SlideShare a Scribd company logo
1 of 27
Download to read offline
5G JumpStart 101
*unofficial guide to Nokia Certified 5G Associate
WhoMe: Babar Haq
Total of 20+ years’ experience of Integration, Security & Optimization of Converged IP Networks
& Wireless Broadband Services in MENA, EMEA and APAC regions. Nokia Certified 5G Slicing
& Security Professional, 1st Person Certified Worldwide.
Bug Reports: haqbabar@gmail.com
Pillars of 5G:
5G E2E networks have four outstanding capabilities over 4G networks.
The four capabilities are ultra-broadband access, massive IoT connectivity,
ultra-reliable low latency, and E2E network slicing. Ultra-Broadband
Access.
Hyper Fast Broadband Networking (<1Gbps)
Evolved Radio Access Technology (Open/Cloud RAN)
Ultra Dense Networks (Small/Femto Cells)
SON Self optimization networks (Self Optimization and healing)
Massive Machine Type communication MMTC (1milltion devices per Km)
mm-Wave ultra-high frequency use (above 6GHZ)
Backhaul split into Front /Mid/Back Haul transport network
Ultra Reliable Low Latency Communication URLLC
Cloud Native NFV Core (DSN, VM, Containers virtualization)
Slicing & NPN nonpublic networks use of RAN/TX/Core slices
WIFI (Non 3GPP) internetworking, seamless handovers
Highly secure (Secure SUCI/SUPI instead of 4G IMSI during signaling)
5G Use Cases:
Hyper Fast Broadband Internet (10Gbps)
Smart Homes (IoT sensors use)
Smart city center (i.e. public safety, surveillance, electric grids)
Industrial IoT (Mobile IoT sensors Industry 4.0)
Self-driving autonomous vehicles (V2X, logistics, fleet management)
Virtual Reality (XR/AR/VR)
Medical (remote patient care)
Non terrestrial networking (drones, UAV)
Defense and Mining Industry use of NPN (Non public networks)
3GPP Evolution:
Tech Age Throughput
Mobile
Throughput
Stationary
3G 2001 384Kbps 40Mbps
4G 2011 100Mbps 1Gbps
6G 2020 1G 10Gbps
 LTE Rel 8 - 9
 LTE-A Rel 10 - 11
 LTE-B Rel 12 - 14
 5G Rel 15 – 17
 5G-A Rel 18
5G QOS:
4G QCI: (1 ERAB + 1 PDP)
5G 5QI: Multiple RB Radio Bearer to 1 PDU (PDP in LTE) single tunnel
multiple flows
QFI: QoS Flow ID mapping APP to Radio Barer , GBR, Non GBR, Low
Latency
5G Open Cloud RAN:
Standard Bodies: 3GPP, ORAN Alliance, GSMA
5G O-RAN: An Open Radio Access Network (O-RAN) is a totally
disaggregated approach to deploying mobile fronthaul and midhaul
networks built entirely on cloud native principles. Radio nodes are
distributed into RU-DU-CU.
CPRI: Common Public Radio Interface, or CPRI, is an evolving
specification for wireless communications networks defined by a
consortium of original equipment manufacturers. The specification relates
to the communication link between baseband units and remote radio units
5G NR New Radio:
 5G New Radio (NR) is the global standard for a unified, more capable 5G wireless air
interface. It will deliver significantly faster and more responsive mobile broadband
experiences, and extend mobile technology to connect and redefine a multitude of new
industries.
 Massive MIMO, is an extension of MIMO, which essentially groups together
antennas at the transmitter and receiver to provide better throughput and better
spectrum efficiency
 Millimeter waves — often referred to as mmWaves or high-band 5G — are frequencies
starting at 24 GHz and beyond. As radio waves increase in frequency, each wave
narrows in length. Because of its high frequencies, mmWave has a limited range of only
300 to 500 feet and struggles to penetrate buildings
 The 5G spectrum is a range of radio frequencies in the sub-6 GHz range and the
millimeter-wave (mmWave) frequency range that is 24.25 GHz and above. The 5G
spectrum refers to the radio frequencies that carry data from user equipment (UE) to
cellular base stations to the data's endpoint.
.
 TTI, Transmission Time Interval, is a parameter in UMTS and 5GNR related to
encapsulation of data from higher layers into frames for transmission on the radio
link layer. TTI refers to the duration of a transmission on the radio link.
5GC Core:
 Access and Mobility Management function (AMF) supports: Termination of
NAS signaling, NAS ciphering & integrity protection, registration management,
connection management, mobility management, access authentication and
authorization, security context management. (AMF has part of the MME
functionality from EPC world)
 Session Management function (SMF) supports: session management (session
establishment, modification, release), UE IP address allocation & management,
DHCP functions, termination of NAS signaling related to session management,
DL data notification, traffic steering configuration for UPF for proper traffic
routing. (SMF has part of the MME and PGW functionality from EPC world)
 User plane function (UPF) supports: packet routing & forwarding, packet
inspection, QoS handling, acts as external PDU session point of interconnect to
Data Network (DN), and is an anchor point for intra- & inter-RAT mobility. (UPF
has part of the SGW & PGW functionality from EPC world)
 Policy Control Function (PCF) supports: unified policy framework, providing
policy rules to CP functions, access subscription information for policy decisions
in UDR. (PCF has part of the PCRF functionality from EPC world)
 Authentication Server Function (AUSF) acts as an authentication server. (part
of HSS from EPC world)
 Unified Data Management (UDM) supports: generation of Authentication and
Key Agreement (AKA) credentials, user identification handling, access
authorization, subscription management. (part of HSS functionality from EPC
world)
 Application Function (AF) supports: application influence on traffic routing,
accessing NEF, interaction with policy framework for policy control. (same as AF
in EPC world)
 Network Exposure function (NEF) supports: exposure of capabilities and
events, secure provision of information from external application to 3GPP
network, translation of internal/external information. (not present in EPC world)
 NF Repository function (NRF) supports: service discovery function, maintains
NF profile and available NF instances. (not present in EPC world)
 Network Slice Selection Function (NSSF) supports: selecting of the Network
Slice instances to serve the UE, determining the allowed NSSAI, determining the
AMF set to be used to serve the UE. (not present in EPC world)
UDSF: Unstructured Data Storage Function In 5G, the UDSF supports data
storage for stateless network functions. That is, rather than a given
network function holding its own storage resources, it will instead store UE
context data in the UDSF.
5G Service-based architecture: The 3GPP defines a Service-Based
Architecture (SBA), whereby the control plane functionality and common
data repositories of a 5G network are delivered by way of a set of
interconnected Network Functions (NFs), each with authorization to access
each other's services.
Stateless network functions: 5G network functions are designed to be
