You are on page 1of 20

Evolution of Network

1G (First Generation):
• Analog technology focused on voice
communication.
• Limited data capabilities, poor voice quality,
low data rates.
• Switching : circuit
• Multiple Access System: FDMA [Frequency
division multiple access]
2G(Second Generation):

• Digital technology focused on voice,SMS and MMS


• Switching: Circuit switching for voice and packet switching for
data
• Standards used
o 2G: GSM [Group Special Mobile]
o 2.5G: GPRS [General Packet Radio Service]
o 2.75G: EDGE [Enhanced Data rates for GSM Evolution]

• Multiple Access System: TDMA , CDMA

• Disadvantage: Low network range, slow data rate


3G(Third Generation)

• Multimedia feature, video call, High security,


International roaming was added
• Switching: Packet switching except for air interface
• Standards: IMT-2000 [International Mobile
Telephone], WCDMA
• Multiple Access System: CDMA
• Disadvantages: high power consumption, low
network coverage.
4G(Fourth Generation)
• High speed and global mobility
• Multiple Access System: CDMA
o For Up Link: SC FDMA
o For Down Link: OFDMA
• Switching: Packet switching
• Standards: LTE [Long Term Evolution], WiMAX
5G(Fifth Generation)
• Features
o Higher Data Speeds
o Ultra-Low Latency
o Higher Capacity and Connectivity
o Network Slicing
o Massive Machine-to-Machine Communication
o Advanced Antenna Technologies
o Enhanced Security
• Radio Access technology: OFDMA
5G Architecture Deployment modes

Non-Stand Alone (NSA) Deployment:


• Built on existing 4G infrastructure.
• Adds 5G NR (New Radio) to enhance 4G LTE..
Stand Alone (SA) Deployment:
• Operates independently, no 4G reliance.
• Both 5G NR access and core networks built
from scratch.
 5G - Enabling Technologies
• Virtualization
o virtualizing network functions to run on standard
hardware.

• Cloud Native
o Services are built to run in cloud environments,
making it easier to scale up or down.
• Containerization
o Containers are used to encapsulate network
functions and applications in 5G networks.
o They enable efficient deployment, scalability, and
consistency across different parts of the network.
• Microservices
o Complex network functions into smaller,
manageable units.
o Each microservice performs a specific task, making
it easier to develop, test, and maintain different
parts of the network.
• Automation
o Automated processes handle tasks such as service
provisioning, scaling, and fault detection, reducing
manual intervention and improving efficiency.

• Orchestration
o Orchestration in 5G involves coordinating the
deployment and management of various
virtualized network functions and services.
Network Functions
AMF [Access and Mobility management
Function] :
• chooses proper Authentication function
• Manages registration, connection, reachability
and mobility
• Selecting appropriate UDM
• Selecting appropriate Policy Control
Function[PCF] and Session Management
Function[SMF]
SMF [Session Management Function] :

• PDU session management


• IP address allocation
• Downlink notification management
• GTP-U Tunnel management
AUSF [Authentication Server Function] :
• Handles routing based on SUCI and SUPI
• Manages authentication confirmation timeout
• Supports re-synchronization procedure
• Maintains session states in an external
centralized database for stateless operations
• Authentication and key agreement methods
are carried out by AUSF
UDM [Unified Data Management] :

• Generation of authentication credentials


• User identification handling (ex: storage and
management of SUPI)
• De-concealment of SUCI
• Subscription management
• Contains two logical entities:
o ARPF[Authentication credential Repository and Processing
Function] : Contains subscriber's credentials
o SIDF[Subscription Identifier De-concealing Function] :
Responsible for resolving SUPI from SUCI
NRF [Network Repository Function] :

• All NFs in operator's network are stored centrally in NRF.


• Provides Standard-based API that enables NF to register and find one another

AF [Application Function] :

• Interact with PCF[Policy Control Function] and enabling policy control


• Traffic routing for application
• Provides application services to subscribers

UPF [User Plane Function] :

• Connects RAN and DN


• Packet inspection and application detection
HOW IS CALL ROUTED
oThe call initiation starts at the user's device (UE), which could be a
smartphone or any 5G-enabled device.
oThe UE establishes a connection with the nearest base station (gNB -
gNodeB) using the radio access network (RAN).
oThe gNB manages the radio communication with the UE.
oIt controls the air interface and establishes a data link to carry voice
packets.
oThe gNB forwards the call request to the 5G Core Network (5GC).
oThe 5GC handles session management, authentication, and authorization.
oThe 5GC uses the Session Management Function (SMF) to establish and
manage the call session.
oThe SMF determines the appropriate network functions needed for the
call and allocates resources.
o The Authentication and Authorization Function (AUSF)
verifies the user's identity and authorizes access to the
network.
o The Policy Control Function (PCF) determines the
appropriate policies for the call, including quality of
service (QoS) settings.
o The Charging Control Function (CHF) handles billing and
charging for the call.
o If the call is destined for a user on another network, the
Interconnection Border Control Function (I-BCF) handles
the interconnection.
o The 5GC routes voice packets through the appropriate
network paths using the Session Management Function
(SMF) and User Plane Function (UPF).
o The UPF handles the packet forwarding and
routing for the voice data.
o It ensures that voice packets are delivered to the
correct destination efficiently.
o The voice data packets are transmitted over the
core network to reach the recipient's device.
o During the call, if the user moves to an area served
by a different gNB, a handover process may occur
to ensure continuity of the call.
o When the call is completed, the session is
terminated, and resources are released.
THANK YOU

You might also like