SlideShare uma empresa Scribd logo
1 de 66
PRESENTED BY :-
Samir Mohanty
C O N T E N T S
 Introduction to 5G.
 5G Experience be like.
 Brief Idea about 5G.
 Evolution from 1G to 5G.
 Comparison table of features of 1G to 5G.
 Architecture of 5G.
 CallFlow
 Functional Architecture of 5G.
 Hardware and Software of 5G.
 Advantages.
 Disadvantages.
 Applications.
 Conclusion.
 INTRODUCTION
5G is the short for fifth generation, a mobile
broadband technology that is in the early stages
of works and likely to be in place six to seven
years from now.
 A 5G network will be able to handle 10,000
times more call and data traffic than the current
3G or 4G network.
 Data download speeds on 5G networks are
likely to be several hundred times more than 4G.
 5G mobile technology will change the means to
use cell phones within very high bandwidth.
 BRIEF IDEA ABOUT 5G
CURRENT STATUS OF 5G?
The European Telecommunications Standards Institute is
formulating 5G global technology standards, which are likely to be
formalized by 2019.
Telecom companies such as Nokia, Ericsson, NTT DoCoMo, Samsung,
Huawei and Fujitsu are driving bulk of the 5G-related innovations.
PEOPLE WILL BE ABLE TO EXPERIENCE WITH 5G.
5G networks are likely to be rolled out commercially between
2020 and 2025. If the global standards are finalized by 2019, the
earliest commercial deployments could happen by 2020.
3G AND 4G HANDSETS DOESN’T RUN ON 5G NETWORKS.
No. 5G will require new chipsets and devices capable of
supporting speeds upwards of 10 gigabits per second. 4G and 3G run
at a fraction of that speed.
 Evolution from 1G to 5G
1G (1980/1990)
2G/2.5G ( Late 90’S)
3G (2001)
4G (2010)
5G (Expected by 2017 in Indian
Market)
1G:- 1’st Generation
• 1G refers to 1st generation of mobile
telecommunication
• It is developed in 1980s and completed in early 1990s.
• It provides a speed up to 2.4kbps.
• It is based on analog system.
• It allows user to make call in one country.
• It has low capacity, unreliable handoff, poor voice links ,
and no security at all since voice calls were played back in
radio towers, making these calls susceptible to unwanted
eavesdropping by third parties. low capacity, unreliable handoff, poor
voice links, and no security a
• t all since voice calls were played back in radio towers, making these calls
susceptible to unwanted eavesdropping by third parties.
has low capacity, unreliable handoff, poor voice links, and no security at all since
voice calls were played back in radio towers, making these calls susceptible to
unwanted eavesdropping by third parties.
2G :- 2’nd Generation
• 2G refers to 2nd generation of mobile telecommunication.
• It was developed in late 1980s and completed
in late 1990s.
• It is based on digital system.
• It provides a speed of up to 64 kbps.
• It provides services like voice and sms with
more clarity.
 Major prominent technologies were GSM, CDMA, and
IS95
3G :- Third Generation
NTT DoCoMo launched the first commercial 3G network
on 1 October 2001, using the WCDMA technology
 bandwidth of 3G network is 128 Kbps for mobile
stations, and 2 Mbps for fixed applications
 The current trend in mobile systems is to support the
high bit rate data services at the downlink via High Speed
Downlink Packet Access (HSDPA)
4G:- 4’th Generation
• It was developed in the year 2010.
• It is faster and more reliable.
• It provides speed up to 100mbps.
• It provides high performance like uploading and downloading
speed.
• It provides easy roaming as compaired to 3G.
• Use of a higher Layer Protocol (IP) as transport medium
affords intelligence at every stage within the network relative
to a service
5G :- 5’th Generation
• It is the next major phase of mobile telecommunication &
wireless system.
• It is 10 times more faster than 4G.
• It has a expected speed of 1gbps.
• Lower cost than the previous version.
• It is expected to come around the year 2017.
Comparison of 5G with other :-
Networking Architecture of
5G:-
 OSI Layers 5G mobile network layer
OWA stands for Open Wireless Architecture this layer is used to be
used as Physical Layer + Data link Layer = OWA.
Network Layer is divided into two sub layers
• 1) Lower Network Layer
• 2) Upper Network Layer
Network Layer is used to route the data from source to destination.
Open transport layer perform the operation of both Transport Layer
and Session Layer.
• Transport Layer + Session Layer=OTL.
Application Layer marks the data into proper format i.e. ,it decrypt
the data which is in encrypted form and selects the best wireless
connection for a given service.
DATA TRANSFER ARCHITECHTURE OF 5G
RAN
A radio access network (RAN) is part of a mobile telecommunication system.
It implements a Radio Access Technology. Conceptually, it resides between a
device such as a mobile phone, a computer, or any remotely controlled
machine and provides connection with its core network.
FLAT IP NETWORK