stateless. Separating state from the control, allows control to run on a
compute resource and state can be saved at a separate storage node.
Apart from enhancing reliability by maintaining redundancy of storage
nodes, this statelessness also aids in dynamic instantiation/scaling of
virtual network functions corresponding to the 5G network functions.
NSA (Non-Standalone Access) and SA (Standalone Access) are the
two 5G network modes. NSA relies on the 4G network facilities to provide
more speed and higher data bandwidth. A 5G-enabled smartphone will
connect to a 5G or 4G network depending on conditions.
5G V2X:
CITS: Common Intelligent Transport Infrastructure
CAV: Connected Autonomous Vehicle
V2X: Vehicle to anything/everything
RSU: Road side unit
Vehicle to Infrastructure (V2I) - V2I involves your car communicating with
things like traffic lights and road work signs. This will give you information
on their environment and on what lies ahead.
Vehicle to Vehicle (V2V) - V2V establishes a link between two vehicles,
allowing them to share sensor and planned route data.
Vehicle to Network (V2N) - V2N means cars will be able to communicate
with the Internet. This will enable things like advanced navigation based on
maps.
Vehicle to Pedestrian (V2P) - V2P will allow vehicles and pedestrians to
exchange information, hopefully limiting pedestrian accidents.
Vehicle to Device (V2D) - V2D will enable cars to exchange information
with devices in general. This will include things like self-parking sensors in
parking garages.
Vehicle to Grid (V2G) - V2G can help with power planning as electric cars
can tell the grid about their current and projected power needs.
5G Security
SIM card key length 128-256 bit optional
SOAR: SOAR stands for Security Orchestration, Automation, and Response. SOAR
platforms are a collection of security software solutions and tools for browsing and collecting
data from a variety of sources, logs. Use of AI/ML and scripting to automate threat response..
Dual mode: dual mode vulnerability when 5g UE connects to 4g core 5g
security weakened at 4g level
Standalone mode secure 5g UE connects to 5G Radio and 5G port
Beam forming attack: attacker can pin point UE location but not possible
to eavesdrop
Possible attacks: UE capability sensing, battery drain, DOS attack,
location tracking bidding down to 3G 4G
New features DTLS over SCTP, IPsec over N2, N3, Xn, IP Transport
Interfaces
5G roaming security additional SEPP nodes (security end point protection
proxy) signaling between home and visited networks.
SUPI/ SUCI replaces subscriber IMSI identifier with concealed and
encrypted identities.
 Various 5G network security responsibilities fall on both user
equipment and the network infrastructure.
 Data confidentiality and integrity are emphasized in the 3GPP
standard, primarily using encryption algorithms, also called cipher
algorithms, to protect the data.
 Both user equipment and network infrastructure are required to
protect the encryption keys for the algorithms through encryption,
tamper-resistant hardware, or being in a secure physical location.
 Authentication and authorization are also important for both user
equipment and network infrastructure so user equipment and other
networks can be confirmed as authorized equipment and networks
Three aspects of security:
1 — Confidentiality
Which ensures no unauthorized entity can read the communication. To ensure wireless
communication is confidential it is encrypted, and the encryption is done hop-by-hop in
the network. So, at both RAN and CN, the unencrypted information is available.
2 — Integrity
Which ensures no unauthorized entity can modify the communication. To ensure this
wireless communication is integrity protected, integrity is also implemented hop-by-hop
in the network. So, the information is available at both RAN and CN to be tampered
with.
3 — Availability
Which ensure that communication service is available uninterrupted to the users. This
also has to be ensured at both the RAN and CN level, as both can contribute to service
discontinuity.
5G Network Slicing
5G network slicing is a network architecture that enables the multiplexing of
virtualized and independent logical networks on the same physical network
infrastructure. Each network slice is an isolated end-to-end.
 Networks can have hundreds of slices but a UE can support only 8
slices.
 Slice provides Security isolation and Resource isolation.
 NSSAI (Network Slice Selection Assistance Information)
comprised of SD (Slice Differentiator) and SST (Slice Service
Type)
 Network Slice Selection Function (NSSF): NSSF helps in setting
up multiple virtual network slices of the RAN, core and transport
networks to meet specific service requirements.
5G Cloud Architecture
In order to facilitate network traffic from billions of connected nodes and the
coming wave of new compute-intensive 5G applications, networks must
transform to be able to deliver faster speeds, lower latency, and more
capacity. Cloudification prepares for 5G’s 10X less latency, 100X faster
speed, and 1000X more capacity, laying the foundation for revolutionary
customer experiences, business efficiencies, and products and services.
5G NFV: 5G NFV uses virtualization technologies for all categories of
network node operations on building blocks that can be connected to
create advanced communication services. NFV is based on traditional
server-virtualization techniques, ie, the separation of a physical server for
multiple smaller virtual servers, however, with the help of virtualization
software.
Cloud Models IAAS, PAAS and SAAS
IAAS: The IaaS model shares hardware resources among the users.
Cloud providers typically bill IaaS services according to the utilization of
hardware resources by the users.
PAAS: The IaaS model shares hardware resources among the users.
Cloud providers typically bill IaaS services according to the utilization of
hardware resources by the users.
SAAS: The SaaS model is the software layer. In the SaaS layer, clients are
not allowed to modify the lower levels such as hardware resources and
application platform.
Cloud Elasticity: The Elasticity refers to the ability of a cloud
to automatically expand or compressed the infrastructural resources on
a sudden-up and down in the requirement so that the workload can be
managed efficiently.
Virtualization sprawl is a phenomenon that occurs when the number of
virtual machines (VMs) on a network reaches a point where administrators
can no longer manage them effectively. Virtualization sprawl is also
referred to as virtual machine sprawl, VM sprawl or virtual server sprawl.
COTS (Commercial off-the-Shelf Servers): AKA “Cheap Intel Servers”
Hybrid Cloud: Hybrid cloud computing is an environment that combines
public clouds and private clouds by allowing data and applications to be
shared between them. Private Cloud is an environment where Compute
