06-IPLOOK 5GC Product Description2022
06-IPLOOK 5GC Product Description2022
www.iplook.com
Page 1 of 200
IPLOOK 5GC Product description
Page 2 of 200
Table of Contents
Revision history........................................................................................................................................... 5
1 Introduction............................................................................................................................................... 6
1.2.1 Virtualization...............................................................................................................................9
2 System architecture............................................................................................................................... 12
3 Functionality............................................................................................................................................14
3.1 AMF...................................................................................................................................................14
3.1.1Basic function............................................................................................................................14
3.2 SMF...................................................................................................................................................54
Page 3 of 200
3.4 UDM/AUSF.................................................................................................................................... 144
3.6 NRF.................................................................................................................................................144
6 Dimension............................................................................................................................................. 193
Page 4 of 200
Revision history
Version
Interfaces
Network
Architecture
recursive
queries
functional
decoupling and
interaction
support
Page 5 of 200
1 Introduction
1.1 5GC overview
5GC refers to a core network architecture that supports 5G SA access networks. IPLOOK provides SA
5GC with most 4G/3G elements are integrated. It is able to interwork with 4G, 3G and 2G network.
IPLOOK 5GC includes AMF, SMF, AUSF, UDM, UPF, PCF, NRF, NSSF and NEF. 5GC is service based
which turns the P2P communication into communication among service modules. All the service
modules(also called network functions) are able to deployed separately into different VMs or containers.
And they are also able to be deployed together into one VM or container.
The diagram of 5GC is shown in Figure 1
Figure 1 5GC Diagram
Name Function
Page 6 of 200
Name Function
distribution function, NAS (N1 interface) signaling and its security, AS security
The interface supports N1, N2, N8, N12, N11, N15; the service-oriented
SMF Supports PDU session establishment, PDU session modification, PDU session release,
selection: UPF selection; PCF selection; UDM selection, business offloading: UL CL;
control function, and associated flow of PDU session Policy, policy control request
trigger, QoS Flow binding, policy control request event reporting function, 5GS and EPC
policy integration control function, reflection QoS function, basic location management
function;
Interface support: N1, N2, N4, N7, N10, service-oriented interface protocol support: NAS,
PFCP/GTP-U, Nudm.
UDM Support the generation of 3GPP AKA authentication certificates, user identification
Page 7 of 200
Name Function
The interface supports N8, N10, N21, N13, N, 36, and the service-oriented interface
PCF Support access to user information related to policy decisions in database storage
(UDR), binding mechanism, flow monitoring and reporting mechanism, QoS control, gate
control function, business monitoring and control function, flow-oriented control function;
UPF Support PDU session management function, manage PDU session information, support
multiple SMF control UPF, switch based on Xn interface, switch based on N2 interface,
session level (APN-AMBR, TDF session UL and DL bit rate, or UL and PDN connection
DL rate), bearer level (GBR, MBR carried by GBR), QoS Flow level (for 5GC), service
data flow (SDF) or application, support upstream and downstream traffic classifiers and
merge functions;
The interface supports N3, N4, N9, N6, and the service-oriented interface protocol
NRF Supports service discovery function, maintains NF profile and available NF instances.
NSSF The NSSF can be used by the AMF (Core Access and Mobility Management Function) to
assist with the selection of the Network Slice instances that will serve a particular device.
Page 8 of 200
Name Function
NEF NEF, located between the 5G core network and external third-party application
functionaries (and possibly some internal AFs), is responsible for managing the external
open network data, and all external applications that want to access the internal data of
1.2.1 Virtualization
Software and hardware are decoupled through virtualization. The IPLOOK 5GC software can be
deployed quickly and operate on universal hardware devices of the X86 COTS server or
VM/container based virtual platform.
The IPLOOK 5GC hardware resources are virtualized to many VMs. When the IPLOOK 5GC
needs to increase its processing capability, more VMs can be installed.
The IPLOOK 5GC supports redundancy and disaster recovery of components and NEs. NEs
can be deployed in the entire resource pool through distributed deployment of VMs to enhance
system reliability.
The IPLOOK 5GC supports smooth evolution and system migration through online patches and
application updates.
IPLOOK provides ALL-IN-ONE design compact 5GC solution, all NEs like
AMF,SMF,AUSF,UDM,UPF, PCF and web management functions are in a single server. It also
supports Nchf for external billing.
Compact 5GC specification:
5000 UEs, 50 eNBs, up to 6Gbps
The 5GC system provides a series of products and open standard interfaces.
Page 9 of 200
The IPLOOK 5GC supports multiple types of VIM/CMS cloud management systems, multiple
types of Hypervisors, and multiple types of orchestrators. It can be configured flexibly based the
network requirements.
The IPLOOK 5GC performs daily maintenance and management through the unified EMS .
The IPLOOK 5GC functions can be maintained on the local O&M and in the upper-layer EMS.
The features are as follows:
The O&M uses the B/S structure, and the EMS uses the C/S structure, ensuring
a desirable networking capability and expansion of the operation and
maintenance system.
Provides remote and local access to the system so that both local and remote
operation and maintenance can be implemented. Maintenance operations can
be performed on the entire system and each specified NE.
Multi-level permission mechanism to ensure system security.
The IPLOOK 5GC has the dynamic management, preventive maintenance, MML
navigation, tracing tool (including signaling tracing and failure observation),
alarm management, and performance management functions. With these
functions, the system provides multiple operation and maintenance methods
precisely, reliably, practicably and conveniently. In addition, more functions
can be added as needed.
The EMS system provides friendly management interfaces, various functions and
flexible networking. Multiple NEs can be managed in a centralized way.
1.2.6 NFV Performance Optimization Techniques
Network Function Virtualization (NFV) is a core structural change in the way telecommunication
infrastructure gets deployed. This in turn will bring significant changes in the way that
applications are delivered to service providers. NFV will bring cost efficiencies, time-to-market
improvements and innovation to the telecommunication industry infrastructure and applications.
NFV will achieve this through disaggregation of the traditional roles and technology involved in
telecommunications applications.
Performance, especially the user plane performance using COTS has always been a concern
for service providers and equipment vendors alike. IPLOOK’s 5GC address the issue by
applying the following performance optimization techniques to the user plane software
processing module.
Combine the Single Root I/O Virtualization (SR-IOV) with Intel’s Data Plane Development Kit
(DPDK) techniques to enhance the performance.
Apply Open vSwitch (OVS) on enhanced Intel’s DPDK (By IPLOOK) to further enhance the data
processing performance.
Page 10 of 200
In addition, by using specific 10G, 40G or 100G NIC from Intel, the performance can be further
enhanced.
Page 11 of 200
2 System architecture
2.1 IPLOOK 5GC in the NFVI
IPLOOK 5GC is divided into three levels: HW level, virtualization level (cloud management
platform and virtualization technology) and service level..
Node Description
resources.
Page 12 of 200
Node Description
Hypervisor Arranges and manages NFV resources (infrastructure and applications) in the
NFVO Arranges and manages network services, virtualization resources, and physical
VIM/CMS Management module of the NFVI, which is the VIM in the ETSI NFV and the
Page 13 of 200
3 Functionality
3.1 AMF
3.1.1Basic function
3.1.1.1.1 Definition
The mobility management function controls the access of UE (User Equipment) in the 5G
network and tracks the current location information of UE (TA/TA List, etc.) through the
3.1.1.1.2 Dependencies
Category Parameters
Parameters
N3550=Register to accept time out
retransmissions(times)
Page 14 of 200
T3560=Safety mode timer(s)
T3570=Authentication timer(s)
retransmits (times)
retransmission times(times)
retransmissions (times)
(min)
Page 15 of 200
3.1.1.1.4 Principle
ensure the timely update of UE location information in the relevant network entities when the UE
is mobile.To obtain 5G network services, the UE first needs to initiate a registration process with
the network side, which can save the UE's contextual information, location information and
some network protocol parameters. After the registration process is completed, the UE can
carry out other business processes. Initiated to release the RRC connection on the wireless side
and the UE turns to idle state, which saves the network signaling and wireless side resources. If
the UE has data to send to the network side or the network side has data to send downward,
the service request process shall be initiated to restore the connection between the UE and the
network side before the data transmission service. If the UE moves its position from one (R)AN
to another (R)AN, the (R)AN will trigger the Handover process to switch the UE to the (R)AN
with strong signal to continue the service according to the signal strength. If the UE wants to log
off from a network and no longer receive services from this network, it can initiate a de-
registration process to stop its services in this network. The following describes the main
• Registration process: When the UE needs to access the network to receive the service, the UE
performs the initial registration process; when the UE moves out of the originally registered area,
it performs the mobility registration update; when the periodic registration update of the idle
state UE times out, the UE initiates the periodic registration update process.
Page 16 of 200
• De-registration process: The de-registration process occurs when the UE does not need to
continue accessing the network to receive services, or when the UE does not have permission
• AN Release Process: When the UE is inactive for a long time, the (R)AN initiates the AN
Rlease process to save network resources after the UE inactivity timer on the (R)AN times out.
• Service request process: The service request process is used to establish a signaling
connection between the idle state UE and the AMF, and can also be used for the idle state or
• Switching process: The switching process of the connected UE from a source (R)AN node to a
target (R)AN node occurs in the 5GS systems, which is divided into Xn-based switching and N2-
based switching process according to the existence of Xn interfaces at the source and target
(R)AN nodes.
• UE configuration update process: The UE configuration can be updated at any time by the
3.1.1.2.1 Definition
5G supports a two-way authentication mechanism between the network and the user. The
network side determines the validity of user identity through authentication, enabling legitimate
users to use the services provided by the network; the user side ensures the security of access
Page 17 of 200
3.1.1.2.2 Dependencies
√ √ √ √
Category Parameters
AUTN
XRES*
KAUSF
3.1.1.2.4 Principles
The UE first accesses to the network, data encryption and integrity check failure, etc. The UE
and the network side carry out two-way authentication to verify whether each other is safe and
legal. 5G authentication function is done by UE, AMF, AUSF and UDM interaction. The
authentication is divided into two ways EAP-AKA' and 5G AKA, currently the main way is 5G
5G AKA is a variant of EPS AKA, which adds an attribution network authentication process to
EPS AKA to prevent fraudulent attacks. Compared with EPS AKA where MME performs the
Page 18 of 200
authentication function, 5G AKA where AMF and AUSF jointly perform the authentication
function, AMF is responsible for service network authentication and AUSF is responsible for
attribution network authentication. 5G AKA authentication can be divided into three sub-
The AMF initiates an initial authentication request to the AUSF, and the AUSF determines that
the service network is authorized to be used and requests authentication data from the UDM,
which decrypts the SUCI to SUPI, selects the authentication method based on the user's
authentication can only obtain one authentication vector at a time, and the AUSF will do a
a. The AMF initiates an authentication request to the UE, carrying authentication parameters
b. The UE authenticates the network according to the AUTN, and after the authentication is
successful, the authentication response RES* is calculated by RAND and sent to the AMF.
c. The AMF verifies the authentication response returned by the UE to determine whether the
The AMF sends the authentication response RES* from the UE to the AUSF, which verifies
RES* to give the attribution network authentication confirmation result and notifies the AMF. If
the authentication is successful, the AUSF sends KSEAF to the AMF so that the AMF can
Page 19 of 200
3.1.1.3 Network user identity confidentiality
3.1.1.3.1 Definition
The user identity confidentiality function means that the AMF assigns a temporary identity 5G-
GUTI (5G Globally Unique Temporary UE Identity) to the UE to avoid disclosure of the user's
permanent identity.
3.1.1.3.2 Dependencies
UE AMF
√ √
3.1.1.3.3 Principles
5G-GUTI (5G Globally Unique Temporary UE Identity) is a temporary identity assigned by the
5G-GUTI structure
• <GUAMI> = <MCC> <MNC> <AMF Region ID> <AMF Set ID> <AMF Pointer> which is a
Page 20 of 200
AMF supports sending 5G-GUTI to UE through registration process, 5G-GUTI redistribution
process.
• After the Service Request process is triggered on the network side, the AMF re-assigns
• The AMF provides the GUTI reassignment timer function, which is started after the UE
enters the connected state. After the timer timeout, if the UE is in the connected state, the AMF
3.1.1.4.1 Definition
The AMF and UE use consensus encryption and integrity protection algorithms to protect the
3.1.1.4.2 Dependencies
UE AMF
√ √
Page 21 of 200
3.1.1.4.3 Principles
AMF supports three encryption and integrity protection algorithms: AES algorithm, SNOW 3G
- AES algorithm: AES is currently the most widely used encryption and integrity algorithm in the
Algorithm2) and EIA2 (EPS Integrity Algorithm2) with a key length of 128 bits.
- SNOW 3G algorithm: SNOW 3G is a basic 3GPP encryption algorithm and integrity algorithm,
the corresponding algorithms include EEA1 (EPS Encryption Algorithm1) and EIA1 (EPS
- ZUC algorithm: The ZUC algorithm (also known as Zuchon's algorithm) is a sequential
cryptographic algorithm designed for hardware. The algorithm outputs a 32-bit sequence of keys
for encryption and integrity protection of data based on an initial key of 128 bits and an initial
3.1.1.5.1 Definition
Identification function means that the network side requests the user to provide an identity
3.1.1.5.2 Dependencies
UE AMF
√ √
Page 22 of 200
3.1.1.5.3 Principles
In 5G networks, the user identity includes SUPI, SUCI, 5G-GUTI, and PEI.
• SUPI (Subscription Permanent Identifier): the permanent identity of the UE in the 5G network.
• SUCI (Subscription Concealed Identifier): The UE encrypts the SUPI to generate SUCI. when
• 5G-GUTI (5G Globally Unique Temporary UE Identity): the temporary identity assigned to the
UE by the AMF.
