5 G

Download as pdf or txt
Download as pdf or txt
You are on page 1of 122

Which frequency ranges are predominantly considered for 5G technology?

2 GHz - 3 GHz

800 MHz - 1 GHz

24.25 GHz - 52.6 GHz

5 GHz - 10 GHz

Op- c

What is the primary advantage of lower frequency bands in 5G?

Lower cost

Higher capacity

Better coverage

Greater speed

Op-c
What trade-off is associated with higher frequency bands in 5G?

Lower cost and higher speed

Better coverage and higher capacity

Reduced speed but better reliability

Reduced coverage but higher capacity

Op-d

What term is used to describe the band with higher bandwidth in 5G?

FR2 band

Legacy band

Lower frequency

Sub-6GHz

Op-1
Why is selecting 5G spectrum crucial for telecommunications companies (Telcos)?

It determines the number of cell towers needed.

It directly impacts smartphone prices.

It requires significant investment and affects coverage and capacity.

It influences the number of subscribers a Telco can acquire.

Op-c

In 5G, how long does a frame typically last?

15 milliseconds

10 milliseconds

1 millisecond

5 milliseconds

Op-b
What is numerology in the context of 5G?

Different frequency ranges and domains within frames

The process of allocating time slots in a frame

A framework for assigning numbers to data packets

The study of numerical sequences in data transmission

Op-a

How does 5G differ from 4G in terms of slot size flexibility?

5G and 4G slots have identical flexibility in size

5G allows adjustment of slot sizes in terms of time or frequency

5G slots are fixed at 1 millisecond, unlike 4G slots

4G slots have greater frequency variability than 5G slots

Op-b

What is the typical frequency allocation for sub-carriers in 4G networks?

10 kHz

15 kHz

30 kHz

20 kHz

Op-b
What does the term 'numerology 5 and 6' signify in 5G?

Specific frequency bands for satellite communication

Sub-carrier spacings ranging from 15 to 40 kHz

Transmission codes for specific data types

Slot durations within a frame

Op-b

What is the composition of symbols in a single slot in the discussed system?

14 symbols

12 symbols

16 symbols

10 symbols

Op-a
In the context of subcarriers, why are larger frequency subcarriers essential?

They increase slot size

They reduce latency

They lower network congestion

They improve signal strength

Op-b

How many subcarrier numerologies are mentioned in the discussed system?

Op-c
What comprises a resource block in the system under discussion?

8 subcarriers

10 subcarriers

12 subcarriers

15 subcarriers

Op-c

Which channels aid in initial network access by synchronizing time, frequency, and conveying
essential network details?

PSS and DM symbols

SSS, PSS and PBCH

PBCH and DM symbols

Synchronization Signal Blocks (SSB) and PSS

Op-b
What does the AMF mainly handle in 5G networks?

Access and mobility management

Authentication and authorization

Policy management

Session management

Op-a

Which two functions does the AMF collaborate with to support the security anchor functionality?

AUSF and UDM

SMF and SMSF

PCF and NEF

PCF and SMF

Op-a

What message does the AMF relay between the SMF and UE?
Session management-related signaling messages

Policy messages

Location messages

Authentication messages

Op-a

Which entity does the AMF communicate with to relay UE policy messages?

PCF

AUSF

UDM

SMF

Op-a

Op-b

Op-b
Which function assists the AMF in handling mobility management between different radio cells?

NEF

SMF

NG-RAN

UDM

Op-c

The AMF works with the UDM and AUSF to perform what security-related function?

Session management

Policy enforcement

Authentication and authorization of UEs

Mobility management

Op-c
The AMF relays all policy messages between which two entities?

UE and NG-RAN

UE and AUSF

UE and PCF

UE and SMF

Op-c

Which of the following functions is directly responsible for registering and authenticating UEs?

AMF

NEF

SMSF

NG-RAN

Op-a
The AMF works with which function to handle location services?

GMLC

UDM

AUSF

PCF

Op-a

What is the role of Namf_Communication in the AMF?

Managing mobility events

Sending encrypted signals

Facilitating communication with other network functions

Handling session management

Op-c
What kind of message does the AMF manage to provide location services?

Namf_Location

Namf_MT

Namf_Event Exposure

Namf_Communication

Op-a

Which function supports the AMF in exposing events to other network functions?

Namf_Communication

Namf_Location

Namf_Event Exposure

Namf_MT

Op-c
Which function does the AMF use for managing Mobile Terminated (MT) messages?

