Introduction To 5G
Introduction To 5G
S CHIZENGWE
DRIVERS FOR 5G
Flattening of
New use cases with broadband revenues
different requirements Remove need for
backward compatibility
Drivers for 5G
Parameter KPI
Mobility 500KM/hr
Radio Frequency bands used in the 5G system are subdivided into three groups according to their frequencies:
A usable frequency spectrum below 1GHz is known as Low Band in 5G (e.g 694–790 MHz).Aimed at wide-area coverage.
Low-frequency spectrum provides more comprehensive coverage and can penetrate obstacles better.
The is the primary 5G band frequency which is a good choice for both urban and suburban areas because it provides a balance between
coverage and capacity (e.g. 3400–3800 MHz).
High-frequency bands provide fast data transfer and quick response times, but their coverage is limited and mainly utilized in crowded cities
and to provide ultra-high capacity for innovative new services (e.g. 24.25–27.5 GHz).
5G CELL COVERAGE
The main issue affecting coverage is the frequency of the radio waves. As the radio frequency increases, so the
wavelength falls.
As a result, the antennas have a smaller collecting area, and receive a weaker radio signal.
At millimeter waves, the antennas become small enough to allow the use of antenna arrays, which
compensates for the problem.
However, other issues come into play, for example poor NLOS propagation.
At 700 MHz, the expected cell size is a few kilometres.
At 3500 MHz, the expected cell size is around 1 kilometre.
At 26 GHz, the expected cell size is around 200 metres.
5G CELL CAPACITY
The available bandwidth depends upon the frequency of the radio waves.
In the 700 MHz band, the total bandwidth allocated to 5G is 96 MHz.
In the 3500 MHz band, the total bandwidth is 400 MHz.
In the 26 GHz band, the total bandwidth is 3.25 GHz.
That bandwidth has to be shared among all of the 5G network operators, and it also has to be shared between the UL
and the DL.
The 700 MHz band is the worst for cell capacity, and the 26 GHz band is the best.
The capacity of the whole network also depends on the total number of cells that have been deployed. At 26 GHz,
the cell size is much smaller than it is at 700 MHz, so the number of cells may be much greater.
As a result, the network capacity at 26 GHz could be very much greater than it is at 700 MHz
5G ARCHITECTURE
5G was designed from the ground up, and network functions are split up by service
5GCN
FUNCTIONS OF gNODEB
The 5G base station is known as a Next Generation NodeB, which is more commonly abbreviated to gNodeB
or gNB.
As in previous technologies, each gNB can control multiple cells
The principles of the gNB are the same as those of the eNB from LTE.
The gNB carries out radio transmission and reception and digital signal processing, to communicate with the
UE over the 5G New Radio.
The gNB controls the UE’s radio communications by means of signalling messages;
Also relays additional signalling messages, which the core network sends to the UE to control higher-level
aspects of the UE that are not related to radio communications.
The gNB manages the resources of the RAN, through tasks such as admission control, radio bearer control and
mobility control.
EVOLUTIONARY ROLLOUT OF 5G
Continuation…..
The 5G new radio is designed to support an evolutionary roll-out in which it inter-operates closely with LTE.
Non Standalone (NSA) deployment
Initially the mobile continues to communicate with the evolved packet core and with an eNB, but it also communicates with a 5G gNB.
The LTE base station takes on a role known as a master eNB (MeNB), in which it delivers not only data packets to and from the user,
but also signalling messages that control the UE’s operation.
The 5G base station takes on a role known as a secondary gNB (SgNB), in which it only delivers data.
The radio access network is still the E-UTRAN, because the base stations communicate in the same way that they do in LTE.
The configuration is a Non Standalone (NSA) deployment of the 5G new radio, as the gNB cannot act alone.
In the second phase, the EPC is replaced by the 5G core network.
Furthermore, the E-UTRAN is replaced by the NG-RAN, because the base stations now communicate using the new protocols and
procedures for 5G.
Continuation…
The PCF (Policy and Charging Function) determines the QoS (Quality of Service) targets and charging
characteristics of data streams in the 5G Core Network.
The AUSF handles aspects of authentication that take place in the home network when the UE is roaming.