Certainly Flat IP network is the key concept to make 5G acceptable for all kind
of technologies. To meet customer demand for real-time data applications
delivered over mobile broadband networks, wireless operators are turning to
flat IP network architectures.
5G NANOCORE
The 5G Nanocore is a convergence of below mention technologies. These
technologies have their own impact on exiting wireless network which makes
them in to 5G.
Nanotechnology.
Cloud Computing.
All IP Platform.
Nano Technology :-
Nanotechnology is the application of nano science to control process on
manometer scale. i.e. between 0.1 and100nm.The field is also known as molecular
nanotechnology(MNT). It deals with control of the structure of matter based on
atom-by-atom and molecule by molecule engineering. The term nanotechnology
was introduced by Nori Taniguchi in 1974 at the Tokyo international conference on
production engineering.
Cloud computing :-
Cloud computing is a technology that uses the internet and central remote
server to maintain data and applications. In 5G network this central remote server
will be our content provide. Cloud computing allows consumers and business to use
applications without installation and access their personal files at any computer with
internet access. The same concept is going to be used in Nanocore where the user
tries to access his private account form a global content provider through Nanocore
in form of cloud.
The All-IP Network(AIPN) :-
The All-IP Network(AIPN) is an evolution of the 3GPPsystem to meet the
increasing demands of the mobile telecommunications market. To meets customer
demand for real-time data applications delivered over mobile broadband networks,
wireless operators are turning to flat IP network architectures.
FUNCTIONAL ARCHITECTURE OF 5G
GPRS (General Packet Radio Service)
a) It is used to transmit data at 60kb/sec.
b) It consume less battery during sending & receiving mail or . . .
. browsing internet.
EDGE (Exchanged Data Rate for GSM Evolution)
a) It is an advance version of GPRS .
b) It provide a data speed of 473kb/sec.
3G
a) 3G makes it possible to do video call on mobile network.
b) It also provide efficient way to browse internet on mobile
networking.
WLAN( Wireless LAN)
a) Wireless LAN provides short range, high speed wireless data .
. connection between mobile data device using radio or signal.
 LTE(Long Term Evolution)
a) LTE is standard for mobile communication for high speed data
transmission for mobile network. Its Speed is up to 100mb/sec.
5G is the short for fifth generation, a mobile broadband technology that is in the early stages
of works and likely to be in place six to seven years from now.
A 5G network will be able to handle 10,000 times more call and data traffic than the
current 3G or 4G network Data download speeds on 5G networks are likely to be several
hundred times more than 4G. 5G mobile technology will change the means to use cell
phones within very high bandwidth
UE (R)AN UPF
AF
AMF SMF
PCF UDM
DNN6
NRFNEF
N3
N2 N4
AUSF
Nausf Namf Nsmf
NpcfNnrfNnef Nudm Naf
NSSF
Nnssf
AMF PCF
UE (R)AN UPF DN
N13
N7
N3 N6
N2 N4N1
AFN5SMFN11
N9
AUSF
N8N12
UDM
N10
N14 N15
NSSF
N22
Figure- Non-Roaming G System Architecture in reference point representation
UE
N26
S8-U
S8-C
S6a
S11
N1
N4
N7
U
N2
S1-U
S1-MME
HSS +
UDM
N9
N3
HPLMN
VPLMN
N24
N16
N8
UE
SGW
E-UTRAN
N10
N11
N4
v-PCF
N15
AMF
N10
MME
NG-RAN
RAN
h-PCF +
h-PCRF
SMF +
PGW-C
UPF +
PGW-U
UPF
v-SMF
5QI
Value
Resource Type Default Priority Level Packet Delay Budget Packet Error
Rate
Default Maximum Data Burst Volume
(NOTE 2)
Default
Averaging Window
Example Services
10 Delay Critical GBR 11 5 ms 10-5 160 B TBD Remote control
(see TS 22.261 [2])
11
NOTE 4
12 10 ms
NOTE 5
10-5 320 B TBD Intelligent transport systems
12 13 20 ms 10-5 640 B TBD
16
NOTE 4
18 10 ms 10-4 255 B TBD Discrete Automation
17
NOTE 4
19 10 ms 10-4 1358 B
NOTE 3
TBD Discrete Automation
1
GBR
NOTE 1
20 100 ms 10-2 N/A TBD Conversational Voice
2 40 150 ms 10-3 N/A TBD Conversational Video (Live Streaming)
3 30 50 ms 10-3 N/A TBD Real Time Gaming, V2X messages
Electricity distribution – medium voltage, Process automation - monitoring
4 50 300 ms 10-6 N/A TBD Non-Conversational Video (Buffered Streaming)
65 7 75 ms
10-2
N/A TBD Mission Critical user plane Push To Talk voice (e.g., MCPTT)
66
20
100 ms
10-2
N/A TBD Non-Mission-Critical user plane Push To Talk voice
75 25 50 ms 10-2 N/A TBD V2X messages
E
NOTE 4
18 10 ms 10-4 255 B TBD Discrete Automation
F
NOTE 4
19 10 ms 10-4 1358 B
NOTE 3
TBD Discrete Automation
5 Non-GBR
NOTE 1
10 100 ms 10-6 N/A N/A IMS Signalling
6
60 300 ms 10-6
N/A N/A Video (Buffered Streaming)
TCP-based (e.g., www, e-mail, chat, ftp, p2p file sharing, progressive video, etc.)
7
70 100 ms 10-3
N/A N/A Voice,
Video (Live Streaming)
Interactive Gaming
8
80 300 ms
10-6
N/A N/A
Video (Buffered Streaming)
TCP-based (e.g., www, e-mail, chat, ftp, p2p file
9 90 N/A N/A sharing, progressive video, etc.)