When a UE registers to the network with a 5G-GUTI, the AMF sends an identification request to
the UE to obtain the SUCI or PEI of the UE if the first authentication fails, or if the AMF cannot
recognize the 5G-GUTI, or if the AMF needs to obtain the PEI of the UE for device identification.
3.1.1.6.1 Definition
User data management refers to the process of inserting, modifying and deleting user data in
AMF.
Subscriber data includes subscriber sign-up data in UDM and data dynamically generated
3.1.1.6.2 Dependencies
UE AMF UDM
Page 23 of 200
√ √
3.1.1.6.3 Principles
• User Data
User Data
• The information that mobile subscribers sign up for in UDM, including subscriber identification
• The data dynamically generated during the process of user access to the 5G network,
1. When a user registers for the first time or when the tracking area is updated to a new AMF,
the AMF actively requests the contracted data of the user from the UDM; when the contracted
data of the user in the UDM (such as NSSAI) is changed, the UDM will actively insert the
updated user data to the AMF to realize the modification of the contracted data on the AMF.
2. When the AMF receives mobile subscriber data, it checks the subscriber's contracted
features (service features, etc.), and if some of these features are not supported, it notifies the
UDM, which stores the information locally and decides whether to allow the subscriber to
Page 24 of 200
3. When a user is active in the AMF service area, AMFF keeps the data of that user to reduce
the interactive signaling with the UDM. When a user does not register again for a period of time
after separation, AMF actively clears the user's data and releases the occupied resources.
The processes related to the user data management function are as follows:
Page 25 of 200
▪ The Nudm_SubscriberDataManagement_Get process between AMF and UDM is mainly
used for AMF to obtain user data, such as NSSAI for UE.
mainly used for AMF to subscribe to the changes of user data in UDM.
mainly used for AMF to unsubscribe the user's data changes in UDM.
mainly used for UDM to notify AMF related user data changes that have subscribed to data
change notifications.
▪ UE Context Management
Page 26 of 200
As shown in Figure 2:
used for AMF to obtain the registration information of the corresponding AMF of UE from UDM.
mainly used for AMF to register its own information to UDM for the presence of UE context
UDM is mainly used for UDM to send the result of deregistration to the AMF that initiated the
deregistration process.
3.1.1.7 N2 interface
3.1.1.7.1 Definition
The N2 interface is the control plane interface between the (R)AN and AMF in 5G systems. The
network signaling.
3.1.1.7.2 Dependencies
RAN AMF
Page 27 of 200
√ √
3.1.1.7.3 Principles
NG-AP Introduction
The NG-AP consists of several Elementary Procedure EPs, one for each interaction between
NG-RAN and AMF, and one initialization message and one response message.
▪ There are response messages that indicate the success or failure of the EP. The following
▪ Success
▪ Failure
Page 28 of 200
A single signaling message indicates the success and failure results of several different
3.1.1.8.1 Definition
different NFs (Network Function), which are independent of each other and can be deployed on
demand. The same service of the NF can be invoked by other NFs through the service-based
interface of the NF, and the NFs achieve the corresponding functions by invoking each other's
service-based interfaces.
3.1.1.8.2 Dependencies
3.1.1.8.3 Principles
Page 29 of 200
Figure 4 Service-oriented interface protocol stack
The same protocol stack is used between servitized interfaces, the transport layer is unified with
HTTP/2 protocol, and the application layer carries different service messages. Because the
underlying transport is the same, all servitized interfaces can then be transported on the same
The interaction between all NFs in the control plane of 5G core network adopts service-oriented
interface, each NF can provide different services, and multiple Service Operations are defined in
each service, and the same Service Operation of NF can be invoked by multiple other NFs
through service-oriented interface to achieve specific functions. Taking the interaction between
AMF and SMF in the PDU session establishment process as an example, we introduce the
process of Service Operation of NFs among NFs being invoked by other NFs through the
service-oriented interface.
Page 30 of 200
Figure 5 Interaction between AMF and SMF in the PDU session establishment process
The AMF creates the context by calling the CreateSMContext Service Operation request in the
The SMF sends the messages to be transmitted to the RAN and the UE to the AMF by calling
The AMF forwards the N2 information received from the RAN to the SMF by calling the Update
NFs service the available functions and encapsulate them as Service Operation for other NFs to
invoke and achieve the corresponding functions. The servitized interface protocol stack is
consistent, and the invocation of Service Operation between NFs uses the servitized interface to
Page 31 of 200
AMF and SMF do not need to care about the internal implementation of each other's NFs, nor
do they need to make corresponding adaptations due to the internal structure of each other's
NFs changing, but only need to call the corresponding Service Operation through the service-
oriented interface to achieve the specified functions between NFs. the interface coupling
between NFs is low, the definition is flexible, and NFs can be combined on demand according to
3.1.1.9.1 Definition
The N26 interface is the interface between the AMF and the MME, providing a signaling
message tunnel between the AMF and the MME, and is used to assist in the interoperability
3.1.1.9.2 Dependencies
AMF MME
√ √
3.1.1.9.3 Principles
Page 32 of 200
3.1.1.10 EPS Fallback
3.1.1.10.1 Definition
This feature means that VoNR (Voice over NR, NR network voice service) is not deployed in the
wireless network, and when the UE accesses from the 5G network, it is allowed to register in
the IMS domain, but when the UE wants to make a call, it will fall back to the 4G network to
make a call via VoLTE. Provides a voice solution for 5G networks without deploying VoNR.
3.1.1.10.2 Dependencies
UPF
√ √ √ √ √ √ √ √
3.1.1.10.3 Principles
Page 33 of 200
Figure 6EPS Fallback Process
The UE has established an IMS PDU session after attaching to the 5G network and has been
1. the UE initiates the IMS voice service. the UE sends a SIP invite message to the IMS. the
IMS sends an AAR message to the PCF. the PCF responds to the AAA message to trigger the
notify the SMF of the creation of a voice proprietary QoS Flow. the SMF responds with an
Page 34 of 200
3. the SMF sends Namf_Communication_N1N2MessageTransfer to the AMF, carrying SM-
4. The AMF sends an N2 Session Request message to the NG-RAN to notify the NG-RAN of
the establishment of the voice QoS Flow resource, and the NG-RAN rejects the voice QoS Flow
in response to the N2 Session Response message and carries the IMS Voice EPS Fallback or
IMS Voice EPS Fallback or RAT Fallback Triggered cause value. the SMF responds with the
8. The PGW creates the request based on the cached QoS Flow with QCI=1 and then initiates
the IMS voice proprietary bearer creation process after the user has fallen back to the EPS
network.
carries IP-CAN-Type, RAT-Type and other information, which are all letter elements in 4G
network.
10. the PCF then sends a RAR message to IMS and IMS responds to the RAA message. the
IMS network sends a SIP message to the UE and the voice call is normal.
Page 35 of 200
3.1.1.11 IPV4V6 dual stack access
3.1.1.11.1 Definition
This feature supports assigning both IPv4 and IPv6 types of addresses to the UE in the PDU
session establishment process, so that the UE can subsequently use IPv4v6 addresses for data
3.1.1.11.2 Dependencies
√ √ √ √ √ √ √
3.1.1.11.3 Principles
Dual-stack technology is an effective technology for the transition from IPv4 to IPv6. Dual-stack
means that the nodes in the network support both IPv4 and IPv6 protocol stacks, and the
source node selects different protocol stacks according to the destination node, while the
network device selects different protocol stacks for processing and forwarding according to the
protocol type of the message. The dual-stack nodes use IPv4 protocol stack when
communicating with IPv4 nodes and IPv6 protocol stack when communicating with IPv6 nodes.
SMF assigns an IP address to a PDU session when the user establishes that PDU session. For
terminals that support IPv4v6 dual-stack, UNC supports assigning IPv4v6 dual-stack addresses
to them. Depending on whether the assigned address is a static address obtained from the
Page 36 of 200
UDM or an address dynamically assigned by the SMF, the way the SMF assigns IPv4v6 dual-
The three types of static allocation, dynamic allocation and mixed allocation are as follows.
The user signs up for a static IPv4v6 dual-stack IP address, and the SMF obtains this signing
The SMF assigns IPv4v6 dual-stack IP addresses to subscribers from the locally configured IP
address pool based on the PDU session type carried by the subscriber and the signed or PDU
User signed up for a static User signed up for a static Mixed IPV4V6 dual-stack IP
3.1.1.12.1 Definition
AMF Pool refers to multiple AMFs serving the same wireless area at the same time, and the
AMFs in the Pool are connected to all gNodeBs in the corresponding area. gNodeBs detect the
Page 37 of 200
device status (availability) of AMFs and obtain the load weight of AMFs, and adjust the load
balancing policy of the Pool in time according to the device status and load weight. The load
balancing policy of the pool is adjusted in time according to the device status and load weight.
3.1.1.12.2 Dependencies
AMF
3.1.1.12.3 Principles
AMF Pool As shown in Figure 1, a group of AMFs (AMF1~AMF3) can form an AMF Pool. when
a subscriber moves within an AMF Pool area, it can be continuously served by a specific AMF,
and as long as the subscriber is active within the Pool area, inter-AMF re-registration and
switching within the area will not occur. This results in a significant reduction in Inter AMF
Registration and Handover processes generated when a user is active, thereby reducing
signaling between AMFs and AMFs, and between AMFs and UDMs, and reducing network load.
The MCC, MNC, AMF Region ID and AMF Set ID in GUAMI uniquely identify an AMF Set, so
when deploying an AMF Pool, the same PLMN, AMF Region ID and AMF Set ID should be
configured for all AMFs in the Pool. Therefore, when deploying an AMF Pool, the same PLMN,
AMF Region ID and AMF Set ID should be configured for the AMFs in the Pool.
Page 38 of 200
3.1.1.13 DNN correction
3.1.1.13.1 Definition
During the PDU session establishment, the AMF selects the SMF and the AMF compares the
network slice and DNN requested by the user with the contracted data. If the UE carries a DNN
in the request message, the AMF compares the requested DNN with the contracted data, and if
the DNN requested by the user and the contracted DNN under the selected network slice do not
match, the AMF rejects the user's activation request. If the UE does not carry a DNN in the
request message and there is no default DNN under the selected network slice, the AMF rejects
the user's activation request. Therefore, UNC provides the function of DNN correction to correct
the DNN requested by the user to the DNN locally configured by the AMF that matches the
contracted data, thus reducing the occurrence of PDU session establishment failure.
3.1.1.13.2 Dependencies
UE AMF UDM
√ √ √
3.1.1.13.3 Principles
In 5G networks, UDM stores the latest subscriber signup data, and when a PDU session is
established, AMF and SMF need to perform signup data matching to determine the legitimacy of
access to the network. signup data matching on the AMF side includes AMF matching the
Page 39 of 200
subscriber requested network slice with the signed network slice, and matching the subscriber
requested DNN information with the signed DNN in the selected network slice The AMF side of
the AMF matches the user-requested network slices with the contracted network slices. In
actual network operation, the DNN information carried by the subscriber may not match the
contracted DNN data due to factors such as incorrect subscriber settings, resulting in DNN
matching failure and rejection of the subscriber request, which affects the end customer
experience. To reduce the occurrence of such problems, UNC introduces the DNN correction
feature, which can correct the DNN in the user request information after the contracted DNN
matching failure, so as to improve the success rate of PDU session establishment, reduce the
configuration requirements of the user's cell phone and enhance the end-customer experience.
3.1.1.14.1 Definition
When the UE initiates registration, the AMF determines that if it cannot provide slicing service
for the UE, it queries the NSSF to obtain information about the AMF that can provide slicing
service, and the NSSF returns the slicing configuration information assigned to the UE at the
same time.
3.1.1.14.2 Dependencies
Page 40 of 200
√ √ √ √
Category Parameters
NSSAI
Subscribed S-NSSAI
Configured NSSAI
Allowed NSSAI
Requested NSSAI
3.1.1.14.4 Principles
In the registration process, when the initial AMF cannot provide slicing service for the UE, it is
necessary to use the requested NSSAI and contracted S-NSSAI information to query the NSSF
to obtain an AMF that can provide service for the UE, and the NSSF supports the completion of
the slicing selection function based on the slicing information requested and contracted by the
user.
▪ The AMF locally configures the network element information of the NSSF, including the priority
(priority), weight (capacity), IP, Port, and protocol version of each service provided by the NSSF.
Page 41 of 200
▪ The NSSF needs to pre-configure the list of slices supported by each TAI of the managed
AMF and the slice configuration information supported by the PLMN of this network for slice
selection query, and the NSSF returns the AMF SET or candidate AMF that can provide the
service and the slice configuration information issued to the UE for decision.
▪ When the UE initiates registration, the AMF judges that if slicing service is provided for the UE,
it queries the NSSF to obtain the AMF that can provide slicing service, and the NSSF returns
the slicing configuration information assigned for the UE at the same time.
3.1.2.1.1 Definition
The 5GC network adopts a service-oriented architecture, abstracting the control plane
functions into multiple independent Network Functions (hereinafter referred to as NFs), each of
which supports multiple services (hereinafter referred to as NFSs). AMF supports initiating
registration, de-registration, NF status subscription, and receiving status notifications from NRF.
3.1.2.1.2 Dependencies
AMF NRF
√ √
3.1.2.1.3 Principles
Page 42 of 200
Figure 7 AMF registration process to NRF
registration, carrying the NF/NFS Profile information associated with this AMF (nfInstanceID,
2. The NRF processes the registration request from AMF and performs the corresponding
- NF/NFS can have a corresponding access authorization policy for authorization judgment and
control during NF/NFS discovery. When the NF/NFS adopts access authorization control,
access to NF/NFS within the authorization range is allowed; if access authorization control is not
- The access authorization control policy can be carried during NF registration or NF/NFS
update, and the access authorization control policy can be configured on the NRF.
Page 43 of 200
Figure 8 AMF to NRF de-registration process
register, only need to carry this AMF has generated nfInstanceID, do not need to carry NF/NFS
Profile.