and Storage servers are owned by the user, while Public Cloud is when the
equipment is owned by a vendor ie Microsoft, AWS.
MEC: (Mobile Edge Computing) is a distributed computing framework
that brings enterprise applications closer to data sources such as IoT
devices or local edge servers. This proximity to data at its source can
deliver strong business benefits, including faster insights, improved
response times and better bandwidth availability.
Hypervisors: Hypervisor is computer software, firmware or hardware that
creates and runs virtual machines. A computer on which a hypervisor runs
one or more virtual machines is called a host machine, and each virtual
machine is called a guest machine.
Type 1: Type 1 hypervisor run directly on the host’s physical
hardware without loading the attack-prone underlying OS, making them
very efficient and secure.
Type 2: Type 2 hypervisors are also known as hosted hypervisors,
because they are installed on existing OSs, and rely on them for
virtualization and resource management.
Common Products: VM-ware vSphere, Microsoft Hyper V, Xen Server,
KVM, Redhat Virtualization.
Containers: containers hold individual applications and their corresponding
software, commands, and configurations. This allows applications to be
transferred to different cloud or OS environments without having integration
or run issues because of the change in environment.
Container Name-Space: isolates the applications from each other within
single or multiple container' scope. When multiple processes / services are
being run on multiple containers (on a single host system) then such
isolation is a necessity from security and stability standpoints.
SDN (Software Defined Networking)
SDN attempts to centralize network intelligence in one network component
by disassociating the forwarding process of network packets (data plane)
from the routing process (control plane). The control plane consists of one
or more controllers, which are considered the brain of the SDN network
where the whole intelligence is incorporated.
OpenFlow: OpenFlow is a communications protocol that gives access to
the forwarding plane of a network switch or router over the network.
Controller: SDN controller is a software system or collection of systems
that together provides: Management of network state, and in some cases,
the management and distribution of this state, may involve a database.
Flow Table: In OpenFlow for packet-based network, each switch contains
a flow-table. Each flow-table entry header specifies a flow and an
associated action to be taken towards an incoming packet matching the
respective entry.
Traffic Engineering: Traffic Engineering is a method that helps to optimize
the performance and efficiency of the movement of people, goods, and
transportation. Traffic engineering looks at the whole picture in order to
maximize traffic flow and reduce instances of congestion.
SON (Self Organizing Networks)
5G SON: SON (Self-Organizing Network) technology minimizes the
lifecycle cost of running a mobile network by eliminating manual
configuration of network elements at the time of deployment, right through
to dynamic optimization and troubleshooting during operation. Besides
improving network performance and customer experience, SON can
significantly reduce the cost of mobile operator services, improving the
OpEx-to-revenue ratio and deferring avoidable CapEx.
Introduced in LTE (3GPP Rel.8)
As 5G has massive Femto/ Small cell dense deployment, SON will be
needed as manual configuration management is not possible.
Self-Configuration: PNP Automatic software download, automatic
neighbor relationship, DNS MME SGW IP Address Software configuration.
Self-Optimization: Neighbor Selection, UE Measurement, Frequency
Selection, Load balancing.
Self-Healing: Outage management, Neighbor power selection,
Interference management.
EMS (Element Management System): KPI Measurements, SON
controller.
Voice over 5G:
High Definition voice quality support
No circuit voice support, No 2g 3g handover
5G to 4G and 5G to Wi-Fi seamless handover
EPS Fallback 5G to 4G VOLTE, afterwards CS fallback/SRVCC to 3G 2G
5G MMTC:
mMTC: mMTC focuses on IoT applications which requires mass
deployment of billions of low-cost, low-powered devices and sensors.
Some of the 5G applications which come under this use case are :
➢ Smart Cities, Smart Homes and Smart Buildings
➢ Intelligent Agriculture Systems
➢ Patient Monitoring Systems
➢ Traffic Management Systems
Battery life of upto 10 years at 200 byte UL
Coverage Density 1,000,000 devices/ km^2
Latency <10s with 20 byte payload
Price – Ultra low cost
Features: Multicast, location awareness, Mobility
5G URLLC:
Ultra-reliable low latency communications (URLLC) is one of the key pillars
of 5G New Radio (NR). As the underlying feature required to support dense
sensor grids of IoT endpoints, it is a primary enabler for a number of unique
use cases in the areas of manufacturing, energy transmission,
transportation and healthcare. With the need to support end-to-end
latencies as low as 5ms, the delay budget for individual interfaces can be
as low as 1ms. This means that optimizations must be made at every step
of the uplink and down link transmission process. While outside the scope
of 3GPP specifications, the need to reduce data processing response times
is also leading to the emergence of highly distributed edge computing
strategies.
Smart factory/industrial automation
Healthcare industry
Intelligent transportation (fleet / logistics)
Entertainment and media (AR/VR Gaming)
Smart electricity grid
5G EMBB:
Enhanced Mobile Broadband: improvement on that which is currently
used for cellular data. It provides speeds of up to 10Gbps for high
bandwidth usage such as HD video streaming or VR/AR gaming, providing
faster download speeds and improved user experiences
WiFi Internetworking:
N3IWF: Non-3GPP Internetworking Function: Gateway to connect 5GC
to Wifi Access Point.
ATSSS: Access Traffic Steering, Switching, Splitting
“Steering” refers to the possibility of selecting for user-plane traffic,
according to the service (QoS-type for a data flow), the best link to use
“Switching” describes the possibility of performing handover without
service interruption to the other link when necessary
“Splitting” means the simultaneous use (bonding) of the two links.
5G Wired Broadband:
The AGF provides AAA services plus hierarchical traffic shaping and
policing for fixed network (FN) and 5G residential gateways (RGs) being
served from a standard 3GPP User Plane Function (UPF) within a common
5G Core (5GC).
ATSSS applies the same rules as WIFI.
5G small cell
Small cells are low-powered cellular radio access nodes that operate in
licensed and unlicensed spectrum that have a range of 10 meters to a few
kilometers and that are typically backhaul connected via wired connections.
5G JumpStart 101 Guide