69 5 60 ms 10-6 N/A N/A Mission Critical delay sensitive signalling (e.g., MC-PTT signalling)
70 55 200 ms 10-6 N/A N/A Mission Critical Data (e.g. example services are the same as QCI 6/8/9)
79 65 50 ms 10-2 N/A N/A V2X messages
80 66 10 ms 10-6 N/A N/A Low Latency eMBB applications Augmented Reality
NOTE 1: a packet which is delayed more than PDB is not counted as lost, thus not included in the PER.
NOTE 2: it is required that default Maximum Data Burst Volume is supported by a PLMN supporting the related 5QIs.
NOTE 3: This Maximum Burst Size value is intended to avoid IP fragmentation on an IPv6 based, IPSec protected, GTP tunnel to the 5G-AN node.
NOTE 4: A delay of 1 ms for the delay between a UPF terminating N6 and a 5G-AN should be subtracted from a given PDB to derive the packet delay budget that applies to the radio interface.
NOTE 5:The jitter for this service is assumed to be 20 msec as per TS 22.261 [2].
New
AMF
AUSFSMF(R)ANUE
4 Namf_Communication_UEContextTransfer
1. Registration Request
PCF
2. AMF selection
3. Registration Request
Old
AMF
6. Identity Request
7. Identity Response
8. AUSF selection
9. Authentication/Security
11. Identity Request/Response
EIR
12. N5g-eir_EquipmentIdentityCheck_Get
13. UDM selection
15. PCF selection
16. Policy Association Establishment during Registration
22. Registration Accept
23. Registration Complete
UDM
18. Nsmf_PDUSession_UpdateSMContext /
Nsmf_PDUSession_ReleaseSMContext
10. Namf_Communication_
RegistrationCompleteNotify
5 Namf_Communication_UEContextTransfer response
N3IWF
19. N2 AMF Mobility Request
20. N2 AMF MobilityResponse
14c. Nudm_UCM_DeregistrationNotify
14a. Nudm_UECM_Registration
14b. Nudm_SDM_Get
14c. Nudm_SDM_Subscribe
14d. Nudm_SDM_Unsubscribe
17. Namf_EventExposure_Subscribe
21. AMF-Initiated Policy Association Termination
UE-initiated Deregistration
UE (R)AN AMF SMF UPFPCF
2. Nsmf_PDUSession_ReleaseSMContext Request
1. Deregistration Request
4. Nsmf_PDUSession_ReleaseSMContext Response
3a. N4 Session Release Request
3b. N4 Session Release Response
7. De-registration Accept
8. Signalling Connection Release
5a.Session Management Policy Termination
6a.AMF-initiated Policy Association Termination
UDM
5b.Nudm_SDM_Unsubscribe
6b.Nudm_SDM_Unsubscribe
5c. Nudm_UECM_Deregistration
Network-initiated Deregistration
UE (R)AN AMF SMF UPFPCF
1. Nudm_UECM_DeregistrationNotification
6. De-registration Accept
7. Signalling Connection Release
2. De-registration Request
3. Nudm_UECM_DeregistrationNotificationAck
UDM
4. Step 2 ~ step 5 of UE initiated De-registration in clause 4.2.2.3.2
3a. Nudm_SDM_Unsubscribe
5.AMF-initiated Policy Association Termination
 In 5G mobile IP, each cell phone is expected to have
a permanent "home" IP address, along with a "care-
of" address that represents its actual location.
 IPv6 is needed for many addresses and the multiple
layers of sub netting.
 128 bits (4 times more than current 32 bit IPv4
address) may be divided into four parts (I thru IV) for
supporting different functions. The first 32-bit part (I)
may be defined as the home address of a device
while the second part (II) may be declared as the
care-of address allowing communication between
cell phones and personal computers.
 Principle Of Data
Transmission :-
Hardware Used in 5G :-
HARDWARE USED :-
 Uses UWB (Ultra Wide
Band) networks with
higher BW at low energy
levels.
 BW is of 4000 Mbps,
which is 400 times faster
than today’s wireless
networks
 Uses smart antenna
 Uses CDMA (Code
Division Multiple Access)
Software Used in 5G :-
SOFTWARE USED
 5G will be single unified
standard of different
wireless networks,
including LAN technologies,
LAN/WAN, WWWW- World
Wide Wireless Web,
unified IP & seamless
combination of broadband
• Software defined radio,
encryption, flexibility, Anti-
Virus
ADVANTAGES :-
 Data Bandwidth of 1Gbps or higher.
 Dynamic information access.
 Available at low cost.
 Finest Quality Of Service(QOS).
 Pages will upload almost instantly.
 Support interactive multimedia, voice, streaming video, Internet, and
other broadband services.
DISADVANTAGE :-
 Since 5G services are likely to run on ultra-high spectrum bands, which
travel shorter distances compared with lower bands, they may be more
suited to enhanced indoor coverage.
 Higher frequencies could be blocked by buildings and they lose intensity
over longer distances. That means, offering wider coverage would be a
challenge.
APPLICATIONS
 Wireable devices with AI(Artificial Intelligence)capabilities.
 5G iPhones.
 With 6th Sense technology.
 Global Networks.
 VoIP(Voice Over IP) enabled devices.
 Radio resource management.
 Media independent handover.
CONCLUSION
5G technology is going to be a new revolution in wireless systems
market.
5G will be User Centric.
5G is the next frontier of innovation for entire mobile industry.
5G - a promising Generation of wireless communication that will
change people’s lives.
Any queries
Thank you