2. The NRF receives the de-registration request and finds the record corresponding to the
nfInstanceID and deletes the AMF and all associated NFS profiles.
In 5GC networks, NRF is responsible for the automated management of all NF/NFS, which
▪ When the used NF/NFS information changes (such as services or capabilities, etc.), it needs
to be updated to the NRF. The NRF update includes a full update and partial updates in both
ways.
The NF full update process is different from the NF registration process. The difference between
the NF full update process and the NF registration process is that NRF first recognizes that
Page 44 of 200
nfInstanceID already exists in NRF, considers it to be a full update of NF, and replaces all the
NRF requesting update information, and the request message carries only the NF/NFS Profile
to be updated and the update operation (add/remove/replace) for these attribute information.
- AMFs that have been registered with the NRF send messages to the NRF periodically through
the NF update process to inform the AMF of its valid status (later called heartbeat). The
heartbeat period can be set by command and returned to the AMF by the NRF upon successful
registration of the AMF. when the NRF detects that the AMF has not sent a heartbeat message
within a number of heartbeat periods (configurable), the NRF sets the AMF status to
SUSPENDED and this AMF and the corresponding NFS are no longer discovered by other NFs.
NF Heartbeat Process
Page 45 of 200
The NRF updates the heartbeat cycle of the registered NF by carrying the new heartbeat cycle
(configured by command) in the heartbeat response message of the NF, the process is the
the request message contains the NF status and the corresponding replacement operation.
subscription to status information of other NF/NFS instances, and the request message carries
AMF, carrying the subscription ID that uniquely identifies this subscription created by the NRF.
Page 46 of 200
3.1.2.2 NF Certification
3.1.2.2.1 Definition
For security reasons, NFs need to obtain authorization when requesting a certain service to
prevent and reduce the risk of elevation of authority. 5GC network adopts Oauth2.0 dynamic
Token authorization for the service-based interface between NFs (Token can be understood as
a short-term token used by NFs to request access to a service, and the required service can be
obtained when and only when the token is in hand), and the authorization method is After the
NF first applies for service discovery, it applies for Access Token to the NRF, and then carries
this Access Token for subsequent corresponding service requests, and the NF service provider
first authenticates the NF service consumer to ensure the integrity and legality of the Access
Token before providing the service. When the Access Token expires or the requested service
3.1.2.2.2 Dependencies
√ √ √ √ √ √ √
3.1.2.2.3 Principles
In the Token authorization mechanism, the NF service consumer is the client, the NF service
provider is the resource server, and the NRF is the NF authorization server, which serves as the
Page 47 of 200
centralized control point for the authority management of Token and provides Access Token
When NF service consumers request a service, they first request an Access Token from the
NRF.
2. NRF generates Access Token based on the nfInstanceId of NF service consumer and NF
service provider's NF/NFS access authorization control, etc. The Access Token contains
service consumer, NF service provider and NRF, NFS name that can be accessed, etc.),
Access Token expiration time and NFS name that can be accessed by NF service consumer,
etc.
Page 48 of 200
3. The NRF returns the generated Access Token to the NF service consumer via the
Nnrf_AccessToken_Response message.
3.1.2.3.1 Definition
UE requests for PDU Session establishment, etc. involve the selection of SMFs. When
operators deploy different network grouping scenarios, they can flexibly select the SMF under
3.1.2.3.2 Dependencies
√ √ √ √ √
3.1.2.3.3 Principles
When establishing a PDU session, the AMF first selects the most suitable SNSSAI and DNN
for the UE based on the SNSSAI and DNN that the UE may carry and the Smf Selection Data
contracted by the UDM, and then sends a Nnrf_Discovery_Request to the NRF based on the
selected SNSSAI and DNN The NRF returns the corresponding SMFs to the AMF through the
Nnrf_Discovery'_Response message, and the AMF selects the best SMF from the returned
Page 49 of 200
3.1.2.4 AMF redirection
3.1.2.4.1 Definition
The initial registered AMF selected by the base station for the UE is changed from the final
registered AMF.
3.1.2.4.2 Dependencies
√ √ √
3.1.2.4.3 Principles
The UE is registered on power on, the base station selects the initial AMF for the UE, the
registration request message carries the Requested NSSAI which is not supported by the AMF,
the initial AMF sends Nnssf_NSSelection_Get request to the NSSF, the NSSF receives the
request and selects the Allowed NSSAI and Configured NSSAI for the UE, and returns an AMF
collection or the NF InstanceID of the AMF. According to the returned AMF collection or NF
InstanceID, there are two types of redirection, i.e., direct redirection between AMFs and
The NSSF returns the NF InstanceID of the target AMF to the initial AMF, and the initial AMF
the NF InstanceID, and the initial AMF forwards the Registration Request message carried by
Page 50 of 200
the UE to the target AMF through the Namf_Communication_N1MessageNotify service. After
forwarding the Registration Request message carried by the UE to the target AMF, the
2. Redirected by AN
The NSSF returns the target AMF set containing AMF RegionID and AMF SetID to the initial
AMF, and the initial AMF forwards the Registration Request message through the N2 Reroute
NAS Message carrying the AMF RegionID and AMF SetID to the RAN node to reroute to the
The initial AMF carries the AMF RegionID and AMF SetID through the N2 Reroute NAS
Message and forwards the Registration Request message to the RAN node for rerouting to the
3.1.2.5.1 Definition
The SBI secure transport layer uses TLS (Transport Layer Security) protocol to provide data
3.1.2.5.2 Dependencies
√ √ √ √ √ √ √
Page 51 of 200
3.1.2.5.3 Principles
The encryption method and key used for SBI interface encryption is negotiated through the TLS
The NF Service consumer acts as the client and the NF Service producer acts as the server.
1. The client sends a ClientHello message to the server, i.e., an encrypted communication
request, and enters the TLS handshake process. The ClientHello message contains the TLS
protocol version supported by the client, the encryption method, the compression method, and
2. The server receives the request and returns a ServerHello message containing confirmation
of the TLS protocol version and encryption method used, a random number generated by the
server, and the server certificate. If the server needs to confirm the identity of the client, it will
also include a client certificate request. If the client does not match the version of the TLS
3. After the client receives the server response, it verifies the server certificate. If the server
certificate is not issued by a trusted authority, or if the certificate has expired, the client rejects
Page 52 of 200
the communication. If the server certificate is validated, the client obtains the server's public key
from the server certificate and generates a random number. The random number is encrypted
by the server's public key to prevent eavesdropping. Thereafter, the client calculates the
"session key" for subsequent communication based on the three random numbers in the above
4. The client sends a random number, an encoding change notification, and a client handshake
end notification to the server. The encoding change notification indicates that all subsequent
messages will be sent encrypted with the mutually agreed encryption method and key. If the
server requests a client certificate, then the client also sends information about the certificate. 5.
After the server receives the response from the client, it calculates the encryption method used
for subsequent communications based on the three random numbers and the consensus
3.1.2.6.1 Definition
IMEI check feature refers to the service that AMF obtains IMEI information of UE during UE
registration process and sends it to 5G-EIR for legality check. After receiving the check result
returned by the 5G-EIR, it decides whether to allow UE access based on the result returned by
the EIR. The IMEI check confirms the legality of the terminal, thus prohibiting illegal terminals
3.1.2.6.2 Dependencies
UE AMF 5G-EIR
Page 53 of 200
√ √ √
3.1.2.6.3 Principles
IMEI (International Mobile Equipment Identity) is used to uniquely identify a user's terminal. IMEI
legality information is stored in the 5G-EIR, which has three lists: white list, grey list and black
list. list).
The AMF obtains IMEI information of the terminal by sending Identity Request or Security Mode
Command message to the terminal and confirms the legitimacy of the terminal to the 5G-EIR
through Check IMEI process. When the 5G-EIR rejects the user's access, the AMF will deny the
3.2 SMF
3.2.1.1 .1 Description
The SMF session management function provides the UE with the ability to access the packet
data network over the 5G network and enjoy the data services provided by the Internet or
enterprise network. Session management includes business processes such as the creation,
A PDU session is the process of communication between a user terminal UE and a data
network DN. a PDU session is established and a data transmission channel from the UE to the
DN is established.
Page 54 of 200
3.2.1.1 .2 service scenarios
Network-side initiated PDU session creation (triggered when the terminal is in paging)
PDU Session ID
DNN
Location information
Slicing information
Page 55 of 200
5G SM Capability
2.SMF checks the UE's request and the UE's contracted data in the UDM
Static IP address/prefix
Establish connection to UPF, provide data monitoring for this PDU session, reporting
5.SMF transmits N2,N1 information back to the base station and terminal via AMF
Page 56 of 200
N1 Includes Accept responses created by PDU sessions Assigned IP information,
etc.
Note: Due to the different terminal behaviour and configuration services, the information
Page 57 of 200
PDU creation process description Refer to 3GPP
Page 58 of 200
Note: The service request initiated by the UE is used to establish a signalling link between the
3.2.1.2.1 Description
In scenarios such as changes in UE capacity and changes in QoS parameters, both the UE and
the network side can initiate PDU session modification requests.
Among the network elements that allow the SMF to initiate PDU session modification requests
are.
UDM SM contracted data generation change triggers SMF to initiate PDU session
modification
PCF policy change triggers SMF to initiate PDU session modification
Related IE:
nGSM-capability UE-capability
qos-rules carrier rules
pdu-session-ID Session ID
modification Command request command
Far Action is popular for
AN TUNNEL
CN TUNNEL
Page 59 of 200
3.2.1.2.2 PDU session change process.
3.2.1.3.1 Description
PDU session release is essentially the release of all resources related to the session.
Page 60 of 200
Key resources released by the session.
Page 61 of 200
Refer to section 3GPP-23502 4.3.4.2 for process description
Page 62 of 200
3.2.1.3.1 Service scenario
When the session status of the UE and AMF do not match, or when the UE's network
UE removes session anchor service scope area (no suitable IUPF exists)
Situations where the SMF local configuration initiates PDU release include.
Configuration changes
Only one of these session types can be selected per PDU in the 5GC
IPV4
IPV6
IPV4V6
Page 63 of 200
Ethernet
Unstructured
The Unstructured type of PDU is generally used in applications where data is delivered to the destination
via the N6 interface via peer-to-peer tunneling technology, which is not supported in the current IPLOOK
SMF version.
Note If n3iwf does not know what access type to use to access the non 3GPP type, it can use
the virtual
The current version of IPLOOK SMF supports the following access types.
NR
EUTRA
Page 64 of 200
VIRTUAL
WLAN
Unlike I-UPF changes in some cases, changes in PDU session anchor points will affect one
of the important user experiences, business continuity. To ensure different business continuity
requirements, 5GC has defined three business continuity modes: SSC Mode 1, SSC Mode 2,
The SSC Mode of a PDU session remains the same for the lifetime of the session
The UE creates a new PDU session for the application when the SSC Mode of the existing
一、SSC Mode 1
For PDU sessions in SSC Mode 1, the IP address provided by the network to the UE
Features.
Provide IP continuity
Application scenario.
Page 65 of 200
Suitable for applications with high business continuity requirements such as IMS voice
二、SSC Mode 2
For a pdu session with SSC mode 2 already established in the network and only one pdu
session anchor, the network may trigger the release of the pdu session and instruct ue to
Features.
No IP continuity available
Disconnect first Release the old session to select another anchor point to rebuild a new
PDU session anchor point can be changed, when changing, you need to delete the old
Application scenario.
Suitable for caching applications that do not require high business continuity and allow for
short interruptions
When the UPF needs to be changed or when the user surface path is not optimal
Note: In ULCL mode, ue does not participate in the reallocation of session anchors for pdu
sessions.
三、SSC Mode 3
For pdu sessions in ssc mode 3, the network allows the ue connection to be established via
a new pdu session anchor to the same data network and then releases the connection between
Features.
Page 66 of 200
For sessions with any access type and IP PDU session type
Connect first, then disconnect PDU session, the anchor point can be changed, when
changing, you can create a new PDU session first, and then delete the old PDU session
Note: (SSC Mode3 IPV6 Multihoming is not supported in the commercial version at this time)
Application scenario.
3.2.1.7 De-activation
De-activation is actually a mechanism to notify the base station to release radio resources
and to notify the UPF to change the downlink to BUFFER state to avoid wasting resources for a
long time. The NOCP flag needs to be set when activation from the data plane is required, while
some can only be activated from the access side without setting the NOCP flag, such as the de-
Application Scenarios
Handover switchover process in which all QoS flows are rejected by the RAN
Page 67 of 200
AMF notifies UEs to move out of permitted operational areas
Related IE
The SMF implements packet handling by setting the appropriate flags in the Apply Action IE
in the FAR.
Set the FORW flag and provide instructions on packet forwarding with the forwarding
parameters provided
Set the BUFF flag to warm up the downlink packet and provide instructions on how to buffer
the packet
Set the NOCP flag to set the SMF to be notified when the first DL packet about buffering
arrives
Restrictions
Not available for permanently online PDU sessions, an always-on PDU session activates
the user plane capital during each transition from idle to connected state, VoNR then uses the
always-on PDU session, in this scenario the SMF cannot deactivate the UP connection for that
PDU.
Page 68 of 200
3.2.1.8 Session activation
Session activation means: restoring a terminal in the IDLE state to the ACTIVE state so that
and ACTIVE:
DETACHED: When the UE is switched on, the UE first enters the DETACHED state, at
which point the UE is not registered to the network, possibly because it is not registered or
IDLE: The state in which the UE is registered to the network but not activated and is in low
power mode is called the IDLE state. The group core domain is already aware of the
location of the UE and if a service is established, the UE is able to switch to ACTIVE mode
in a very short time to continue the previously activated data session. In the IDLE state, the
network side is able to know exactly where the UE is located in terms of TA (Tracking Area)
and when the UE is called, the network is able to paging within the user's latest TA.