More Related Content

What's hot

An Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5GAn Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5G3G4G
 
CIS2016 - MCPTT Connect
CIS2016 - MCPTT ConnectCIS2016 - MCPTT Connect
CIS2016 - MCPTT ConnectAdam Lewis
 
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 20193G4G
 
Advanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public NetworksAdvanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public Networks3G4G
 
Transforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksTransforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksQualcomm Research
 
5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_ModesAalekh Jain
 
5G Network Architecture and FMC
5G Network Architecture and FMC5G Network Architecture and FMC
5G Network Architecture and FMCITU
 
FDD_LTE_19_New_Feature_Document.pdf.pdf
FDD_LTE_19_New_Feature_Document.pdf.pdfFDD_LTE_19_New_Feature_Document.pdf.pdf
FDD_LTE_19_New_Feature_Document.pdf.pdfssusere571261
 
Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GPrateek Aloni
 
Technical Paper: 5G Standalone Architecture
Technical Paper: 5G Standalone ArchitectureTechnical Paper: 5G Standalone Architecture
Technical Paper: 5G Standalone ArchitectureMassimo Talia
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)3G4G
 
Physical layer of 5 g
Physical layer of 5 gPhysical layer of 5 g
Physical layer of 5 gPeriyanayagiS
 
Cognitive Radio in 5G
Cognitive Radio in 5GCognitive Radio in 5G
Cognitive Radio in 5GHavar Bathaee
 
Nokia Small Cell Portfolio_Oct 2023.pptx
Nokia Small Cell Portfolio_Oct 2023.pptxNokia Small Cell Portfolio_Oct 2023.pptx
Nokia Small Cell Portfolio_Oct 2023.pptxteletalkinnovation
 
Beginners: Non Terrestrial Networks (NTN)
Beginners: Non Terrestrial Networks (NTN)Beginners: Non Terrestrial Networks (NTN)
Beginners: Non Terrestrial Networks (NTN)3G4G
 

What's hot (20)

An introduction to 5G
An introduction to 5GAn introduction to 5G
An introduction to 5G
 
An Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5GAn Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5G
 
CIS2016 - MCPTT Connect
CIS2016 - MCPTT ConnectCIS2016 - MCPTT Connect
CIS2016 - MCPTT Connect
 
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 2019
 
Advanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public NetworksAdvanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public Networks
 
Transforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksTransforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networks
 
5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes
 
5G Network Architecture and FMC
5G Network Architecture and FMC5G Network Architecture and FMC
5G Network Architecture and FMC
 
FDD_LTE_19_New_Feature_Document.pdf.pdf
FDD_LTE_19_New_Feature_Document.pdf.pdfFDD_LTE_19_New_Feature_Document.pdf.pdf
FDD_LTE_19_New_Feature_Document.pdf.pdf
 
5g introduction_NR
5g introduction_NR5g introduction_NR
5g introduction_NR
 
5gc call flow
5gc call flow5gc call flow
5gc call flow
 
Analysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4GAnalysis of 1G, 2G, 3G & 4G
Analysis of 1G, 2G, 3G & 4G
 
Technical Paper: 5G Standalone Architecture
Technical Paper: 5G Standalone ArchitectureTechnical Paper: 5G Standalone Architecture
Technical Paper: 5G Standalone Architecture
 
5 g core overview
5 g core overview5 g core overview
5 g core overview
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)
 
5G Handover.pptx
5G Handover.pptx5G Handover.pptx
5G Handover.pptx
 
Physical layer of 5 g
Physical layer of 5 gPhysical layer of 5 g
Physical layer of 5 g
 
Cognitive Radio in 5G
Cognitive Radio in 5GCognitive Radio in 5G
Cognitive Radio in 5G
 
Nokia Small Cell Portfolio_Oct 2023.pptx
Nokia Small Cell Portfolio_Oct 2023.pptxNokia Small Cell Portfolio_Oct 2023.pptx
Nokia Small Cell Portfolio_Oct 2023.pptx
 
