices also became popular. The first ones were big and heavy compared to modern devices. An example of this latter phase was the NMT-900 system, which was launched in Nordic countries in 1986–1987.
2G represents digital systems that integrate data services and messaging. Examples of this generation are Global System for Mobile Communications (GSM) and Interim Standard-95 (IS-95). GSM was launched commercially in 1991, and unlike other 2G variants at that time, it was based on a Subscriber Identity Module (SIM) that housed subscription-related data.
SIM has evolved ever since. It is still a useful platform for storing a user’s unique key, which is the basis for authentication and authorization of the user, and serves also for radio interface encryption. It is a hardware-based Secure Element (SE). 5G will rely on SIM, too, in one or another form.
2G data speeds were originally as low as 9.6 kb/s, and the service used circuit-switched connectivity. The ETSI/3GPP designed General Packet Radio Service (GPRS) that operators started to deploy in commercial markets as early as 2000, based on the European Telecommunication Standards Institute (ETSI) Release 97. It opened up the era of mobile packet-switched IP data over cellular networks. The data speed has increased along with the further evolution of GSM. Using multislot and multicarrier technologies, speed can nowadays be over 1 Mb/s depending on the service support on the network and device, e.g., by applying dual carrier and multislot techniques such as Downlink Dual Carrier (DLDC). Also, the voice capacity of GSM can be enhanced by offering the same number of voice calls within a reduced spectrum by applying Orthogonal Sub-Channel (OSC) and VAMOS (Voice services over Adaptive Multi-user channels on One Slot (VAMOS) [2].
Due to low spectral efficiency and security, the importance of 2G is decreasing and operators are refarming it for use with other systems. Nevertheless, 2G is still used in many markets for consumer and Machine-to-Machine (M2M) communications such as wireless alarm systems; therefore, only time will tell when 2G will no longer be relevant.
3G was a result of further development of multimedia-capable systems that provided much faster data speeds. 3G is thus a mobile multimedia platform. ITU’s IMT-2000 sets the performance requirements for 3G systems. There are various commercial 3G systems such as US-originated cdma2000 and 3GPP-based Universal Mobile Telecommunications Service/High Speed Packet Access (UMTS/HSPA). 3G networks have evolved since their commercial launch at the beginning of 2000, and today they are capable of supporting tens of Mb/s data speeds.
4G continued with the “tradition” of renewed generations. The ITU-R designed a set of IMT-Advanced requirements for 4G systems. There are two commercial systems complying with them: LTE-Advanced (LTE-A) specified as of 3GPP Release 10, and WirelessMAN-Advanced (WiMAX), which is based on the IEEE 802.16 evolution. Oftentimes in the commercial field, the industry considers that Long Term Evolution (LTE) Releases 8 and 9 belong to the 4G era, and there have been operators interpreting even HSPA+ to be part of 4G. Nevertheless, referring strictly to IMT-Advanced, they are merely representatives of 3G technologies. Nowadays, the significance of WiMAX has decreased considerably, leaving LTE-A as the only relevant representative of the 4G era. Today, 4G offers hundreds of Mb/s data speeds.
5G refers to systems beyond IMT-Advanced that comply with the new ITU IMT-2020 requirements. 5G provides much higher data speeds. 3GPP specified the “full version” of 5G, i.e. Release 16, in the second half of 2020. The initial 5G, as defined in 3GPP Release 15, is oftentimes called phase 1 5G, whereas Release 16 represents phase 2 5G. The latter will comply with the strict requirements of IMT-2020, making it a complete 5G that provides customers with a full set of services and highest performance.
As new generations take over and customers start enjoying their enhanced and much more spectrum-efficient performance, previous generations gradually lose their users and can eventually be decommissioned, as can be seen from the example set by 1G systems in 2000. Although 2G and 3G still have important use bases, including IoT devices, operators may already be considering decommissioning strategies.
Meanwhile, many operators refarm 2G and possibly 3G bands to 4G and 5G to optimize the use of the spectrum. In this transition phase, the already existing base station sites and possibly part of their equipment are reusable, including power supplies and transport lines.
Each generation goes through a series of enhancements during its lifecycle. Since the very initial deployments of 2G, the data services of each generation have continued evolving, providing users with constantly enhancing performance and capacity. As depicted in Figure 1.1, we can see that each new generation has provided at least 10-fold data speed ranges for customers compared to the previous generation.
Figure 1.1 Mobile generations vs. downlink data speed evolution.
5G is no exception; so, while LTE-A is capable of delivering some hundreds of Mb/s up to about the 1 Gb/s range, the eMBB mode of 5G can be assumed to handle Downlink (DL) data speeds of around 10–20 Gb/s.
3GPP TS 22.261 presents the service requirements for the next generation of new services and markets for Releases 15, 16, and 17 [3]. The document released in July 2020, V17.3.0 (2020–2007), describes the service and operational requirements for a 5G system, including User Equipment (UE), Next Generation Radio Access Network (NG-RAN), and 5G core network, while the requirements for the Dual Connectivity (DC) between 5G Evolved UMTS Terrestrial Radio Access (5G E-UTRA) and New Radio (NR) in the scenarios for the 5G Evolved UTRA Network (5G E-UTRAN) connected to 4G Evolved Packet Core (EPC) are presented in 3GPP TS 22.278 [4].
5G refers to the fifth generation of mobile communication systems. It represents mobile telecommunication standards beyond 4G LTE, and will comply with the strict IMT-2020 requirements of the ITU-R.
5G provides much faster data speeds with very low latency compared to legacy systems. 5G also supports a higher number of devices communicating simultaneously. 5G is capable of handling much more demanding mobile services than was ever possible before, including tactile Internet and VR applications, which will provide completely new and highly attractive user experiences.
As LTE and its evolution, LTE-A, have been a success story serving a growing base of customers, one might ask why we need yet another generation. The answer follows the same pattern as all the previous generations: as their performance reaches a practical limit, it makes more sense to provide services using more spectral, efficient, and performant new systems instead of trying to enhance legacy platforms.