ACTIVE: The state in which the UE is in the process of receiving and sending data is called
the ACTIVE state, which is the only active state in which the UE and the network actually
Trigger conditions.
Terminals in IDLE status will initiate a report notification to the SMF when the UPF receives
a downlink packet and the SMF will initiate the activation process
Page 69 of 200
When the terminal moves into the service area, the terminal initiates an activation request
PDUs are also triggered when data comes in from a UE in CM-IDLE state, transforming the
idle UE into a connected state in response to a paging message and activating the user-
plane link
When the UPF in BUFFER state receives a downlink packet, it will initiate a downlink data
notification to the session with the FLOW message set with the NOCP flag, and the SMF will
trigger the activation process after receiving the report information from the UPF. See below for
UE activation
When the terminal enters the service area, it initiates an activation request to the SMF,
which receives the request from the AMF and clears the FAR of the BUFFER state.
A LADN session means that the UE can only access the local data network via a PDU session
connected to the local data network in the service area of the local data network.
Characterisation
The services of LAND are provided by the service PLMN, where the LADN data network area is
a TA set, where whether a DNN corresponds to a LADN service is a property of the DNN.
Page 70 of 200
The LADN service has the following features.
LADN information is provided to the UE by the AMF on the registration process and the UE
LADN service area and LADN DNN configured on the AMF to allow different UEs to access
If a LADN is not available under all TAs in an AMF service area, then this AMF should not
Functional operations.
PDU session creation: If the configuration of the LADN related DNN is configured on the
SMF, the SMF will check the status value of the presenceInLadn sent from the AMF of
the corresponding DNN, and if the status value is not in the area, the session will be
rejected directly.
PDU Session Modification : If the configuration of the LADN related DNN is configured
on the SMF, the SMF will check the status value of the presenceInLadn sent from the
AMF of the corresponding DNN, and if the status value is not in the area, the session
AMF subscribes to LADN notifications: the SMF behavior is determined by the value of
the presenceState field, and the SMF triggers a session release or triggers a PDU
session deletion when not in the ladn area, depending on the local LADN configuration.
Page 71 of 200
Main interfaces.
N11
During the creation of a LADN session, the AMF communicates with the SMF through the
N11 interface with the LADN logo, and the SMF checks and verifies the LADN logo carried by
the AMF.
Restrictions.
Only available in 3GPP access mode and not available for Home Routed roaming
scenarios
Service configuration.
the value of enableLadn to yes and turn off the ladn service by assigning the value of no. where
ladn is the dnn value and ladnType is the behaviour of the UE after it has left the ladn area,
as follows.
is not returned to the zone within the system specified time (15s).
If ladnType is empty or other value: the pdu session will be released directly.
Page 72 of 200
3.2.1.10 Area of interest tracking
Area of Interest (AOI): is a geographical area within the designated 3GPP system.
Area of interest tracking refers to the tracking of end devices that have initiated location area
subscription tracking to the AMF in a geographical area within the 3GPP system designation.
TA List
Cell ID
RAN ID
PRA ID(s)
LADN DNN
SMF subscribes to the "UE Mobility Time Notification" service from AMF
SMF determines how to handle PDU sessions based on the UE's location information
When the area of interest is a LADN the SMF provides the DNN information of the LADN to the
Characterisation
Terminal movements and status in the area are sent down to the SMF via AMF notifications
Page 73 of 200
Main interfaces.
N11 The AMF pushes the status of the terminal in the area to the SMF by subscribing to
notification messages
Associated business.
PDU session creation: sending a subscription to the AMF for the terminal's area of
interest
zone behaviour
PDU session release: release processing of subscription notifications sent by the end
zone behaviour
interest
Restrictions.
Configure/stop up service.
The parameters in the trackingAreaList field are configured to include the area to be tracked,
and the AMF receives the subscribed tracking area based on the terminal's
Page 74 of 200
3.2.1.11 Base station switching services Support
The Handover process is used to switch the UE from a source NG-RAN node to a target
NG-RAN node, using the Xn interface during the switchover. The switchover process can be
In order to ensure that the order of the target NG-RAN packets is not confused, immediately
after the path switch, the UPF sends one or more "end marker" packets to the source NG-RAN
via the old path and the source NG-RAN forwards the packets to the target NG-RAN.
Downstream packets can be sent directly to the UE via the new NG-RAN.
Key IE
UE Security Capability
Page 75 of 200
A description of the process can be found in: 3GPP 23502-4.9.1.2.2
Note: During the switchover process, if the terminal is located in an area outside the service
area of the anchor PSA, an intermediate IUPF is inserted, or if the area activates certain
Access and mobility capabilities in 5G networks, and business continuity capabilities for
UEs during mobility. Mobility management includes business processes such as user state
Page 76 of 200
Characterisation
User terminals are always in a state of constant movement and the core network needs to
handle the terminal's services according to the user's service performance. The network
continuity is ensured by ensuring that the UE is not interrupted while it is on the move.
Features
Xn switching
SMF policy control is done through PCF to control the QoS and billing policies of the UE
based on the subscriber's contract information, etc. It can be divided into PCC policy and billing
policy control.
The SMF dynamic PCC rules are simply obtained through the N7 interface with the
PCF. This rule can either be pre-defined by the PCF or generated dynamically by the PCF.
defined rules or dynamically generated by the PCF. Dynamic PCC rules can be replaced,
modified, deleted
Page 77 of 200
Predefined PCC rules are configured on the SMF, flow filters are provided to the UPF
as flow filter rules and can be configured either on the SMF or on the UPF, but if configured
on the UPF then the relevant application identifier needs to be configured on both the SMF
Note (in addition to the above two rules there is also an ADC application detection and
Rule name
Service marks
Priority
Door status
Qos parameters
Rate Groups
Monitoring Team
Initiatorship
The service data flow template in the rule is used to select the downlink IP CAN bearer.
Page 78 of 200
The service flow filter in the rule is used to enforce that the uplink IP flow is transmitted
Application scenario.
Diversion control
Billing
Billing Strategy
Billing is a costing system set up by the operator to measure the usage of network resources by
the subscriber and to charge the subscriber according to certain tariff policies.
In 2/3/4G networks, billing is divided into online billing and offline billing, and in 5G networks,
Page 79 of 200
convergent online and offline billing, thereby simplifying the network and flexibly supporting
As a service user, the billing session process for the Nchf interface is supported.
Supports PDR, URR rule issuance and billing usage collection for the N4 interface with
the UPF.
Billing process.
Page 80 of 200
Measurement by time
Reported usage
Dosage
Time spent
Time Threshold
Reset time
Call sheets
Billing configuration
Configure the relevant CHF server information in SMF Network Management Interface
Property-->Peer-->N40 Profile
Configure the relevant service information associated with the CHF server on the Service
Profile in SMF Network Manager and select Offline Billing. Add Static PCC Rules to configure
Page 81 of 200
Configuration of billing on PCF.
Configure the appropriate Quate information on the PCF network manager and associate
the configured Quate information with the Charging Data in the corresponding service.
Traffic management offers the possibility of billing and some traffic restrictions for terminals
The traffic monitoring process is performed at the UPF, mainly to determine which session
or which service data flow the packet belongs to. The whole monitoring process is not
performed by the UPF independently, but requires the SMF to guide the UPF, telling the UPF
through the PDR how to detect to whom the packets belong and how to manage the statistics.
The SMF binds the data flows to be managed and monitored to the URR when creating a
PDU session or modifying a PDU session and sends them to the UPF, and activates the UPF
Time measurement
Measurement by volume
Page 82 of 200
When the SMF provides an inactivity check time, the UPF will suspend the time
SMF split control refers to the ability of the SMF to route uplink services for the same PDU
session to two or more PDU session anchor points through policy control signalling, and the
ability to route the downlink tunnel link of these PDU session aiming points towards the UE.
In the edge computing scenario, the PDU session will divert the uplink data traffic to
multiple PSAs (PDU session anchor ) of the UPF, and the N9 tunnel will be established between
the UL CL and each PSA, and the UL CL will forward different traffic to different PSAs according
to the PDR, FAR and other rules issued by the SMF, and then the PSAs will forward to the DN.
Upstream splitting and downstream convergence. Different services can be associated with
different QOS FLOWs, and different QOS FLOWs are going to different PDU session anchor
points, which can flexibly implement various services in 5GC that require complex multi-anchor
support.
The SMF distinguishes traffic going to the remote DN exit from the local DN exit by issuing
multiple PDRs and FARs to the UL CL so that traffic going to the local exit is forwarded by the
UL CL to the local DN exit (i.e. the local PSA, PDU session anchor 2 in the diagram), while
Characteristic features.
Page 83 of 200
The function of the UL CL includes, in addition to diverting upstream traffic, aggregating
The SMF may insert the UL CL as soon as the session is established, or it may insert it
The uplink splitter can be used for IPV4,IPV6, IPV4V6 or Ethernet PDU sessions. The
shunting principle is based on the prefix of the destination IP address or uplink packet as a
BP (Branching Point)
For multi-homed PDU sessions of type IPV6, uplink services are routed to different PDU
session anchors based on the source IP prefix. Requires endpoint support for multi-homing
How to use.
The current IPLOOK -PCF service templates that can be supported are (silent load, Volte
load, time-of-use load, carrier load, user load, usage load, unlimited traffic load, slice load).
The SMF will find a suitable anchor point for the splitting according to the policy rules and
anchor policies as the UE moves into different areas. Diversion policies can be
Network side trigger, add a new diversion policy to the PCF network management
corresponding to the SMF to trigger the diversion, either by adding a new service with
Page 84 of 200
diversion or by adding a diversion to the original service to trigger the diversion policy. (PCF
access required)
The UL CL can usually be applied in scenarios where user traffic needs to be directed to
Restrictions.
Locally configured diversion policies do not support zone changes, i.e. if you move out of
the zone supported by the UPF that acts as the diversion anchor, the diversion policy will be
Configure/stop up service.
Main interfaces.
N9 Communication interface between UPF and UPF for direct data transfer from UPF
The PCF/local needs to be configured with diversion rules that must include the following
items.
Qos Flow .
TraffContDecs .
UPF-related configurations.
Dnai.
N9 tunnel.
If you need to switch the diversion on or off according to the zone plan, you need to
Page 85 of 200
Terminal-related configuration.
In the case of IPV6 multi-homed PDU sessions, support is required at the endpoint
capability level
Key interfaces:
Associated with.
Characteristics.
Related IE:
Node identification
Start-up timestamp
UP function
CP Function
Page 86 of 200
UE IP address pool identifier (can be present when the UP is sent and is used to specify
information about the address pool currently available to the UPF in relation to the
assigned UE IP)
During the process of establishing a PDU session by the user, an N4 session, also
Control Protocol), a protocol used to define a series of UPF actions on PDUs actions
include.
Page 87 of 200
3.2.1.17 Vo5G support
The 5G network architecture is inherited from 4G, which has no core network to support voice
Characterisation
Vo5G is a generic term for 5G voice solutions, which includes VoNR, EPS FB, VoeLTE,
RAT FB. current IPLOOK Vo5G supports deployments in the form of SA Option2 mode as
shown in Figure 2.7-1. current Vo5G can be broadly divided into processing based on NR
support for voice, and processing with NR not supporting voice sinking to EPC+.
Features
VoNR
VoNR means that the voice service terminal resides in the NR network through the
gNB bearer and goes for different voice services according to different network environment
architectures.
For example:
Voice services are carried via gNB and 5GC, signalling services go QOS FLOW
Page 88 of 200
Voice services are carried by gNB and EPC Signalling and services are carried by EPS
bearer
VoLTE
Application conditions.
Terminals
Base stations
VoNR required
Core Network
EPS FB
This approach is used in the initial phase of 5G deployment, i.e. the UE resides on the
NR side and registers in the IMS domain, when a voice service is initiated, will be
The EPS to 5GS switchover occurs when the UE moves to the 5GC network while in the E
CM-CONNECTED state in the EPC. The schematic flow is as follows.
Page 89 of 200
Application conditions.
Page 90 of 200
Terminals
Base stations
Weak 5G signal
The base station supports IMS voice EPS fallback or RAT fall back triggered
request initiation, and can fall back to 4G LTE to provide voice based on
VoLTE
Core Network
EPC and 5GC support N26 interface and network support for 4G/5G
interoperability
VoeLTE
Voelte refers to the voice bearing in ng-eNB, this solution UE is stationed in ng-eNB, to
the poor coverage of the base station The UE will continue to carry voice through VoLTE
RAT FB
Page 91 of 200
This means that the UE resides in the NR test and is registered in the IMS domain,
and when redirected or switched to the ng-eNB, the voice is carried out via Voelte voice.
This scheme is similar to EPS FB, with the difference that RAT FB is done within 5G.
Main interfaces.
S5-C
This interface is used for SGW and PGWC signalling interactions during the 4G/5G
switchover
Application use.
Depending on the current network environment or state, the client can request different bearer
services as follows.
If the current network environment NR supports voice services and the UE resides in the
If the current primary network environment is VoLTE and the 4G network coverage
If the current UE voice is carried on the ng-eNB, and the UE moves to some areas with
poor coverage, the UE will switch to a 4G or 5G network and continue to carry voice via
Volte or VoNR.
If the current eLTE network coverage environment is larger than the coverage of NR,
Associated business.
XN Switching
Page 92 of 200
N2 switch
Restrictions.
None
Configure/stop up service.
Find Interface Property-->Local-->S5 Profile on the IPLOOK Large Network Manager SMF
branch and configure the corresponding service restart PGWC process. The Deactive Flag
The 5GC network adopts a service-oriented architecture, abstracting the control plane
functions into multiple independent Network Functions (NF), such as AMF, SMF, NRF, NSSF,
etc. IPLOOK SMF can achieve diverse network adjustments through the NRF function, allowing
other network element devices to discover or find other network element devices, giving users
the choice of The corresponding available service network elements, including UDM, AMF, UPF,
Page 93 of 200
Registration management between SMF and NRF.