Beginners: Non Terrestrial Networks (NTN)
Beginners: Non Terrestrial Networks (NTN)Beginners: Non Terrestrial Networks (NTN)
Beginners: Non Terrestrial Networks (NTN)
 

Similar to 5G JumpStart 101 Guide

Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Alidu Abubakari
 
Qualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from PatentsQualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Zigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iotZigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for ioteSAT Publishing House
 
5G complete presentation 2016 upload
5G complete presentation 2016 upload5G complete presentation 2016 upload
5G complete presentation 2016 uploadNishanth C
 
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESVLSICS Design
 
Zigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesZigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesVLSICS Design
 
Zigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applicationsZigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applicationsgoodgood
 
92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasar92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasarNasar Mohammed
 
ET_M.Tech_.SEM I_BWT_MMD_ MODULE 5.ppt
ET_M.Tech_.SEM I_BWT_MMD_ MODULE 5.pptET_M.Tech_.SEM I_BWT_MMD_ MODULE 5.ppt
ET_M.Tech_.SEM I_BWT_MMD_ MODULE 5.pptAquibKhan273848
 
Next-Generation Wireless Overview & Outlook Update 12/8/21
Next-Generation Wireless Overview & Outlook Update 12/8/21Next-Generation Wireless Overview & Outlook Update 12/8/21
Next-Generation Wireless Overview & Outlook Update 12/8/21Mark Goldstein
 
How will sidelink bring a new level of 5G versatility.pdf
How will sidelink bring a new level of 5G versatility.pdfHow will sidelink bring a new level of 5G versatility.pdf
How will sidelink bring a new level of 5G versatility.pdfQualcomm Research
 
Intelligent Remote Monitoring of Parking Spaces Using Licensed and Unlicensed...
Intelligent Remote Monitoring of Parking Spaces Using Licensed and Unlicensed...Intelligent Remote Monitoring of Parking Spaces Using Licensed and Unlicensed...
Intelligent Remote Monitoring of Parking Spaces Using Licensed and Unlicensed...PremChand190
 

Similar to 5G JumpStart 101 Guide (20)

Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
 
5G network architecture progress
5G network architecture progress5G network architecture progress
5G network architecture progress
 
5g TECHNOLOY
5g TECHNOLOY5g TECHNOLOY
5g TECHNOLOY
 
Qualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from PatentsQualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from Patents
 
Comm-seminar
Comm-seminarComm-seminar
Comm-seminar
 
5G 2
5G 25G 2
5G 2
 
Zigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iotZigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iot
 
5G complete presentation 2016 upload
5G complete presentation 2016 upload5G complete presentation 2016 upload
5G complete presentation 2016 upload
 
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICESZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
ZIGBEE TRANSMITTER FOR IOT WIRELESS DEVICES
 
Zigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless DevicesZigbee Transmitter for IoT Wireless Devices
Zigbee Transmitter for IoT Wireless Devices
 
Zigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applicationsZigbee sensor network integrated with 4 g for iot applications
Zigbee sensor network integrated with 4 g for iot applications
 
92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasar92863888 5g-technology-ppt-by-nasar
92863888 5g-technology-ppt-by-nasar
 
ET_M.Tech_.SEM I_BWT_MMD_ MODULE 5.ppt
ET_M.Tech_.SEM I_BWT_MMD_ MODULE 5.pptET_M.Tech_.SEM I_BWT_MMD_ MODULE 5.ppt
ET_M.Tech_.SEM I_BWT_MMD_ MODULE 5.ppt
 
Next-Generation Wireless Overview & Outlook Update 12/8/21
Next-Generation Wireless Overview & Outlook Update 12/8/21Next-Generation Wireless Overview & Outlook Update 12/8/21
Next-Generation Wireless Overview & Outlook Update 12/8/21
 
dan-web5g.pptx
dan-web5g.pptxdan-web5g.pptx
dan-web5g.pptx
 
5 g technology
5 g technology5 g technology
5 g technology
 
How will sidelink bring a new level of 5G versatility.pdf
How will sidelink bring a new level of 5G versatility.pdfHow will sidelink bring a new level of 5G versatility.pdf
How will sidelink bring a new level of 5G versatility.pdf
 
Je
JeJe
Je
 
5.pptx
5.pptx5.pptx
5.pptx
 
Intelligent Remote Monitoring of Parking Spaces Using Licensed and Unlicensed...
Intelligent Remote Monitoring of Parking Spaces Using Licensed and Unlicensed...Intelligent Remote Monitoring of Parking Spaces Using Licensed and Unlicensed...
Intelligent Remote Monitoring of Parking Spaces Using Licensed and Unlicensed...
 