Mais conteúdo relacionado

Mais procurados

Introduction to 5G
Introduction to 5GIntroduction to 5G
Introduction to 5GAli Nikfal
 
5G report 2
5G report 25G report 2
5G report 2IGDTUW
 
5G Technology - History of Wireless Technology
5G Technology - History of Wireless Technology5G Technology - History of Wireless Technology
5G Technology - History of Wireless TechnologyArslanShabbir8
 
5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networkingvenkada ramanujam
 
Mobile uses in colleges
Mobile uses in collegesMobile uses in colleges
Mobile uses in collegesREELA_MALA
 
Propelling 5G forward: a closer look at 3GPP Release-16
Propelling 5G forward: a closer look at 3GPP Release-16Propelling 5G forward: a closer look at 3GPP Release-16
Propelling 5G forward: a closer look at 3GPP Release-16Qualcomm Research
 
Mobile payment-security-risk-and-response
Mobile payment-security-risk-and-responseMobile payment-security-risk-and-response
Mobile payment-security-risk-and-responseDESMOND YUEN
 
Offering Rich Communications Services (RCS) as a Multimedia Application to co...
Offering Rich Communications Services (RCS) as a Multimedia Application to co...Offering Rich Communications Services (RCS) as a Multimedia Application to co...
Offering Rich Communications Services (RCS) as a Multimedia Application to co...Ali Saghaeian
 
Evolution of Cell Phone and Tedrad Model
Evolution of Cell Phone and Tedrad ModelEvolution of Cell Phone and Tedrad Model
Evolution of Cell Phone and Tedrad ModelSadettin Demirel
 
5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm 5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm Saurabh Verma
 
5G Challenges and Opportunities
5G Challenges and Opportunities5G Challenges and Opportunities
5G Challenges and OpportunitiesAliMohamedAhmed2
 
Why and what you need to know about 6G in 2022
Why and what you need to know about 6G in 2022Why and what you need to know about 6G in 2022
Why and what you need to know about 6G in 2022Qualcomm Research
 

Mais procurados (20)

Introduction to 5G
Introduction to 5GIntroduction to 5G
Introduction to 5G
 
5G report 2
5G report 25G report 2
5G report 2
 
5G Technology - History of Wireless Technology
5G Technology - History of Wireless Technology5G Technology - History of Wireless Technology
5G Technology - History of Wireless Technology
 
5G
5G5G
5G
 
NGN BASICS
NGN BASICSNGN BASICS
NGN BASICS
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
 
5G BASIC
5G BASIC5G BASIC
5G BASIC
 
5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking5G Technology Strategy: Next-Generation Mobile Networking
5G Technology Strategy: Next-Generation Mobile Networking
 