Service Registration
Service Updates
Services to register
Current IPLOOK SMF support for NRF discovery network elements include.
Support SMF to discover AMF
Support SMF to discover UDM
Support SMF to discover UPF
Support for NRF discovery SMF
Service configuration.
When the NRF service needs to be turned on, in order not to affect the NRF service can be
deleted on the SMF unnecessary UDM, AMF, UPF configuration to avoid interference, add Nnrf
Profile configuration, restart the service
Note: NFs can only register with the NRF to which they belong, no cross-PLMN registrations, no
same-tier cross-region registrations
Page 94 of 200
3.2.1.19 CallTrace support
Call Trace is a very important analysis method in the system and can collect a wide range
of trace information including single or multiple network elements, single or multiple handsets.
The traces collected can be analysed using packet capture tools, which can quickly locate the
N4
N7
N10
N11
S5-C
4/5G interoperability
Performance features.
Page 95 of 200
Each network element controls its own Trace function independently (similar to SMF control
Support operations.
All access-side initiated services and activation and de-activation services currently supported
by the SMF
Operating configuration.
Silent load
Volte Special
Time dedicated to
Carrier-specific load
User-specific load
Usage
Slices exclusively
Page 96 of 200
See PCF webmaster manual
Local policy control, without access to the PCF, can be configured according to the SMF
local configuration to limit Qos parameters, billing information, traffic splitting and other services
Characterisation
Each PDU has a user-plane path, which contains at least one UPF and may contain
multiple I-UPFs. for an established PDU session, its user-plane path is not static, UE movement
or policy changes may cause the SMF decision to change the user-plane path, when the
terminal moves to an area that cannot be supported by the current session anchor point, in
order to ensure the service continuity, when a qualified IUPF exists in the absence of other
specific services, the IUPF will be inserted as a transit between signalling and data plane to
This IUPF area covers the current area of the terminal and the PDU session anchor PSA
area
The session anchor PSA service area is not in the current area
Page 97 of 200
After insertion of the IUPF the 5GC Simplex architecture is as follows.
Application Scenarios
When the terminal moves to an area that cannot be supported by the current session
Interfaces involved
N9: User-plane interface between UPF and UPF for passing upstream and downstream
SMF secondary authentication is the process by which the SMF initiates a secondary
authentication to AAA (RADIUS) before establishing a data channel for its end users
initiated:
Contract information
Page 98 of 200
Secondary certification process.
channel and completes the authentication request with AAA through message interaction.
After secondary authentication, SMF will establish a connection to the data network for the
terminal.
Deployment
Configuration.
TRANS_AUTH Other options are not supported in the current version. Not supported in
The SMF resolves the static IP field staticIpAddress issued by the UDM when it
acquires subscription data on the UDM, and uses the acquired IP as the endpoint IP address.
The obtained IP address is used as the endpoint IP address and no new IP address is
dynamically assigned.
Page 99 of 200
When no static IP is configured on the UDM and the UP feature UeIp is not set, the
When there is no static IP configured on the UDM and the UPF feature UeIp is set, the
UPF will respond to the N4 PDU session when it is created by sending the to the IP
The F-TEID shall be assigned by the SMF or the UPF, where the assignment of the F-TEID
The UPF can implement the assignment of F-TEIDs by the UPF by setting the FTUP
function flag on the UP function. the same F-TEID assignment option should be used for all CP
When performing F-TEID assignment on the SMF, the SMF shall take the local F-TEID
IE on the PDR IE and provide the assigned F-TEID value to the UP function.
When performing F-TEID assignment on the UPF, the SMF requests the UP to assign
an F-TEID by setting the F-TEID IE in the PDR IE that needs to request the F-TEID to the
CHOOSE flag when requesting the UPF. when the PDR is successfully created, the UPF
Fteid release
resources
Provides access information for the N3 interface and the TEID range for the associated
FTEID
Provide N9 interface access information with the TEID range of the associated FTEID
Provides access information for the GTP-U interface and the TEID range for the
associated FTEID
following:
1. UE IP address management
PDU session, which includes the TEID and IP address, and is provided by the UPF.
When new CN tunnel information is required, the SMF will request the UPF to allocate
The SMF will notify the UPF to release CN tunnel information when it needs to be
3. Stream detection
SMF controls traffic detection in the UPF function by providing detection information for
QFI
IP PFS
Web examples
Ethemet PFS
With this detection information above the SMF is responsible for guiding the UPF on how to
detect that user data traffic matches the rule parameters provided in the PDR.
Transfer of user plane data forwarding functions from the UPF to the SMF (not supported in
current version)
To ensure that the order of packets from the target base station is not confused, the UPF
sends one or more End Marker packets to the source base station after the base station path
switch, which in turn forwards the packets to the target base station.
The construction of End Marker messages can be done either in the SMF function or in the
UPF function, and support for End Marker in the UP function is optional.
The SMF needs to bring the new downstream F-TEID with SNDEM identification on the
Note: (currently not supported by IPLOOK 5GC, current programmes End Marker
Application scenario.
N2 switch
4G HANDOVER 5G
the N3 terminal, at which point the UPF is in the uplink BUFFER state.
The 5G core network supports access through 3GPP access networks (e.g. gNB, eNB)
and also through Non 3GPP networks. non 3GPP networks access the 5G network through the
N3IWF (Non-3GPP InterWorking Function) and the N3IWF accesses the 5G network through
The N3IWF creates a permanent session identifier on the N2 message band during PDU
session creation, and the SMF checks the legitimacy of the PDU session creation requests
coming from the N3IWF network and creates a permanent PDU session for those requests that
pass the check. For non-3GPP access as per the N3IWF example, the access framework
diagram is as follows.
The user plane data must be activated each time the terminal cuts back from the
then for this terminal there will be two N1 entities at the same time, one
corresponding to 3GPP access and the other to non-3GPP access; if the N3IWF
and the 3GPP access network are also part of the same network (same PLMN),
Operational configuration.
None
Operational restrictions.
None
Predefined PCC rules are pre-configured in the SMF, either locally or on the PCF, if the
PCF is connected then the rule entity is configured on the SMF and the PCF sends down static
rule service names to match the static rules configured on the SMF. If the PCF is not connected,
the SMF can configure static rules on the network management and do not configure the
associated QosFlow. The matched rule will be created or modified via a PFCP session and sent
to the UPF (see Policy Management section for PCC rule details).
Predefined ADC rules are supported. ADC rules are pre-configured on the TDF and the
SMF brings the corresponding APP ID entry on the PDI in the PDR when creating or modifying
a PFCP session, and the UPF matches the corresponding ADC rules based on the APP ID in
the PDI.
Characteristics.
ADC rules are then configured on the UPF (normatively referred to as stored in the TDF)
Configuration.
SMF local predefined PCC rule configuration: SMF network management configuration Add
Service name of the predefined rule issued on the PCF: Qos Action configured on the PCF
Configuring ADC predefined rules on the UPF: Configuring the APP ID on the
The configuration on the UPF is described in the UPF network management manual.
The Framed Routing feature allows the IP network behind the UE to make ranges of IP
addresses or IPv6 prefixes reachable on a single PDU session, for example for enterprise
connectivity.
The UPF may indicate support for the frame routing feature by setting the FRRT flag in the
UP Feature IE. The UPF advertises the relevant IP routes to receive packets destined for these
destination IP addresses or IPV6 prefixes and forwards these packets via PDU sessions.
FrameRouting support in IPLOOK 5GC requires the following configuration of network elements.
Configure relevant forwarding route addresses such as IPV4 and IPV6 prefixes on the UDM
Restrictions.
Framed routing is only available for IP type PDN connections and PDU sessions
Business scenarios
notification. Currently, the SMF only processes changes to the session data upstream and
downstream AMBR and default Qos change information, but not other data changes.
When the AMBR or default Qos changes, the SMF initiates a PFCP session change to the
UPF and notifies the base station and terminal to update the new AMBR or default Qos
When a session information Dnn is deleted, the SMF will directly release all current
Webmaster configuration.
In the absence of QoS rules provided by the SMF via signalling, the UE can map
Reflected QoS and non-reflected QoS can co-exist for the same PDU session
(a) When the 5GC determines that it wants to use reflected QoS, the SMF sends a
message with an RQI signalling indication to the UPF via the N4 interface.
(b) Upon receipt of this indication, the UPF sets the RQI parameter in the N3 packet
When the base station receives an N3 downlink packet and finds that the RQI field is set,
it sets the QFI and RQI parameters (i.e. the QFI and RQI fields in the downlink SDAP
By bringing its ability to reflect Qos when creating a PDU session, the SMF decides
according to its policy (configuration) whether to bind the reflected RQI identity to the
QER of the uplink signalling UPF versus making the QoS-configured RQA identity of
When a PDU session is already in place, the terminal can initiate a PDU session change
to support or cancel the Reflected QOS capability, and the SMF will follow the request
to the UPF and NG-RAN to cancel or support the Reflected QOS capability.
If RQA is already provided to the NG-RAN and the 5GC determines that it no longer
uses reflected QoS for a QoS flow, the SMF has to notify the NG-RAN via N2 port
signalling to remove RQA for this flow.(5GC active trigger not supported)
When the 5GC determines that it no longer uses reflected QoS for a particular SDF, the
SMF is to notify the UPF via the N4 interface that reflected QoS is cancelled; (5GC
PCF network management configuration, see PCF network management instructions for
details
Operational restrictions.
time
Note: For non-3GPP access networks N2 signalling is not required to enable reflective QoS,
the QFI and RQI will be transmitted directly to the UE in the non-3GPP access network.
(subsequent enhancement)
Trigger scenes
The terminal is in the Paging state and the UPF receives the packet from the DN
When the SMF receives a UPF DLDR report request, it sends an N2 message to
Business scenarios
Trigger scenes
The UPF reports the traffic usage to the SMF based on the ticket information and the
Business scenarios
Flow management (e.g. matching different policies to different QosFlow for different
traffic classes)
Traffic statistics
Billing
Trigger scenes
After receiving the GTP-U error indication message, the UPF initiates an ERIR-type
As shown below The SMF receives the ERIR report and initiates a PFCP change
session request to the UPF based on this PDU, leaving the UPF in in the downlink packet cache
state. At the same time, if the base station is still connected, the SMF will release the AN
Trigger scenes
downstream data passes through the UPF for a given period of time after the session has been
successfully created, the UPF will report this event to the SMF
Business scenarios
The SMF creates the PFCP session with the session inactivity duration i.e. when no
downstream data passes through the UPF during the inactivity time, the UPF has to initiate an
inactivity report to the SMF for the SMF to activate this user plane.
Modify the upInactiveTime value in the smfProcess.json file to the time in seconds that
needs to be configured, and restart smfScProcess after the change. (Subsequent versions may
When the upInactiveTime value is configured, the UpInactiveTime field can be seen on
The IPLOOK SMF acts as the network element that controls the management session and
can effectively control whether a user is a legitimate user, whether they can access the network
and whether they can use network specific resources. the access control functions of the
service is processed only if the authentication is passed, otherwise the request is rejected.
Overload control function: rejects new session establishment requests when the system
State control function: filtering and discarding of illegal or abnormal event requests on the
The IPLOOK SMF system supports License authorisation management, providing appropriate
Only single NRF registration and single pass type NF acquisition are supported
Note: No License devices are not supported for services other than minimisation
The N3 interface mainly interacts with the 5G-AN, which is responsible for the transmission of
upstream and downstream user-plane data streams, using the GTPv1 protocol, and the
(5GS)
The N9 interface mainly interacts with the UPF at the opposite end, which is responsible for the
transmission of upstream and downstream user-plane data, using the GTPv1 protocol, and the
The reference standards for the N9 interface characteristics are shown below.
(5GS)
N6 interface mainly interacts with DN, which is responsible for the transmission of upstream and
downstream user-plane data, currently only based on the exchange of IP data, and the interface
The reference standards for the N6 interface characteristics are shown below
(5GS)
The N4 interface mainly interacts with CPs that support PFCP entities such as SGW-C, PGW-C,
TDF-C and SMF, using the PFCP protocol stack, and the interface protocol stack is shown in
Reference Standards
3GPP TS 29.244 Interface between the Control Plane and the User Plane Nodes
The N4u interface mainly interacts with CPs supporting PFCP entities such as SGW-C, PGW-C,
TDF-C and SMF, and is the user-plane interface between them, using the GTPv1 protocol stack,
The reference standards for the N4u interface characteristics are shown below,
3GPP TS 29.281 General Packet Radio System (GPRS) Tunnelling Protocol User Plane
(GTPv1-U)
instruct the UPF to adopt certain processing behavior for the user group data of each PFCP
session context.
The user data grouping process for each PFCP session context is shown in the following
diagram.
When each user data packet is received, the UPF will first look for the PFCP session context
corresponding to the packet, and when it finds it, it will further match the PDR provided by the
CP to the UPF in this session context or the PDR predefined by the UPF activated by the CP,
otherwise it will be discarded. Accordingly, each PDR has a priority, then UPF will match
according to the priority, the matching criterion is the combination of parameters carried by the
PDI in the PDR, the parameters are as follows.
UE IP address
Local F-TEID
Network Instance
SDF filter
Application ID
QFI
Framed Route Information
If neither the PDR nor the predefined PDR can match this user data packet, it will be discarded.
When the highest priority PDR is matched, the UPF will further search for the corresponding
rule it identifies based on the rule ID of FAR, URR or QER it carries, and then perform usage
billing, QoS policy implementation or forwarding behavior control, etc. At this point, the service
processing flow of a user data grouping is completed.
The scenarios applied for user-plane data forwarding between CP and UP are shown in the
following table.