5G JumpStart 101 Guide

  • 1. 5G JumpStart 101 *unofficial guide to Nokia Certified 5G Associate WhoMe: Babar Haq Total of 20+ years’ experience of Integration, Security & Optimization of Converged IP Networks & Wireless Broadband Services in MENA, EMEA and APAC regions. Nokia Certified 5G Slicing & Security Professional, 1st Person Certified Worldwide. Bug Reports: haqbabar@gmail.com
  • 2. Pillars of 5G: 5G E2E networks have four outstanding capabilities over 4G networks. The four capabilities are ultra-broadband access, massive IoT connectivity, ultra-reliable low latency, and E2E network slicing. Ultra-Broadband Access. Hyper Fast Broadband Networking (<1Gbps) Evolved Radio Access Technology (Open/Cloud RAN) Ultra Dense Networks (Small/Femto Cells) SON Self optimization networks (Self Optimization and healing) Massive Machine Type communication MMTC (1milltion devices per Km) mm-Wave ultra-high frequency use (above 6GHZ) Backhaul split into Front /Mid/Back Haul transport network Ultra Reliable Low Latency Communication URLLC Cloud Native NFV Core (DSN, VM, Containers virtualization) Slicing & NPN nonpublic networks use of RAN/TX/Core slices WIFI (Non 3GPP) internetworking, seamless handovers Highly secure (Secure SUCI/SUPI instead of 4G IMSI during signaling)
  • 3. 5G Use Cases: Hyper Fast Broadband Internet (10Gbps) Smart Homes (IoT sensors use) Smart city center (i.e. public safety, surveillance, electric grids) Industrial IoT (Mobile IoT sensors Industry 4.0) Self-driving autonomous vehicles (V2X, logistics, fleet management) Virtual Reality (XR/AR/VR) Medical (remote patient care) Non terrestrial networking (drones, UAV) Defense and Mining Industry use of NPN (Non public networks)
  • 4. 3GPP Evolution: Tech Age Throughput Mobile Throughput Stationary 3G 2001 384Kbps 40Mbps 4G 2011 100Mbps 1Gbps 6G 2020 1G 10Gbps  LTE Rel 8 - 9  LTE-A Rel 10 - 11  LTE-B Rel 12 - 14  5G Rel 15 – 17  5G-A Rel 18 5G QOS:
  • 5. 4G QCI: (1 ERAB + 1 PDP) 5G 5QI: Multiple RB Radio Bearer to 1 PDU (PDP in LTE) single tunnel multiple flows QFI: QoS Flow ID mapping APP to Radio Barer , GBR, Non GBR, Low Latency 5G Open Cloud RAN: Standard Bodies: 3GPP, ORAN Alliance, GSMA 5G O-RAN: An Open Radio Access Network (O-RAN) is a totally disaggregated approach to deploying mobile fronthaul and midhaul networks built entirely on cloud native principles. Radio nodes are distributed into RU-DU-CU.
  • 6. CPRI: Common Public Radio Interface, or CPRI, is an evolving specification for wireless communications networks defined by a consortium of original equipment manufacturers. The specification relates to the communication link between baseband units and remote radio units 5G NR New Radio:  5G New Radio (NR) is the global standard for a unified, more capable 5G wireless air interface. It will deliver significantly faster and more responsive mobile broadband experiences, and extend mobile technology to connect and redefine a multitude of new industries.  Massive MIMO, is an extension of MIMO, which essentially groups together antennas at the transmitter and receiver to provide better throughput and better spectrum efficiency  Millimeter waves — often referred to as mmWaves or high-band 5G — are frequencies starting at 24 GHz and beyond. As radio waves increase in frequency, each wave narrows in length. Because of its high frequencies, mmWave has a limited range of only 300 to 500 feet and struggles to penetrate buildings  The 5G spectrum is a range of radio frequencies in the sub-6 GHz range and the millimeter-wave (mmWave) frequency range that is 24.25 GHz and above. The 5G
  • 7. spectrum refers to the radio frequencies that carry data from user equipment (UE) to cellular base stations to the data's endpoint. .  TTI, Transmission Time Interval, is a parameter in UMTS and 5GNR related to encapsulation of data from higher layers into frames for transmission on the radio link layer. TTI refers to the duration of a transmission on the radio link. 5GC Core:  Access and Mobility Management function (AMF) supports: Termination of NAS signaling, NAS ciphering & integrity protection, registration management, connection management, mobility management, access authentication and authorization, security context management. (AMF has part of the MME functionality from EPC world)  Session Management function (SMF) supports: session management (session establishment, modification, release), UE IP address allocation & management, DHCP functions, termination of NAS signaling related to session management, DL data notification, traffic steering configuration for UPF for proper traffic routing. (SMF has part of the MME and PGW functionality from EPC world)  User plane function (UPF) supports: packet routing & forwarding, packet inspection, QoS handling, acts as external PDU session point of interconnect to Data Network (DN), and is an anchor point for intra- & inter-RAT mobility. (UPF has part of the SGW & PGW functionality from EPC world)  Policy Control Function (PCF) supports: unified policy framework, providing policy rules to CP functions, access subscription information for policy decisions in UDR. (PCF has part of the PCRF functionality from EPC world)
  • 8.  Authentication Server Function (AUSF) acts as an authentication server. (part of HSS from EPC world)  Unified Data Management (UDM) supports: generation of Authentication and Key Agreement (AKA) credentials, user identification handling, access authorization, subscription management. (part of HSS functionality from EPC world)  Application Function (AF) supports: application influence on traffic routing, accessing NEF, interaction with policy framework for policy control. (same as AF in EPC world)  Network Exposure function (NEF) supports: exposure of capabilities and events, secure provision of information from external application to 3GPP network, translation of internal/external information. (not present in EPC world)  NF Repository function (NRF) supports: service discovery function, maintains NF profile and available NF instances. (not present in EPC world)  Network Slice Selection Function (NSSF) supports: selecting of the Network Slice instances to serve the UE, determining the allowed NSSAI, determining the AMF set to be used to serve the UE. (not present in EPC world) UDSF: Unstructured Data Storage Function In 5G, the UDSF supports data storage for stateless network functions. That is, rather than a given network function holding its own storage resources, it will instead store UE context data in the UDSF.