Mobile uses in colleges
Mobile uses in collegesMobile uses in colleges
Mobile uses in colleges
 
Propelling 5G forward: a closer look at 3GPP Release-16
Propelling 5G forward: a closer look at 3GPP Release-16Propelling 5G forward: a closer look at 3GPP Release-16
Propelling 5G forward: a closer look at 3GPP Release-16
 
4G MAGIC
4G MAGIC4G MAGIC
4G MAGIC
 
Mobile payment-security-risk-and-response
Mobile payment-security-risk-and-responseMobile payment-security-risk-and-response
Mobile payment-security-risk-and-response
 
Offering Rich Communications Services (RCS) as a Multimedia Application to co...
Offering Rich Communications Services (RCS) as a Multimedia Application to co...Offering Rich Communications Services (RCS) as a Multimedia Application to co...
Offering Rich Communications Services (RCS) as a Multimedia Application to co...
 
Evolution of Cell Phone and Tedrad Model
Evolution of Cell Phone and Tedrad ModelEvolution of Cell Phone and Tedrad Model
Evolution of Cell Phone and Tedrad Model
 
Using mobile phones
Using mobile phonesUsing mobile phones
Using mobile phones
 
4G Technology
4G Technology4G Technology
4G Technology
 
5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm 5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm
 
5G Challenges and Opportunities
5G Challenges and Opportunities5G Challenges and Opportunities
5G Challenges and Opportunities
 
Touch Technology: MIS Case study
Touch Technology: MIS Case study Touch Technology: MIS Case study
Touch Technology: MIS Case study
 
Why and what you need to know about 6G in 2022
Why and what you need to know about 6G in 2022Why and what you need to know about 6G in 2022
Why and what you need to know about 6G in 2022
 

Semelhante a 5G Network Architecture and Key Technologies Explained

Semelhante a 5G Network Architecture and Key Technologies Explained (20)

5 gppt
5 gppt5 gppt
5 gppt
 
5 g-ppt
5 g-ppt5 g-ppt
5 g-ppt
 
5 g-ppt
5 g-ppt5 g-ppt
5 g-ppt
 
5G Moblie Computing
5G Moblie Computing5G Moblie Computing
5G Moblie Computing
 
Scope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryScope of 5G technologies in 21st century
Scope of 5G technologies in 21st century
 
IRJET-V5I9187.pdf
IRJET-V5I9187.pdfIRJET-V5I9187.pdf
IRJET-V5I9187.pdf
 
5G TECHNOLOGY
5G TECHNOLOGY5G TECHNOLOGY
5G TECHNOLOGY
 
5 g mobile system
5 g mobile system5 g mobile system
5 g mobile system
 
5G complete presentation 2016 upload
5G complete presentation 2016 upload5G complete presentation 2016 upload
5G complete presentation 2016 upload
 
5 g communication systems
5 g communication systems5 g communication systems
5 g communication systems
 
5 g wireless technology
5 g wireless technology5 g wireless technology
5 g wireless technology
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 
5g presentation
5g presentation5g presentation
5g presentation
 
ssad
ssadssad
ssad
 
5G TECHNOLOGY
5G TECHNOLOGY5G TECHNOLOGY
5G TECHNOLOGY
 
4G Technology
4G Technology4G Technology
4G Technology
 
5 g
5 g5 g
5 g
 
4 g technology
4 g technology4 g technology
4 g technology
 
5 g technology bdma
5 g technology bdma5 g technology bdma
5 g technology bdma
 

Último

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Último (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