Scenario description Data forwarding For EPC For 5GC
direction applicable to applicable to
1 Forwarding of user-plane packets between the UE UP to CP function PGW UPF to SMF
and the CP function. CP to UP function SMF to UPF
2 Forwarding of packets between the CP function and UP to CP function PGW UPF to SMF
the external PDN (over SGi) / DN (over N6). CP to UP function SMF to UPF
3 Forwarding of packets subject to buffering in the CP UP to CP function SGW UPF to SMF
function. CP to UP function SMF to UPF
4 Forwarding of End Marker Packets constructed by CP to UP function SGW, PGW SMF to UPF
the CP function to a downstream node.
5 Forwarding of user data using Control Plane CIoT UP to CP function - UPF to SMF
5GS Optimisation CP to UP function SMF to UPF
Figure2.3-1 Data forwarding between CP and UP
Service Detection refers to the process by which a PFCP session context allows the UPF to
identify the intended user data grouping through a Service Data Flow Filter or Application
Detection Filter provided by the SMF. The specific service data flow filter or application
detection filter is provided to the UPF by the SMF in the PDI of the PDR rule. currently only IP
data grouping filters are supported, each IP data grouping filter consists of a series of
The upper layer protocol number identified by the IPv4/ IPv6 message header
Service type of IPv4 message header / Class of service of IPv6 message header
For 4/5G converged UPF and SMF, bearer binding is the process of realizing 5G service
data streams associated with 4G IP-CAN bearers, in which the service data streams are
For the uplink user data packets in the EPC system, the UPF will use the uplink service
data flow template provided by the SMF to match these data packets, and discard them
if the match fails. The combination of matching parameters configured by the uplink PDR
Local F-TEID
The SMF provides the UPF with a downstream PDR to match the service data mapped to the
IP-CAN bearer, and a FAR with a forwarding destination of the downstream bearer (S5/S8 or
QoS flow binding in 5GC is to associate a service data flow to a QoS flow, in which the service
For the incoming uplink user data packet, it will go to match the QoS flow corresponding to the
uplink direction, when the parameters carried by the uplink PDR provided by SMF are as follows.
Local F-TEID
Application ID) and the QFI corresponding to the QoS flow, it is discarded.
The downstream user data packet mapped to a QoS flow is matched with a corresponding
downstream PDR, which is associated with a QER carrying a QFI identifying the corresponding
downstream QoS flow and a FAR whose forwarding destination is the downstream GTP-U
3.3.1 .5 Gating
Gating is the process of turning on or off the forwarding of IP packets belonging to service data
streams or inspected application traffic in user-plane functions (PGW-U and TDF-U for EPC,
UPF for 5GC) to pass through in order to reach the destination endpoint.
Gating can be applied to either upstream or downstream, and the specific behavior depends on
QoS control refers to the authorization and enforcement of the maximum QoS that is authorized.
Session level (APN-AMBR, TDF Session uplink and downlink bit rates or uplink and
sessions)
For SMF instructions to UP to perform QoS control, the relevant instructions are as follows.
Create PDRs for associated service streams, applications, 5GC QoS streams, bearers
or sessions
Create QER for QoS implementation of aggregated service streams with the same GBR
QFI
Associating session-level QERs to all PDRs in the context of each PFCP session
QERs for service data streams associated with shared QERs or PDRs for applications
Usage monitoring and control is the process of monitoring the user plane traffic in PGW-U, TDF-
U or UPF to understand the cumulative usage of network resources for each user, with the main
monitoring directions
5GC PDU sessions, but may not include service data streams
EPC TDF sessions, which may not include service data streams
The SMF activates and controls the reporting of UPF usage through the following
instructions
Create a PDR and associate it with the service data stream, application or session to be
monitored
Create an URR and specify the method to be monitored, such as capacity or time
Associates URR to all PDRs in the PFCP session context for usage monitoring in IP-
CAN sessions or TDF sessions, but may not include PDRs for matching service data
streams or applications
Associated URR to PDRs in the context of PFCP sessions for monitoring at the service
The SMF can enforce activated predefined PCC or ADC rules in the UPF via PCRF/PCF by
Determine the service data filter or application ID referenced by the activated predefined
PCC or ADC rule and the corresponding QoS and billing control information,
respectively;
Create the necessary PDRs to identify the service data streams and applications
covered by the predefined PCC or ADC rules if they do not previously exist
Create the necessary QERs to implement QoS at the service data stream or application
level respectively
5GC) and QoS control for forwarding detected service data flows or application
services, create the necessary FARs or redirect or apply flow control (if included in
Create the necessary URRs for each combination of monitoring object, billing object,
billing object and service ID or combination of billing object, sponsor ID and application
Optionally, a common service processing policy for multiple PFCP sessions may be configured
on the UPF, i.e. predefined rules such as PDR/QER/FAR/URR. The SMF may be activated by a
PFCP Session The SMF can activate these traffic processing by including the Activate
Predefined Rules IE in the Create PDR IE in the PFCP Session Establishment Request
predefined FAR/URR/QER ID (where the highest valid bit is set to "1"). policy.
If the SMF activates a service processing policy by containing predefined FAR/URR/QER IDs,
i.e., the eighth bit of the above ID value is set to "1", and subsequent SMFs containing
If the received Create/Update PDR IE contains both the Activate Predefined Rules IE and the
predefined FAR/URR/QER ID (the eighth bit is set to "1"), how the UPF processes the message
depends on the specific implementation. For the above case, the UPF either overrides the
FAR/URR/QER rule associated by the Activate Predefined Rules IE with the FAR/URR/QER
rule identified by the received FAR/URR/QER ID, or it rejects the message and responds with a
If the PDR used for service matching is associated with activated predefined rules, the UPF
shall implement these rules. If the URR rule, the UPF will still generate the corresponding
Usage Report information and report it to the SMF according to the measurement method
For predefined rules that have been activated on the UPF, the SMF can include the Deactivate
Predefined Rules IE in the Update PDR IE of the PFCP Session Modification Request message
to inform the UPF to activate the predefined rules for the relevant PDR.
PDR IE or Update PDR IE containing a predefined FAR/URR/QER ID, the SMF can include the
Remove FAR IE, Remove URR IE and/or Remove QER IE in the PFCP Session Modification
Request message. Remove URR IE and/or Remove QER IE to remove the corresponding
3.3.1 .9 Billing
In the following scenarios, SMF supports billing behavior by activating the measurement and
For EPC,
IP-CAN bearer on PGW, IP-CAN session and/or single or group of service data
streams
For 5GC,
The SMF will control the UPF for dosage measurement and reporting through the following
instructions.
Create PDRs for associated service data streams, applications, bearers or sessions
Associate the URR to the relevant PDR defined in the PFCP session context for use in
IP-CAN bearers, IP-CAN sessions, TDF sessions, service data streams or application
For online billing, the SMF provides a capacity (or time) quota to the URR, if a quota
In EPC, the requested/unsolicited application upload is the process of TDF or PCEF uploading
In 5GC, the requested application upload is the process of SMF to PCF to upload the
For the above scenario, the UPF will detect and report the behavior of the application through
Create URR and instruct Repotrting Trigger IE to monitor the start or stop of business
data
When the application is detected to be in service or out of service, the UPF will initiate a PFCP
Session Report request to the SMF and specify the type of report as Usage Report, and set the
Usage Report Trigger to the corresponding 'Start of Traffic' or 'Stop of Traffic'. ' or 'Stop of
Traffic'.
In the process of initiating a PFCP Session Report request, the UPF also carries the following
When the application is detected to start using the service, it carries the following
information
Stream information, including the direction of the stream, source IP, destination IP
When the application is detected to stop using the service, it carries the following
message
The application instance identifier when the reporting application starts using the
service
When the UPF establishes a PFCP Association with the SMF, the FTUP flag in the UP Function
Features IE is set to "1" to tell the SMF that it supports the assignment of F-TEIDs.
Request message, the SMF can request the UPF to assign the F-TEID, as follows.
Set the CHOOSE flag position of the Local F-TEID IE in the PDR rule to "1"
If multiple PDR requests in the same PFCP session context are assigned the same F-
TEID, the CHOOSE ID flag position of the Local F-TEID IE is set to "1" and carries the
When the F-TEID is successfully assigned by the UPF and this PDR is successfully created, the
requested assigned F-TEID will be present in the PFCP Session Establishment Response or
PFCP Session Modification Response message, which is responded to the SMF by the UPF.
The SEID is used by the same PFCP entity to uniquely identify a PFCP session, and the SEID
provided by the other party is required to interact with PFCP session-related messages between
PFCP entities. the specific interaction process between SMF and UPF is as follows.
The SMF initiates a PFCP Session Establishment Request message, which contains the
SEID value of the SMF side and its IP address in the F-SEID IE
carries its own SEID in this message, similarly, UPF's SEID is also included in F-SEID
IE
For subsequent PFCP session-related messages, the SMF and UPF each interact using
the SEID previously provided by the other and transmit it in the message
When the PFCP session is released, the SMF and UPF will each release the SEID
When the PFCP session context needs to be modified, the SMF will provide the UPF with the
appropriate instructions to request it to create a new IE, modify or remove an existing IE.
When establishing a PFCP session context through UPF, a PFCP association needs to be
established between SMF and UPF first, and for a given SMF and UPF, only one PFCP
association can be established between them. the PFCP association initiator can be either SMF
Each SMF can establish a PFCP association with multiple UPFs, and similarly, a UPF can
establish a PFCP association with multiple SMFs. After this, the SMF or UPF can identify itself
to the peer by a unique Node ID, which can be either an IP address or an FQDN; FQDN is not
For UPF forwarding downlink user data packets to the 5G-AN, the GTP-U Error Indication
Corresponding to steps 2 and 3 of the above diagram, the UPF will take the following steps to
Find the corresponding PFCP session context based on the GTP tunnel information
identified in the GTP-U Error Indication message, i.e., TEID and IP address
Initiate a PFCP Session Report request to the SMF and identify the Report Type as
'Error Indication Report' type and carry the F-TEID that triggered this Error Indication
message
In the context of an established PFCP session, the SMF can provide the User Plane Inactivity
Timer IE in the PFCP Session Establishment Request or PFCP Session Modification Request
message to specify the user-plane inactivity detection period When the UPF detects that no
user-plane data group has arrived within this period, it initiates a PFCP Session Report Request
message to the SMF and identifies the Report Type as 'User Plane Inactivity Report' type. The
UPF will then continue to process any subsequent user-plane packets according to the rules
previously received by this PFCP session context until any new indication is received from the
SMF.
To assign an IPv6 network prefix shorter than the default/64 prefix to a PDN connection or PDU
session, IPv6 prefix authorization can be performed via DHCPv6. In this process, the SMF
performs the assignment or, provided that the UPF supports the UEIP feature, requests the
UPF to perform the assignment of an IPv6 network prefix shorter than the default/64 prefix, with
In the UE IP Address IE, set the IPv6D flag to "1" and specify the length of the prefix to
be delegated in the IPv6 Prefix Delegation Bits field, e.g. if the value is 4, it means that
Alternatively, if the UPF supports the IP6PL feature, it can also be delegated by setting
the IP6PL flag in the UE IP Address IE to "1" and specifying the length of the prefix to
be delegated in the IPv6 Prefix Length field, e.g., a value of 60 means that the /60
prefix will be used. If the value is 60, it means that the /60 prefix is used for delegation.
or IPv6 Prefix Length field above is specified by the SMF. If the allocation is done by
UPF, the value of the above two fields is 0. The specific value is determined by UPF.
Post-routing supports IP networks behind the UE, allowing multiple IP addresses or multiple
IPv6 prefixes to enable data interaction with remote networks through a single PDU session, for
example for enterprise network connections. Post-routing is only used for PDN connections or
The UPF can set the FRRT flag bit in the UP Function Features IE to tell the SMF that it
supports post-routing features. When the SMF confirms that the UPF supports post-routing, it
can instruct the UPF to enable the post-routing feature by following these steps.
The issued PDR rules carry Framed-Route IE, Frame-Routing IE and Framed-IPv6-
Route IE
For upstream user data packets, the source IP address in the IP message needs to be
Route IE.
For downstream user data packets, the destination IP address in the IP message needs
IPv6-Route IE
Uplink classifier and branch point is the ability of the UPF to route uplink service flows from the
same PFCP session (PDU session) to two or more PDU session anchors, while routing
downlink service flows from PDU session anchors to the UE on the GTP tunnel.
The uplink classifier supports IP-type PDU sessions as well as Ethernet-type PDU sessions.
Routing of uplink service flows to different PDU session anchors, such as destination IP
The branch supports IPv6 multi-homing PDU sessions, i.e., a single PDU session supports
multiple IPv6 prefixes. Routing of uplink service flows to different PDU session anchor points is
SMF can insert uplink classifiers or branch points during PDU session creation or
Two or more uplink PDRs are issued at the uplink classifier or branch point to match the
corresponding uplink service flows, and an appropriate FAR is bound to this PDR for
routing these uplink service flows to the appropriate PDU session anchor point.
Two or more downlink PDRs are issued at the uplink classifier or branch point to match
the downlink traffic from the PDU session anchor point, and an appropriate FAR is
bound to this PDR to route the downlink traffic on the tunnel to the UE.
SMF can remove uplink classifiers or branch points during PDU session modification, by
The uplink PDR matching the uplink service flow from the uplink classifier or branch
point is removed at the PDU session anchor point, while the downlink FAR of the
When 4G interoperates with 5G, the switching process between the 5GS system and the EPS
system can use direct or indirect data forwarding to forward downlink data.
Direct data forwarding is performed directly between the source RAN and the target RAN
The indirect data forwarding during 5GS and EPS switching is specified as follows.
For the 5G to 4G switchover, the source NG-RAN node sends one or more End Marker
packets containing a QFI from one of those QoS flows mapped to the same E-RAB,
which are then sent to the UPF via a PDU session tunnel. the UPF removes the QFI
and maps it to the appropriate E-RAB tunnel to the SGW. RAB tunnel.