These functions map closely onto the network elements from previous generations. Specifically, the UDM,
AMF, SMF, UPF and PCF are similar to the HSS (Home Subscriber Server), MME (Mobility Management
Entity), PDN-GW (Packet Data Network Gateway) signaling, PDN-GW traffic and PCRF (Policy and
Charging Rules Function) from LTE.
The AUSF implements authentication functions which, in LTE, take place within the HSS front end.
CONNECTING TO THE INTERNET
OVER 5G
When a user wishes to connect to an external data network, the device sends a signalling message to the 5G Core Network. The
message includes the name of the requested data network, in the form of an APN (Access Point Name).
The APN is defined by the mobile network operator, and is stored on the mobile device. A typical network operator uses just a few
APNs; for example one for the Internet and for the operator’s value-added services, and others for any corporate data networks.
In response, the SMF assigns a temporary IP address to the mobile device, which the external network will use to identify the
device. The SMF also assigns a UPF to the mobile device, which will be the point of contact to the external network. The UPFs
used for different networks might be the same, as shown in the diagram, or they might be different.
As the device moves, so the RAN hands the device over from one base station to another. The core network keeps a record of
which base station the device is using, so that it can deliver data to and from the correct location
MAKING VOICE CALLS OVER 5G
In 5G, a UE receives voice services by means of VoIP. This is typically controlled by the IMS, in the same way as for VoLTE.
The IMS is an external data network, which the UE reaches through the 5G Core Network in the same way that it reaches the Internet.
The IMS contains servers that set up and manage VoIP calls over 5G.
These are similar to the servers owned by a third-party VoIP operator such as Skype or WhatsApp, but with two important differences.
Firstly, the IMS supports additional capabilities, such as emergency VoIP calls and full communication with legacy telephone networks.
Secondly, the IMS is owned by the network operator.
The UE communicates with the IMS by means of signaling messages which handle tasks such as IMS registration and VoIP call set-up,
and which are transported by the 5G Core Network.
Continuation…..
By virtue of these differences, network operators can charge for 5G VoIP calls, and have the possibility of
maintaining their VoIP revenue.
During call set-up, the IMS signals to the PCF to request a stream of voice traffic. In response, the PCF
instructs the 5G Core Network to set up a new data stream to carry the traffic, and the call can begin.
There is no support for the 2G or 3G RANs, or for the related procedures used by LTE such as CSFB or
SRVCC (Single Radio Voice Call Continuity). Support of 5G VoIP requires wide-area coverage from the
5G RAN, by means of LTE, 5G or both.
IMPLEMENTATION OF THE 5G
NETWORKS
Traditionally, mobile telecommunication networks have been implemented by means of dedicated special-purpose hardware,
which has been designed to support all the anticipated use cases.
The approach has worked fine up to a point, but has a number of limitations: the hardware is expensive to procure, install and
maintain;
the hardware eventually has to be replaced, an increasing problem as development lifecycles shorten; it is difficult for new
hardware vendors to enter the market;
It is difficult to upgrade the network to support new use cases as they arise.
NFV (Network Function Virtualization) offers a different approach. In this technology the network’s functionality is
implemented in software, which runs on COTS (Commercial Off The Shelf) hardware such as servers, storage and switches.
NFV brings several advantages: the costs of both hardware and software fall; it is easier for new vendors to enter the market;
and it is far easier to upgrade the network to support new use cases, by simply upgrading the software.
Continuation…..
SDN (Software Defined Networking) is a complementary technology, which focusses more on the networking and interconnection
aspects.
Here, the emphasis is on the complete separation of the network’s functions for control and data forwarding. The technology makes the
network functionality available to applications by means of open interfaces, in a manner that is abstracted from the underlying data
transport.
It also allows the network operator to establish the control and user planes in different locations, for example by placing the control
plane at a central site, while distributing the user plane so that it is physically close to the user.
NFV and SDN are exploited by the 3GPP concept of Network Slicing. A network slice is a virtual logical network, which runs on
common underlying physical infrastructure, and whose capabilities are optimized for a particular use case. Examples might include
slices serving a utility company, a virtual network operator or a factory remote-control system, or a slice that is optimized for the
delivery of streaming video.
THANK YOU