5G Network Architecture and Key Technologies Explained

  • 2. C O N T E N T S  Introduction to 5G.  5G Experience be like.  Brief Idea about 5G.  Evolution from 1G to 5G.  Comparison table of features of 1G to 5G.  Architecture of 5G.  CallFlow  Functional Architecture of 5G.  Hardware and Software of 5G.  Advantages.  Disadvantages.  Applications.  Conclusion.
  • 3.  INTRODUCTION 5G is the short for fifth generation, a mobile broadband technology that is in the early stages of works and likely to be in place six to seven years from now.  A 5G network will be able to handle 10,000 times more call and data traffic than the current 3G or 4G network.  Data download speeds on 5G networks are likely to be several hundred times more than 4G.  5G mobile technology will change the means to use cell phones within very high bandwidth.
  • 4.  BRIEF IDEA ABOUT 5G CURRENT STATUS OF 5G? The European Telecommunications Standards Institute is formulating 5G global technology standards, which are likely to be formalized by 2019. Telecom companies such as Nokia, Ericsson, NTT DoCoMo, Samsung, Huawei and Fujitsu are driving bulk of the 5G-related innovations. PEOPLE WILL BE ABLE TO EXPERIENCE WITH 5G. 5G networks are likely to be rolled out commercially between 2020 and 2025. If the global standards are finalized by 2019, the earliest commercial deployments could happen by 2020. 3G AND 4G HANDSETS DOESN’T RUN ON 5G NETWORKS. No. 5G will require new chipsets and devices capable of supporting speeds upwards of 10 gigabits per second. 4G and 3G run at a fraction of that speed.
  • 5.  Evolution from 1G to 5G 1G (1980/1990) 2G/2.5G ( Late 90’S) 3G (2001) 4G (2010) 5G (Expected by 2017 in Indian Market)
  • 6. 1G:- 1’st Generation • 1G refers to 1st generation of mobile telecommunication • It is developed in 1980s and completed in early 1990s. • It provides a speed up to 2.4kbps. • It is based on analog system. • It allows user to make call in one country. • It has low capacity, unreliable handoff, poor voice links , and no security at all since voice calls were played back in radio towers, making these calls susceptible to unwanted eavesdropping by third parties. low capacity, unreliable handoff, poor voice links, and no security a • t all since voice calls were played back in radio towers, making these calls susceptible to unwanted eavesdropping by third parties. has low capacity, unreliable handoff, poor voice links, and no security at all since voice calls were played back in radio towers, making these calls susceptible to unwanted eavesdropping by third parties.
  • 7. 2G :- 2’nd Generation • 2G refers to 2nd generation of mobile telecommunication. • It was developed in late 1980s and completed in late 1990s. • It is based on digital system. • It provides a speed of up to 64 kbps. • It provides services like voice and sms with more clarity.  Major prominent technologies were GSM, CDMA, and IS95
  • 8. 3G :- Third Generation NTT DoCoMo launched the first commercial 3G network on 1 October 2001, using the WCDMA technology  bandwidth of 3G network is 128 Kbps for mobile stations, and 2 Mbps for fixed applications  The current trend in mobile systems is to support the high bit rate data services at the downlink via High Speed Downlink Packet Access (HSDPA)
  • 9. 4G:- 4’th Generation • It was developed in the year 2010. • It is faster and more reliable. • It provides speed up to 100mbps. • It provides high performance like uploading and downloading speed. • It provides easy roaming as compaired to 3G. • Use of a higher Layer Protocol (IP) as transport medium affords intelligence at every stage within the network relative to a service
  • 10. 5G :- 5’th Generation • It is the next major phase of mobile telecommunication & wireless system. • It is 10 times more faster than 4G. • It has a expected speed of 1gbps. • Lower cost than the previous version. • It is expected to come around the year 2017.
  • 11. Comparison of 5G with other :-
  • 12. Networking Architecture of 5G:-  OSI Layers 5G mobile network layer
  • 13. OWA stands for Open Wireless Architecture this layer is used to be used as Physical Layer + Data link Layer = OWA. Network Layer is divided into two sub layers • 1) Lower Network Layer • 2) Upper Network Layer Network Layer is used to route the data from source to destination. Open transport layer perform the operation of both Transport Layer and Session Layer. • Transport Layer + Session Layer=OTL. Application Layer marks the data into proper format i.e. ,it decrypt the data which is in encrypted form and selects the best wireless connection for a given service.