For 4G to 5G switchover, the source eNB forwards the received End Marker packets in
the EPS bearer tunnel to the SGW, which forwards them to the UPF. the UPF adds a
QFI from the QoS flow mapped to that E-RAB to the End Marker and sends them to
In order to forward data (G-PDUs and End Marker) during the 5GS to EPS switchover, the
SMF should,
A PDR for each E-RAB (supporting data forwarding for at least one QoS flow) and a list
Extension Header Deletion field set to "PDU Session Container" in the Outer Header
Associate a FAR for each PDR to forward data to the corresponding E-RAB's GTP-U
tunnel, i.e., use the Outer Header Creation IE that contains the F-TEID for forwarding to
In order to forward data (G-PDUs and End Marker) during EPS to 5GS switchover, the SMF
should,
Each E-RAB provides a PDR (supports data forwarding of at least one QoS flow)
Create a QER containing a QFI IE associated with each PDR, the value of the QFI IE is
set to the QFI value of a QoS flow mapped to the E-RAB to request the UPF to insert a
Create a FAR for each data forwarding tunnel in the 5GS (i.e., for each PDU session),
where the Outer Header Creation IE contains the F-TEID of the target NG-RAN
Associate each PDR with the corresponding FAR (i.e., forward data from each E-RAB to
To reduce signaling overhead and improve signaling efficiency in establishing PFCP sessions
(for PDU sessions or PDN connections), the CP and UP functions can support activation and
predefined PDR rules configured on the UPF for a PFCP session in a PFCP Session
The predefined PDR may contain all the necessary packet detection information to enable
identification of service data flows or application traffic common to multiple PFCP sessions and
may be associated with a predefined FAR, one or more predefined QERs, and/or one or more
Any PFCP session-specific information, such as service endpoint information, which is not
available as part of a predefined PDR rule and is provided to the UPF before or during the
To activate one or more predefined PDRs, the SMF will provide one or more Activate
Predefined Rule IEs in the Create PDR IE of the PFCP Session Establishment Request
message or in the Create PDR IE or Update PDR IE of the PFCP Session Modification Request
message. The above mentioned Create PDR IE or Update PDR IE will carry the following
information, while the above mentioned Create PDR IE or Update PDR IE will carry the
following information
Service endpoint information is used to match the corresponding service flow, such as
Optionally, a QFI corresponding to the service flow exists to be used for matching, such
processing of the user data groupings matched by the predefined PDR; when present,
Optionally, in addition to any URR specified in the predefined PDR, one or more URRs
Optionally, one or more QERs will be used in addition to any QERs specified in the
When a given PDR is used to activate a predefined PDR, the user data packet is successfully
identified by the given PDR if the incoming user data packet matches the service endpoint
information carried by the given PDR, the possible QFIs, and one of the activated predefined
PDRs.
The SMF can update the PFCP Sessions that have been The use of predefined PDRs that have
been activated in the PFCP session by updating the parameters provided in the PDR.
SMF can deactivate the predefined PDRs that are already active in the PFCP session by
carrying the Deactivate Predefined Rules IE in the PFCP Session Modification Request
message.
In addition, this feature allows the definition of a set of predefined PDRs that can be activated,
updated and deactivated together. This allows SMF to further optimize UPF-oriented signaling.
To activate, update or deactivate a set of predefined PDRs, the SMF shall follow the same
procedures as for activating, updating and deactivating individual predefined PDRs, and the
SMF shall use an Activate Predefined Rules IE associated with a set of predefined PDRs.
When the UPF supports UE IP address/prefix assignment, the SMF will request the UPF to
The PDR contains the Network Instance IE to indicate which IP address pool the
The PDR optionally contains the UE IP address pool identifier from which the UPF
Also, in the PFCP Session Establishment Request or PFCP Session Modification Request
message, the SMF can request the UPF to assign the same UE IP address/prefix by creating
multiple new PDR rules, or in the PFCP Session Modification Request message, the SMF can
request the UPF to assign the same UE IP address/prefix by creating multiple new PDR rules,
PFCP Session Modification Resquest message, the UPF response to the SMF in the PFCP
SMF will carry all the UE IP addresses/prefixes that have been assigned to this PDR.
When removing a PFCP session context, the UPF will release these UE IP address resources
If the UPF supports downlink data transfer status notification with UPF buffering, the UPF shall
set the DDDS feature flag in the UP Function Features IE. If yes, the SMF can request the UPF
to notify the first buffered downlink user data packet and/or the first dropped downlink user data
packet matching the downlink PDR by setting the BUFF flag, BDPN flag and DDPN flag in the
When the first downlink user data packet indicated to be buffered in the service data stream
identified by the downlink PDR is received, the UPF initiates a PFCP Session Report Request
message with a Downlink Data Report IE that contains a PDR matching the downlink user data
packet being buffered. In addition, when the UPF is instructed to buffer downlink user data
packets, if the time set in the DL Buffering Duration IE in the BAR or the number of packets
specified in the DL Buffering Suggested Packet IE is exceeded, the UPF also reports the first
dropped downlink user data packet in each service data stream identified by the PDR. Packets.
If the UPF supports downlink data transmission status notification with UPF buffering, the SMF
can also request the UPF to drop the downlink user data packet directly and send a notification
of this service flow matching the downlink PDR by setting the DROP flag and DDPN flag in the
The UPF sends a PFCP Session Report Request message to report the discarded downlink
user data packets in each service data stream identified by the specified PDR, and this
message will contain the Downlink Data Report IE, which is used to indicate the above PDR.
3.3.1 .23 Cache uplink user data groups for online billing
If the UPF indicates in the UP Function Features IE that the Quota Action (QUOAC) feature is
supported and the FAR specified in the Far ID for Quota Action IE in the URR rule is set to
buffer application traffic at zero quota, the UPF shall buffer the associated uplink user data
packets, provided that the Zero quota has been set in advance or the quota has been
exhausted. In addition, if the UPF has instructed support for the feature UL/DL Buffering Control
(UDBC), the UPF shall buffer the number of user data packets (including uplinks or downlinks)
until a new instruction is received from the SMF new instructions, e.g., when a new quota is
granted.
CallTrace is an important analysis method in the core network system, which can collect Trace
information of multiple network elements and users for daily operation and maintenance and
service troubleshooting. uPF only supports Trace information collection for services on N4
interfaces, which mainly involves signaling issued during the creation, modification, deletion and
3.4 UDM/AUSF
3.5 PCF
3.6 NRF
3.6.1 .1 .1Definition
The 5GC network adopts a service-based architecture that abstracts the control plane functions into
multiple independent Network Functions (hereinafter referred to as NFs), each of which supports multiple
services (hereinafter referred to as NFSs).
The NRF is responsible for the automated management of all NFs/NFSs, including functions such as NF
registration, NF de-registration, NF updates, NF status subscriptions, and NF status notifications.
NF Registration: the first time an NF comes online to provide network services, it needs to
register with the NRF first.
Register
Register
Figure 1 Example of NF registration
NF de-registration: When NF gracefully powers down, you need to de-register.
De-
Figure 2 Example of NF de-registration
NF Update: Changes to a registered NF/NFS Profile, such as the NF updating its capabilities by
way of a software upgrade, extending the NFS, a change in the NF status, a change in the
slicing of the NF service, a change in the scope of the NF accessible authorization, etc., will
initiate the NF update process to the NRF.
Update Update
Register
Register
De-Register
Register/Update
Subscri
Functional enhancement
3.6.1 .1 .4Accessibility
Involved NF
Other NFs on the 5GC Supports NF registration, de-registration, update, and status subscription
control surface processes initiated to the NRF.
NFs can only register with the NRF to which they belong, and are not allowed to register across PLMNs
(Figure 5), or across regions on the same layer (Figure 6).
The 5GC network adopts a service-based architecture, which abstracts the control plane functions into
multiple independent Network Functions (hereinafter referred to as NFs), such as AMF, SMF, NRF, NSSF,
etc., as shown in Figure 7. Each NF supports multiple services (Network Function Service, hereafter
referred to as NFS).NRF provides three NF registration management (Nnrf_NFManagement), NF
discovery service (Nnrf_NFDiscovery), and NF Token authentication service (Nnrf_AccessToken) NFS.
User plane
3.6.1 .1 .7 NF Registration
In the 5GC network, the NRF is responsible for the automated management of all NF/NFS, which
includes NF registration and access authorization control, served by Nnrf_NFManagement.
NF Registration Process
After the NF is instantiated and the NF completes interfacing with the NRF, it initiates a registration
request to the NRF to report its own NF/NFS Profile, and the registration process is shown in Figure 8.
The NF/NFS may have a corresponding access authorization policy for authorization judgment
and control during NF/NFS discovery. When access authorization control is applied to the NF/NFS,
access to NF/NFS within the authorization range is allowed; if access authorization control is not
applied, the NF/NFS can be accessed by any registered NF/NFS.
The access authorization control policy can be carried during NF registration or NF/NFS updates,
and the access authorization control policy can be configured on the NRF.
Allow access only to NFs Carry allowedPlmns ADD ALLOWEDPLMNS Takes the access
within a specific PLMN when registering authorization
intersection.
Allow access only to Carry allowedNfTypes ADD ALLOWEDNFTYPES
specific NF types when registering
Description: If the NFS level does not carry the access authorization attribute information at
the time of registration, it inherits the access authorization control information of the NF level; if both
the NF level and the NFS level carry the access authorization attribute information, the NFS level
access authorization control has higher priority.
NF to register
In the 5GC network, the NRF is responsible for the automated management of all NFs/NFSs, which
includes NF de-registration, served by Nnrf_NFManagement. the NF side triggers de-registration by
configuration, and after de-registration, the NRF removes the NF registration attribute from the NRF.
NF goes through the registration process
NF is unavaliable
NF Update
In the 5GC network, the NRF is responsible for the automated management of all NF/NFS, which
includes NF/NFS updates, served by Nnrf_NFManagement.
When the used NF/NFS information changes (e.g., information changes such as services or
capabilities), it needs to be updated to the NRF.The NRF update contains both full and partial
updates.
NF Full Volume Update Process
The NF full update process is the same as the NF registration process, the difference between
the NF full update process and the NF registration is that the NRF first identifies that the
nfInstanceID is already in the NRF and considers it to be an NF full update, replacing all the
original attributes of the nfInstanceID with information about all the attributes of the NF.
NF Status Subscription
In the 5GC network, the NRF is responsible for the automated management of all NF/NFS, which
includes NF/NFS state subscriptions, served by Nnrf_NFManagement.
When an NF wants to be notified of the status of some specific NF/NFS instance, it can request a
subscription to its status from the NRF. The information carried by the subscription is shown in Table 2.
After a successful subscription, the NRF assigns a "subscriptionId" that uniquely identifies the
subscription to distinguish other subscription information. When the NF does not want to subscribe, it can
also subscribe to the relevant information.
An NF may conditionally subscribe to the NRF for a particular type of change to a particular NF/NFS.
NF status subscription updates are performed only for the length of time that the subscription is valid.
the NF subscription is about to expire. you can update the subscription to refresh the length of time
that the subscription is valid.
1. The NF sends a status subscription update request message to the NRF carrying the
subscriptionId, validityTime the new subscription validity and the replacement operation, and
does not update other attributes.
2. The NRF handles subscription validity refresh.
3. The NRF sends a response to the NF.
Description.
The NF may repeat the subscription to the NRF. If the repeat subscription is the same except
for the "validityTime" field, the NRF updates the "validityTime" field and returns to the NF The
NRF updates the "validityTime" field and returns to the NF only the old subscription information
that updates the validity time of the subscription, otherwise the NRF will use the new
subscription information.
When the NF no longer needs to get state changes for some specific NF/NFS instance, it can
request to the NRF to go subscribe to its state.
Description.
The NRF removes these expired subscription messages when the subscription reaches the NF
subscription validity length.
NF Status Notification
In the 5GC network, the NRF is responsible for the automated management of all NFs/NFSs, which
includes NF/NFS state subscription notifications, served by Nnrf_NFManagement.When an NF
subscribes to the NRF with information about the state change of an NF/NFS instance, after the
successful registration, de-registration, or update process of the relevant NFs in the scope of the
subscription or by the command to modify the NF The notification process is triggered after the Profile
state, and the NRF actively notifies the subscribed NFs.
3.6.1.2 NF certification
3.6.1.2.1 Definition
Security considerations, NFs need to obtain authorization when requesting a certain service to prevent
and reduce the risk of privilege elevation. 5GC network's servitization interface between NFs uses
Oauth2.0 dynamic Token authorization (Token can be understood as a short-term token used by NFs to
request access to a service, and the required service can be obtained when and only when the token is in
hand), and the authorization method is Client Credentials. after the NF first requests a service for service
Operator Prevent and mitigate NF privilege elevation risks and ensure business
is conducted properly.
When an NF first requests a certain service (e.g., PDU session establishment, AMF requesting a
SMF's service to establish a session), it needs to first obtain Token authorization, and after the NRF
provides the Access Token to the NF, the NF performs subsequent NF authentication and
corresponding service services.
Access Token expires or the scope of the service requested by the NF changes or there is a new
service provider NF but no available Access Token, the NF requestor will also request a new Token.
When NF requests to provide a service, it needs to carry the Access Token authorized by NRF
for NF authentication, which in turn supports the subsequent completion of the business service.
3.6.1.2.4 Accessibility
Involved NF
In the Token authorization mechanism, the NF service consumer is the client, the NF service provider is
the resource server, and the NRF is the NF authorization server, which acts as a centralized control point
for the authority management of the Token and provides Access Token to the NF service consumer,
which is served by Nnrf_AccessToken.
Access Token Application Process
When an NF service consumer requests a service, it first requests an Access Token from the NRF.
1. The NF service consumer initiates a Nnrf_AccessToken_Request request to the NRF carrying the
attributes grant_type, nfInstanceId and scope.