  • 9. 5G Service-based architecture: The 3GPP defines a Service-Based Architecture (SBA), whereby the control plane functionality and common data repositories of a 5G network are delivered by way of a set of interconnected Network Functions (NFs), each with authorization to access each other's services. Stateless network functions: 5G network functions are designed to be stateless. Separating state from the control, allows control to run on a compute resource and state can be saved at a separate storage node. Apart from enhancing reliability by maintaining redundancy of storage nodes, this statelessness also aids in dynamic instantiation/scaling of virtual network functions corresponding to the 5G network functions.
  • 10. NSA (Non-Standalone Access) and SA (Standalone Access) are the two 5G network modes. NSA relies on the 4G network facilities to provide more speed and higher data bandwidth. A 5G-enabled smartphone will connect to a 5G or 4G network depending on conditions. 5G V2X: CITS: Common Intelligent Transport Infrastructure CAV: Connected Autonomous Vehicle V2X: Vehicle to anything/everything RSU: Road side unit
  • 11. Vehicle to Infrastructure (V2I) - V2I involves your car communicating with things like traffic lights and road work signs. This will give you information on their environment and on what lies ahead. Vehicle to Vehicle (V2V) - V2V establishes a link between two vehicles, allowing them to share sensor and planned route data. Vehicle to Network (V2N) - V2N means cars will be able to communicate with the Internet. This will enable things like advanced navigation based on maps. Vehicle to Pedestrian (V2P) - V2P will allow vehicles and pedestrians to exchange information, hopefully limiting pedestrian accidents. Vehicle to Device (V2D) - V2D will enable cars to exchange information with devices in general. This will include things like self-parking sensors in parking garages. Vehicle to Grid (V2G) - V2G can help with power planning as electric cars can tell the grid about their current and projected power needs.
  • 12. 5G Security SIM card key length 128-256 bit optional SOAR: SOAR stands for Security Orchestration, Automation, and Response. SOAR platforms are a collection of security software solutions and tools for browsing and collecting data from a variety of sources, logs. Use of AI/ML and scripting to automate threat response.. Dual mode: dual mode vulnerability when 5g UE connects to 4g core 5g security weakened at 4g level Standalone mode secure 5g UE connects to 5G Radio and 5G port Beam forming attack: attacker can pin point UE location but not possible to eavesdrop Possible attacks: UE capability sensing, battery drain, DOS attack, location tracking bidding down to 3G 4G New features DTLS over SCTP, IPsec over N2, N3, Xn, IP Transport Interfaces 5G roaming security additional SEPP nodes (security end point protection proxy) signaling between home and visited networks. SUPI/ SUCI replaces subscriber IMSI identifier with concealed and encrypted identities.  Various 5G network security responsibilities fall on both user equipment and the network infrastructure.  Data confidentiality and integrity are emphasized in the 3GPP standard, primarily using encryption algorithms, also called cipher algorithms, to protect the data.  Both user equipment and network infrastructure are required to protect the encryption keys for the algorithms through encryption, tamper-resistant hardware, or being in a secure physical location.  Authentication and authorization are also important for both user equipment and network infrastructure so user equipment and other networks can be confirmed as authorized equipment and networks
  • 13. Three aspects of security: 1 — Confidentiality Which ensures no unauthorized entity can read the communication. To ensure wireless communication is confidential it is encrypted, and the encryption is done hop-by-hop in the network. So, at both RAN and CN, the unencrypted information is available. 2 — Integrity Which ensures no unauthorized entity can modify the communication. To ensure this wireless communication is integrity protected, integrity is also implemented hop-by-hop in the network. So, the information is available at both RAN and CN to be tampered with. 3 — Availability Which ensure that communication service is available uninterrupted to the users. This also has to be ensured at both the RAN and CN level, as both can contribute to service discontinuity. 5G Network Slicing 5G network slicing is a network architecture that enables the multiplexing of virtualized and independent logical networks on the same physical network infrastructure. Each network slice is an isolated end-to-end.
  • 14.  Networks can have hundreds of slices but a UE can support only 8 slices.  Slice provides Security isolation and Resource isolation.  NSSAI (Network Slice Selection Assistance Information) comprised of SD (Slice Differentiator) and SST (Slice Service Type)  Network Slice Selection Function (NSSF): NSSF helps in setting up multiple virtual network slices of the RAN, core and transport networks to meet specific service requirements. 5G Cloud Architecture In order to facilitate network traffic from billions of connected nodes and the coming wave of new compute-intensive 5G applications, networks must transform to be able to deliver faster speeds, lower latency, and more capacity. Cloudification prepares for 5G’s 10X less latency, 100X faster speed, and 1000X more capacity, laying the foundation for revolutionary customer experiences, business efficiencies, and products and services. 5G NFV: 5G NFV uses virtualization technologies for all categories of network node operations on building blocks that can be connected to create advanced communication services. NFV is based on traditional server-virtualization techniques, ie, the separation of a physical server for multiple smaller virtual servers, however, with the help of virtualization software.
  • 15. Cloud Models IAAS, PAAS and SAAS IAAS: The IaaS model shares hardware resources among the users. Cloud providers typically bill IaaS services according to the utilization of hardware resources by the users. PAAS: The IaaS model shares hardware resources among the users. Cloud providers typically bill IaaS services according to the utilization of hardware resources by the users. SAAS: The SaaS model is the software layer. In the SaaS layer, clients are not allowed to modify the lower levels such as hardware resources and application platform. Cloud Elasticity: The Elasticity refers to the ability of a cloud to automatically expand or compressed the infrastructural resources on a sudden-up and down in the requirement so that the workload can be managed efficiently. Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where administrators can no longer manage them effectively. Virtualization sprawl is also referred to as virtual machine sprawl, VM sprawl or virtual server sprawl. COTS (Commercial off-the-Shelf Servers): AKA “Cheap Intel Servers” Hybrid Cloud: Hybrid cloud computing is an environment that combines public clouds and private clouds by allowing data and applications to be shared between them. Private Cloud is an environment where Compute and Storage servers are owned by the user, while Public Cloud is when the equipment is owned by a vendor ie Microsoft, AWS. MEC: (Mobile Edge Computing) is a distributed computing framework that brings enterprise applications closer to data sources such as IoT devices or local edge servers. This proximity to data at its source can deliver strong business benefits, including faster insights, improved response times and better bandwidth availability.