  • 15. RAN A radio access network (RAN) is part of a mobile telecommunication system. It implements a Radio Access Technology. Conceptually, it resides between a device such as a mobile phone, a computer, or any remotely controlled machine and provides connection with its core network. FLAT IP NETWORK Certainly Flat IP network is the key concept to make 5G acceptable for all kind of technologies. To meet customer demand for real-time data applications delivered over mobile broadband networks, wireless operators are turning to flat IP network architectures. 5G NANOCORE The 5G Nanocore is a convergence of below mention technologies. These technologies have their own impact on exiting wireless network which makes them in to 5G. Nanotechnology. Cloud Computing. All IP Platform.
  • 16. Nano Technology :- Nanotechnology is the application of nano science to control process on manometer scale. i.e. between 0.1 and100nm.The field is also known as molecular nanotechnology(MNT). It deals with control of the structure of matter based on atom-by-atom and molecule by molecule engineering. The term nanotechnology was introduced by Nori Taniguchi in 1974 at the Tokyo international conference on production engineering. Cloud computing :- Cloud computing is a technology that uses the internet and central remote server to maintain data and applications. In 5G network this central remote server will be our content provide. Cloud computing allows consumers and business to use applications without installation and access their personal files at any computer with internet access. The same concept is going to be used in Nanocore where the user tries to access his private account form a global content provider through Nanocore in form of cloud. The All-IP Network(AIPN) :- The All-IP Network(AIPN) is an evolution of the 3GPPsystem to meet the increasing demands of the mobile telecommunications market. To meets customer demand for real-time data applications delivered over mobile broadband networks, wireless operators are turning to flat IP network architectures.
  • 18. GPRS (General Packet Radio Service) a) It is used to transmit data at 60kb/sec. b) It consume less battery during sending & receiving mail or . . . . browsing internet. EDGE (Exchanged Data Rate for GSM Evolution) a) It is an advance version of GPRS . b) It provide a data speed of 473kb/sec. 3G a) 3G makes it possible to do video call on mobile network. b) It also provide efficient way to browse internet on mobile networking. WLAN( Wireless LAN) a) Wireless LAN provides short range, high speed wireless data . . connection between mobile data device using radio or signal.  LTE(Long Term Evolution) a) LTE is standard for mobile communication for high speed data transmission for mobile network. Its Speed is up to 100mb/sec.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. 5G is the short for fifth generation, a mobile broadband technology that is in the early stages of works and likely to be in place six to seven years from now. A 5G network will be able to handle 10,000 times more call and data traffic than the current 3G or 4G network Data download speeds on 5G networks are likely to be several hundred times more than 4G. 5G mobile technology will change the means to use cell phones within very high bandwidth
  • 39.
  • 40. UE (R)AN UPF AF AMF SMF PCF UDM DNN6 NRFNEF N3 N2 N4 AUSF Nausf Namf Nsmf NpcfNnrfNnef Nudm Naf NSSF Nnssf
  • 41. AMF PCF UE (R)AN UPF DN N13 N7 N3 N6 N2 N4N1 AFN5SMFN11 N9 AUSF N8N12 UDM N10 N14 N15 NSSF N22 Figure- Non-Roaming G System Architecture in reference point representation
  • 43. 5QI Value Resource Type Default Priority Level Packet Delay Budget Packet Error Rate Default Maximum Data Burst Volume (NOTE 2) Default Averaging Window Example Services 10 Delay Critical GBR 11 5 ms 10-5 160 B TBD Remote control (see TS 22.261 [2]) 11 NOTE 4 12 10 ms NOTE 5 10-5 320 B TBD Intelligent transport systems 12 13 20 ms 10-5 640 B TBD 16 NOTE 4 18 10 ms 10-4 255 B TBD Discrete Automation 17 NOTE 4 19 10 ms 10-4 1358 B NOTE 3 TBD Discrete Automation 1 GBR NOTE 1 20 100 ms 10-2 N/A TBD Conversational Voice 2 40 150 ms 10-3 N/A TBD Conversational Video (Live Streaming) 3 30 50 ms 10-3 N/A TBD Real Time Gaming, V2X messages Electricity distribution – medium voltage, Process automation - monitoring 4 50 300 ms 10-6 N/A TBD Non-Conversational Video (Buffered Streaming) 65 7 75 ms 10-2 N/A TBD Mission Critical user plane Push To Talk voice (e.g., MCPTT) 66 20 100 ms 10-2 N/A TBD Non-Mission-Critical user plane Push To Talk voice 75 25 50 ms 10-2 N/A TBD V2X messages E NOTE 4 18 10 ms 10-4 255 B TBD Discrete Automation F NOTE 4 19 10 ms 10-4 1358 B NOTE 3 TBD Discrete Automation 5 Non-GBR NOTE 1 10 100 ms 10-6 N/A N/A IMS Signalling 6 60 300 ms 10-6 N/A N/A Video (Buffered Streaming) TCP-based (e.g., www, e-mail, chat, ftp, p2p file sharing, progressive video, etc.) 7 70 100 ms 10-3 N/A N/A Voice, Video (Live Streaming) Interactive Gaming 8 80 300 ms 10-6 N/A N/A Video (Buffered Streaming) TCP-based (e.g., www, e-mail, chat, ftp, p2p file 9 90 N/A N/A sharing, progressive video, etc.) 69 5 60 ms 10-6 N/A N/A Mission Critical delay sensitive signalling (e.g., MC-PTT signalling) 70 55 200 ms 