2. The NRF generates the Access Token based on the nfInstanceId of the NF service consumer
and the NF service provider's NF/NFS access authorization control, etc. The Access Token contains
the AccessTokenClaims (the InstanceID of the NF service consumer, the NF service provider and
the NRF, the accessible NFS name, etc.), the Access Token expiration time and the NFS name to
which the NF service consumer has access, etc.
3. The NRF returns the generated Access Token to the NF service consumer via the
Nnrf_AccessToken_Response message.
NF Certification Process
TSL authentication at the transport layer needs to be completed first before NF authentication.
After the NF service consumer obtains the Access Token, it carries the Access Token to access the NF
service provider's service. the NF service provider authenticates the NF service consumer and verifies
whether the NF service consumer has permission to access its service based on the Access Token.
NF Certification Process
Offering services
1. The NF service consumer initiates a service request to the NF service provider, carrying the
Access Token.
2. The NF service provider authenticates the NF service consumer and uses the public key to check
whether the signature in the Access Token is correct, so as to determine whether the Access Token
is legitimate and valid. If the check passes, the NF service provider then checks the claims in the
Access Token to determine whether the requesting NF is entitled to access its service.
3. The NF Service Provider returns an NF Service Response response to the NF Service Consumer.
3.6.1.3 NF discovery
3.6.1.3 .1 Definition
NRF supports NF/NFS service discovery function, when NF needs some specific services, request to
NRF to discover available services, NRF filter based on registered NF/NFS, and send available NF/NFS
to NF.NRF supports specific NF selection based on different selection conditions, which helps NF
selection under different networking methods.
There are different application scenarios for different conditions of NF selection, see "Application
Scenarios" in each feature.
Involved NF
See "Involving NF" in each feature.
requester-nf-instance-fqdn The name of the requesting NF. Optional, a public attribute that is
generally carried by service
discovery requests.
NF service discovery carries specific discovery attributes, see the implementation rationale for each
feature, and an example of the process of AMF discovery of SMFs, using PDU session establishment as
an example, is shown in Figure 1.
Party
1. The NF sends the Nnrf_NFDiscovery_Request message to the NRF, which carries information
such as Table 1 and condition-specific attributes (described separately in each characteristic).
2. The NRF matches to the corresponding service provider NF list based on the attributes carried by
the request message, and the service provider NF then performs NF/NFS access authorization
Description.
When multiple condition-specific attributes are carried in the scenario, the final accessible NF list
returned by the NRF is the intersection of the NF lists corresponding to each condition-specific
attribute.
3.6.2.1 .1 Definition
For small operator networks, all NF/NFS are managed by a unified NRF without the need for layering. For
large carrier networks, to facilitate flexible and automated network management, NRFs need to be
deployed in layers, with the highest layer NRF implementing all NF/NFS management within the carrier
In NRF hierarchical networking, when a lower layer NRF first comes online to provide network services, it
needs to register with the higher layer NRF first.
An NRF may only register with the higher level NRF to which it belongs. The principle is the same as the
"NF registration" application restriction.
Concept Introduction
L-NRF: The lowest layer NRF in the hierarchical network, which interacts directly with the NF.
H-NRF: The highest layer NRF in a two-tier network, the middle layer NRF in a three-tier network, and
manages all L-NRF Profiles contained. the H-NRF in a three-tier network registers with the I-NRF.
I-NRF: PLMN NRF, representing the highest layer NRF of the operator, H-NRF and I-NRF in a two-tier
network, and I-NRF, H-NRF and L-NRF in a single-tier network.
hierarchical networking
For medium and large operator networks, which may involve cross-province/region roaming or
international roaming of users, in order to facilitate flexible and automated network management, NRFs
need to be deployed in layers, with the highest layer NRFs implementing all NF/NFS management within
the operator network.
NRF registration occurs in hierarchical networking, which includes NRF two-layer networking and NRF
three-layer networking, and typical networking scenarios are shown in Figure 2 and Figure 3.
NRF Registration
In a two-layer network, when an L-NRF first provides service, it needs to carry its own L-NRF Profile to
register with the attributed H-NRF, and after successful registration, the H-NRF contains all the managed
L-NRF Profiles, which are used to address and determine the L-NRF. in addition, the routing relationship
between the L-NRF and the NF is configured in the H-NRF, which is used to address and determine the
Description.
Each NF registers only to its own domain NRF, and whether the NRF is hierarchical or not has no effect
on NF registration.
NRF Registration Process
Store NF/NFS
information
Description: Register NRF information in another NRF that is used to forward or redirect
service discovery requests to locate to the registered NRF.
3.6.2.2.1 Definition
In NRF hierarchical networking, the lower level NRF supports de-registration to the higher level NRF
when the service is no longer provided by the lower level NRF.
In NRF hierarchical networking, when a lower layer NRF is gracefully powered down, it needs to go to the
upper layer NRF to which it belongs to register.
In NRF hierarchical networking, de-registration is triggered by configuration when the NRF is no longer
providing services, and after de-registration, the upper layer NRF will remove this NRF registration
attribute; the NRF or NF under its jurisdiction is inverted to the alternate NRF for services, otherwise the
NRF or NF under its jurisdiction will also be forced to de-register.
NRF de-registration process
avaliable
3.6.2.3.1 Definition
In NRF hierarchical networking, when a registered low-level NRF changes (e.g., information such as
services or supported attributes changes), it needs to initiate an update to its registered high-level NRF.
In NRF hierarchical networking, if a registered low-level NRF Profile changes, such as if the NRF updates
its capabilities by way of a software upgrade, etc., the low-level NRF initiates an update to its registered
high-level NRF at that time.
Description.
When the NF/NFS Profile governed by the underlying NRF changes, only NF updates are involved and
no NRF update process is triggered.
In an NRF three-layer network, when the L-NRF Profile changes, only the NRF update process is
initiated to its registered H-NRF, and the H-NRF's NRF update process is not triggered.
NRF Full Volume Update
The full update process of the NRF is the same as the NRF registration process, when the
nfInstanceID carried in the request message of the low-level NRF within the registration process is
already registered in the high-level NRF, then this registration process is the full update process of
the low-level NRF, and the high-level NRF uses all the attribute information within this request
message to replace the original attribute information of this nfInstanceID.
Update L-NRF/H-NRF
information
3.6.2.4.1 Definition
Service discovery, subscription/notification, and Token requests across NRFs in NRF hierarchical
networks involve recursive queries through which the NRF to which the requesting NF belongs initiates
requests to higher-level NRFs one by one until it finally gets the required NF/NFS list.
Recursive queries can be used for service discovery, subscription/notification, and Token request
scenarios between NFs that are not registered in the same NRF in NRF hierarchical networks.
Recursive query spans a small span and does not require the higher-level NRF to have the capability to
handle redirection, which is recommended when the NRF in the operator's network does not have the
capability to handle redirection or when a smaller impact on the performance of the higher-level NRF is
desired.
NF service discovery, NF subscription/notification and NF Token request recursive queries across NRF
are similar, and this feature introduces recursive queries as examples of NF service discovery process
recursive queries across NRF, NF subscription/notification process recursive queries across NRF and NF
Token request recursive queries across NRF, respectively.
Recursive queries for NF service discovery process across NRF
The UDM of AMF discovery across NRFs in a two-tier network is introduced as an example, where the
NFs in different regions are registered to the L-NRFs in the corresponding regions. As shown in Figure 1.
Discover request
avaliable UDM
Discover request
Discover request
Figure 1 Recursive query for AMF service discovery UDM across NRFs in a two-tier network within the same PLMN
1. The AMF initiates a UDM discovery request to L-NRF1, carrying SUPI information.
2. L-NRF1 determines that this SUPI is not under the management of this L-NRF1 and initiates a
request to the H-NRF.
3. The H-NRF performs L-NRF addressing based on the SUPI, determines that the number
segment to which the number belongs is managed at L-NRF2, and forwards the discovery request
to L-NRF2.
Subscription request
Subscription
Figure 2 Recursive query for NF1 subscription to NF6 across NRFs in a two-tier network within the same PLMN
Fig. 3 Recursive query of AMF requesting Token before service request from AMF to SMF across NRF in the same PLMN with
three-layer network
3.7 NSSF
3.7.1.1.1 Definition
The 5GC network adopts a service-oriented architecture, abstracting the control plane functions into
multiple independent Network Functions (hereinafter referred to as NFs), and each NF supports multiple
services (hereinafter referred to as NFSs).
The NSSF is responsible for the selection of network slices, realizing flexible selection of network slices
and selecting the set of network slice instances for the UE.
Operators Flexible options for network slicing to quickly deliver the services
customers need
1. If the UE has the Configured NSSAI of this PLMN or the Allowed NSSAI of this access type for
this PLMN stored on the UE, then the UE will carry the Requested NSSAI information in the NAS
registration request message and the AN message The Requested NSSAI contains the S-NSSAI of
the slice that the UE wants to register.
2. The RAN selects the Initial AMF based on GUAMI or Requested NSSAI. if the UE does not
provide Requested NSSAI and GUAMI in the AN message, the RAN shall send the registration
request message from the UE to the default AMF.
3. The Initial AMF queries the UDM to obtain the UE signup information including Subscribed S-
NSSAIs.The Initial AMF determines whether it can provide service to the UE based on the received
Requested NSSAI, Subscribed S-NSSAI and local configuration. If the AMF can serve the UE, the
Initial AMF is still the service AMF of the UE, and then the AMF constructs an Allowed NSSAI based
on the Subscribed S-NSSAI and Requested NSSAI and returns it to the UE by registering the
3.7.1.1.4 Accessibility
Involved in NF
The AMF can only initiate service requests to the NSSF to which it belongs to the PLMN.
The 5GC network adopts a service-oriented architecture, abstracting the control plane functions into
multiple independent Network Functions (hereinafter referred to as NFs), such as AMF, SMF, NRF, NSSF,
etc., as shown in Figure 2. Each NF supports multiple services (Network Function Service, hereinafter
referred to as NFS), and NSSF provides two NFSs, Network Slice Selection (Nnssf_NSSelection) and
Network Slice Availability Management Service (Nssf_NSSAIAvailability).
Control
User Interface
1. AMF sends Requested NSSAI, Subscribed S-NSSAI, and SUPI's PLMN and TAI to NSSF for query.
2. Based on the information received and the local configuration, the NSSF selects the AMF Set or list
of candidate AMFs that can serve the UE, the Allowed NSSAI applicable to this access type, and
possibly the network slice instance that serves the UE, and the NRF used for NF selection within the
instance.
3. Return the selection information obtained in step 2 to the AMF.
System;
3.7.1.2.1 Definition
This service is used by NF service consumers (e.g., AMFs) to update the AMF-supported S-NSSAI on the
NSSF, subscribing and unsubscribing to notifications of changes in NSSAI availability information under
each TA.
Operators It can reduce the manpower to configure the slicing of NSSF and
AMF.
Slicing availability status update: AAMF updates the S-NSSAI(s) supported on each TA of the
NSSF.
Slicing status subscription/notification:The AMF subscribes on a per-TA basis to any
changes in NSSAI availability information, including s -NSSAI availability information per TA
(unrestricted) and restricted s -NSSAI(s) per TA in the service PLMN of the terminal. When this
information changes the NSSF notifies the corresponding AMF.
3.7.1.2.4 Accessibility
Involved in NF
NSSF No special requirement Authentication of slices to the AMF requesting the service
and updating the slice availability information of the AMF.
Send notifications when the slice availability status of a TA
to which AMF is subscribed changes.
and update
1. The AMF requests the Slice Availability Update service from the NSSF to replace or
create NSSAIvailability information. The request carries the NssaiAvailabilityInfo,
which contains one or more supported snssai information to be replaced.
2. The NSSF checks whether the NSSAI carried in this request is supported and
updates the NSSAI availability information.
3. The NSSF returns the updated NSSAIvailability information, i.e. the response
returns the AuthorizedNssaiAvailabilityInfo to the AMF.
generate a subscription ID
Process
通知流程
1. When the availability information of the slice under the corresponding TA of the subscribed
AMF/AMF set changes, the NSSF sends a notification to the AMF, which is notified to the AMF via
operations
Accessing to the OMC maintenance center for centralized management by the OMC.
Remote operation and maintenance, accessing to the internal network through the dial-
IPLOOK uses open-source database Redis in core network system, it is a memory-based Key-
Value database, has great performance, and deployed as an active/standby redundancy mode.
All stateful contexts of core network system are stored in this database. Other service
processes are stateless such as interface message process, mobility management process,
But for user plane, the session control process is deployed as active/standby mode to ensure
ZERO interruption of the data flow during the service swapping procedure, for the backup
And for O&M plane, the redundancy enforcements are deployed from the bottom at the Linux
kernel, watchdog is here to check the active OM process status, this process is in charge of the
At NE level, IPLOOK provides pooling redundancy solution for different scenario requirement.
3GPP standard pooling system like MME pool, AMF pool, PGW/UPF DNS priorities set is for
disaster redundancy.
synchronizing user data (context, state etc) in real-time, and they could be managed by a single
unified O&M, so when the active node fails, the standby could immediately handle current
6 Dimension
6.1 Performance
Figure 8 Performance
One MME instance could support around 2000 attach/s at most, we can adjust the process
deployment model according to the business needs and meet different concurrency
Table 5 Dimension
User/Site,
Throughput Intervals
1-
User/Site means maximum user number and eNB or gNB number to serve in specified
hardware resource.
AMF/MME/SMF means they have same dimension methodologies, share same hardware resource
requirements.
DN Data Network
CP Control Plane
5GS 5G System
6 TS 23.503 Policy and Charging Control Framework for the 5G System 3GPP
8 TS 29.244 Interface between the Control Plane and the User Plane Nodes;Stage 3 3GPP
9 TS 29.281 General Packet Radio System (GPRS) Tunneling Protocol User Plane 3GPP
(GTPv1-U) v15.3.0
layer
signaling transport
UTRAN):X2application protocol(X2AP)