  • 16. Hypervisors: Hypervisor is computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is called a host machine, and each virtual machine is called a guest machine. Type 1: Type 1 hypervisor run directly on the host’s physical hardware without loading the attack-prone underlying OS, making them very efficient and secure. Type 2: Type 2 hypervisors are also known as hosted hypervisors, because they are installed on existing OSs, and rely on them for virtualization and resource management. Common Products: VM-ware vSphere, Microsoft Hyper V, Xen Server, KVM, Redhat Virtualization. Containers: containers hold individual applications and their corresponding software, commands, and configurations. This allows applications to be transferred to different cloud or OS environments without having integration or run issues because of the change in environment. Container Name-Space: isolates the applications from each other within single or multiple container' scope. When multiple processes / services are being run on multiple containers (on a single host system) then such isolation is a necessity from security and stability standpoints.
  • 17. SDN (Software Defined Networking) SDN attempts to centralize network intelligence in one network component by disassociating the forwarding process of network packets (data plane) from the routing process (control plane). The control plane consists of one or more controllers, which are considered the brain of the SDN network where the whole intelligence is incorporated. OpenFlow: OpenFlow is a communications protocol that gives access to the forwarding plane of a network switch or router over the network. Controller: SDN controller is a software system or collection of systems that together provides: Management of network state, and in some cases, the management and distribution of this state, may involve a database. Flow Table: In OpenFlow for packet-based network, each switch contains a flow-table. Each flow-table entry header specifies a flow and an associated action to be taken towards an incoming packet matching the respective entry. Traffic Engineering: Traffic Engineering is a method that helps to optimize the performance and efficiency of the movement of people, goods, and transportation. Traffic engineering looks at the whole picture in order to maximize traffic flow and reduce instances of congestion.
  • 18. SON (Self Organizing Networks) 5G SON: SON (Self-Organizing Network) technology minimizes the lifecycle cost of running a mobile network by eliminating manual configuration of network elements at the time of deployment, right through to dynamic optimization and troubleshooting during operation. Besides
  • 19. improving network performance and customer experience, SON can significantly reduce the cost of mobile operator services, improving the OpEx-to-revenue ratio and deferring avoidable CapEx. Introduced in LTE (3GPP Rel.8) As 5G has massive Femto/ Small cell dense deployment, SON will be needed as manual configuration management is not possible. Self-Configuration: PNP Automatic software download, automatic neighbor relationship, DNS MME SGW IP Address Software configuration. Self-Optimization: Neighbor Selection, UE Measurement, Frequency Selection, Load balancing. Self-Healing: Outage management, Neighbor power selection, Interference management. EMS (Element Management System): KPI Measurements, SON controller.
  • 20. Voice over 5G: High Definition voice quality support No circuit voice support, No 2g 3g handover 5G to 4G and 5G to Wi-Fi seamless handover EPS Fallback 5G to 4G VOLTE, afterwards CS fallback/SRVCC to 3G 2G
  • 21. 5G MMTC: mMTC: mMTC focuses on IoT applications which requires mass deployment of billions of low-cost, low-powered devices and sensors. Some of the 5G applications which come under this use case are : ➢ Smart Cities, Smart Homes and Smart Buildings ➢ Intelligent Agriculture Systems ➢ Patient Monitoring Systems ➢ Traffic Management Systems
  • 22. Battery life of upto 10 years at 200 byte UL Coverage Density 1,000,000 devices/ km^2 Latency <10s with 20 byte payload Price – Ultra low cost Features: Multicast, location awareness, Mobility 5G URLLC: Ultra-reliable low latency communications (URLLC) is one of the key pillars of 5G New Radio (NR). As the underlying feature required to support dense sensor grids of IoT endpoints, it is a primary enabler for a number of unique use cases in the areas of manufacturing, energy transmission, transportation and healthcare. With the need to support end-to-end latencies as low as 5ms, the delay budget for individual interfaces can be as low as 1ms. This means that optimizations must be made at every step of the uplink and down link transmission process. While outside the scope of 3GPP specifications, the need to reduce data processing response times is also leading to the emergence of highly distributed edge computing strategies.
  • 23. Smart factory/industrial automation Healthcare industry Intelligent transportation (fleet / logistics) Entertainment and media (AR/VR Gaming) Smart electricity grid
  • 24. 5G EMBB: Enhanced Mobile Broadband: improvement on that which is currently used for cellular data. It provides speeds of up to 10Gbps for high bandwidth usage such as HD video streaming or VR/AR gaming, providing faster download speeds and improved user experiences WiFi Internetworking:
  • 25. N3IWF: Non-3GPP Internetworking Function: Gateway to connect 5GC to Wifi Access Point. ATSSS: Access Traffic Steering, Switching, Splitting “Steering” refers to the possibility of selecting for user-plane traffic, according to the service (QoS-type for a data flow), the best link to use “Switching” describes the possibility of performing handover without service interruption to the other link when necessary “Splitting” means the simultaneous use (bonding) of the two links. 5G Wired Broadband:
  • 26. The AGF provides AAA services plus hierarchical traffic shaping and policing for fixed network (FN) and 5G residential gateways (RGs) being served from a standard 3GPP User Plane Function (UPF) within a common 5G Core (5GC). ATSSS applies the same rules as WIFI. 5G small cell Small cells are low-powered cellular radio access nodes that operate in licensed and unlicensed spectrum that have a range of 10 meters to a few kilometers and that are typically backhaul connected via wired connections.