10-6 N/A N/A Mission Critical Data (e.g. example services are the same as QCI 6/8/9) 79 65 50 ms 10-2 N/A N/A V2X messages 80 66 10 ms 10-6 N/A N/A Low Latency eMBB applications Augmented Reality NOTE 1: a packet which is delayed more than PDB is not counted as lost, thus not included in the PER. NOTE 2: it is required that default Maximum Data Burst Volume is supported by a PLMN supporting the related 5QIs. NOTE 3: This Maximum Burst Size value is intended to avoid IP fragmentation on an IPv6 based, IPSec protected, GTP tunnel to the 5G-AN node. NOTE 4: A delay of 1 ms for the delay between a UPF terminating N6 and a 5G-AN should be subtracted from a given PDB to derive the packet delay budget that applies to the radio interface. NOTE 5:The jitter for this service is assumed to be 20 msec as per TS 22.261 [2].
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54. New AMF AUSFSMF(R)ANUE 4 Namf_Communication_UEContextTransfer 1. Registration Request PCF 2. AMF selection 3. Registration Request Old AMF 6. Identity Request 7. Identity Response 8. AUSF selection 9. Authentication/Security 11. Identity Request/Response EIR 12. N5g-eir_EquipmentIdentityCheck_Get 13. UDM selection 15. PCF selection 16. Policy Association Establishment during Registration 22. Registration Accept 23. Registration Complete UDM 18. Nsmf_PDUSession_UpdateSMContext / Nsmf_PDUSession_ReleaseSMContext 10. Namf_Communication_ RegistrationCompleteNotify 5 Namf_Communication_UEContextTransfer response N3IWF 19. N2 AMF Mobility Request 20. N2 AMF MobilityResponse 14c. Nudm_UCM_DeregistrationNotify 14a. Nudm_UECM_Registration 14b. Nudm_SDM_Get 14c. Nudm_SDM_Subscribe 14d. Nudm_SDM_Unsubscribe 17. Namf_EventExposure_Subscribe 21. AMF-Initiated Policy Association Termination
  • 55. UE-initiated Deregistration UE (R)AN AMF SMF UPFPCF 2. Nsmf_PDUSession_ReleaseSMContext Request 1. Deregistration Request 4. Nsmf_PDUSession_ReleaseSMContext Response 3a. N4 Session Release Request 3b. N4 Session Release Response 7. De-registration Accept 8. Signalling Connection Release 5a.Session Management Policy Termination 6a.AMF-initiated Policy Association Termination UDM 5b.Nudm_SDM_Unsubscribe 6b.Nudm_SDM_Unsubscribe 5c. Nudm_UECM_Deregistration
  • 56. Network-initiated Deregistration UE (R)AN AMF SMF UPFPCF 1. Nudm_UECM_DeregistrationNotification 6. De-registration Accept 7. Signalling Connection Release 2. De-registration Request 3. Nudm_UECM_DeregistrationNotificationAck UDM 4. Step 2 ~ step 5 of UE initiated De-registration in clause 4.2.2.3.2 3a. Nudm_SDM_Unsubscribe 5.AMF-initiated Policy Association Termination
  • 57.
  • 58.  In 5G mobile IP, each cell phone is expected to have a permanent "home" IP address, along with a "care- of" address that represents its actual location.  IPv6 is needed for many addresses and the multiple layers of sub netting.  128 bits (4 times more than current 32 bit IPv4 address) may be divided into four parts (I thru IV) for supporting different functions. The first 32-bit part (I) may be defined as the home address of a device while the second part (II) may be declared as the care-of address allowing communication between cell phones and personal computers.  Principle Of Data Transmission :-
  • 59. Hardware Used in 5G :- HARDWARE USED :-  Uses UWB (Ultra Wide Band) networks with higher BW at low energy levels.  BW is of 4000 Mbps, which is 400 times faster than today’s wireless networks  Uses smart antenna  Uses CDMA (Code Division Multiple Access)
  • 60. Software Used in 5G :- SOFTWARE USED  5G will be single unified standard of different wireless networks, including LAN technologies, LAN/WAN, WWWW- World Wide Wireless Web, unified IP & seamless combination of broadband • Software defined radio, encryption, flexibility, Anti- Virus
  • 61. ADVANTAGES :-  Data Bandwidth of 1Gbps or higher.  Dynamic information access.  Available at low cost.  Finest Quality Of Service(QOS).  Pages will upload almost instantly.  Support interactive multimedia, voice, streaming video, Internet, and other broadband services.
  • 62. DISADVANTAGE :-  Since 5G services are likely to run on ultra-high spectrum bands, which travel shorter distances compared with lower bands, they may be more suited to enhanced indoor coverage.  Higher frequencies could be blocked by buildings and they lose intensity over longer distances. That means, offering wider coverage would be a challenge.
  • 63. APPLICATIONS  Wireable devices with AI(Artificial Intelligence)capabilities.  5G iPhones.  With 6th Sense technology.  Global Networks.  VoIP(Voice Over IP) enabled devices.  Radio resource management.  Media independent handover.
  • 64. CONCLUSION 5G technology is going to be a new revolution in wireless systems market. 5G will be User Centric. 5G is the next frontier of innovation for entire mobile industry. 5G - a promising Generation of wireless communication that will change people’s lives.
  • 65.