Namf_Location

Namf_Exposure

Namf_MT

Namf_Communication

Op-c

How does the SMF communicate with the UE?

Through the PCF

Indirectly through the AMF

Directly

Using the NEF

Op-b
What does the SMF manage regarding user sessions?

Charging functionalities

Establishment, modification, and release of sessions

Policy control

Event exposure

Op-b

The SMF retrieves policies from which function to configure the UPF for PDU sessions?

PCF

AF

SMF

NEF

Op-a

Which component is responsible for setting up connectivity for UEs towards Data Networks?

NEF

SMF

AMF

PCF

Op-b
What is the purpose of Nsmf_PDUSession?

Registering UEs

Handling PDU sessions

Providing charging functionalities

Relaying event messages

Op-b

What function does the SMF rely on for indirect communication with the UE?

UPF

AF

AMF

PCF

Op-c
Which function allocates IP addresses for the IP PDU session?

SMF

AMF

PCF

AF

Op-a

what functionality does the SMF manage for user sessions?

Policy enforcement

Establishment, modification, and release of sessions

Authentication of UEs

Charging and billing

Op-b
The SMF controls which aspect in the UPF?

Data encryption

Authentication

Charging functionality

Policy enforcement

Op-c

Which function is responsible for retrieving policies used by the SMF to configure the UPF for PDU
sessions?

NEF

PCF

AF

AMF

Op-b
Which of the following is a primary responsibility of the UPF?

Security Authentication

Application Management

Packet routing and forwarding

Network Slice Selection

Op-c

UPF handles mobility between which types of networks?

Wi-Fi Networks

Non-3GPP Networks

2G and 3G Networks

Inter-Intra NG RAN Mobility

Op-d
In the context of UPF, what does "Data network Ingress/Egress" refer to?

Ensuring secure data transmission

Managing data flow into and out of the data network

Enforcing data encryption

Authorizing user access

Op-b

Which function does UPF perform related to Quality of Service (QoS)?

Data Encryption

Application filtering

Traffic monitoring only

QoS and Policy enforcement

Op-d

What is the role of data buffering in UPF?

To filter network traffic

To manage session continuity

To temporarily store data packets

To prioritize QoS policies

Op-c
UPF is responsible for:

Application-level analytics

Network authentication

Data encryption only

Packet routing and forwarding

Op-d

Which function supports user mobility management in UPF?

Inter-Intra NG RAN Mobility

Network Slice Management

Data Buffing

Policy enforcement

Op-a
Which of the following is NOT a function of UPF?

User authentication

Data buffering

QoS and policy enforcement

Packet routing

Op-a

Which protocol helps UPF in routing data packets efficiently?

DNS

HTTP

GTP (GPRS Tunneling Protocol)

SNMP

Op-c
What aspect of UPF is essential for supporting low latency services?

Access Management

Session Continuity

Efficient Packet Routing

Data Encryption

Op-c

In the 5G Core, the User Data Repository (UDR) is primarily responsible for storing

Subscription and policy data

PDU session information

Network slice configuration

Quality of Service (QoS) policies

Op-a
In the context of 5G Core, the UDR is used to store data related to:

User profiles, policy data, and application data

Traffic routing and forwarding information

Network slice templates

Radio access configurations

Op-a

Which function in the 5G Core architecture provides secure access to data stored in the UDR?

UDM

NEF

PCF

SMF

Op-a

Which component provides authentication credentials to authenticate User Equipment (UE) in 5G


Core?

PCF

SMF

UDM

NEF

Op-c
UDM generates credentials used by which function to authenticate UEs?

GMLC

AUSF (Authentication Server Function)

AMF

NEF

Op-b

In the 5G Core, UDM is responsible for managing the privacy of which identities?

IMSI and TMSI

MSISDN and ISDN

SUCI (Subscription Concealed Identifier) and SUPI (Subscription Permanent Identifier)

GUTI and GUTI-A

Op-c

Which of the following interfaces is used by UDM to expose subscription and policy information to
third-party functions in 5G Core?

Nnef

Nudm_EventExposure

Nudm_SDM
Nudm_UECM

Op-b

Which of the following functions does UDM keep track of to monitor the PDU sessions serving a
specific UE?

AMF and SMF

PCF and NSSF

AUSF and GMLC

NEF and NRF

Op-a

What is the primary role of the NRF in a 5G network?

Exposing network capabilities to third-party applications

Managing radio resources for mobile devices

Storing user profiles and subscription data

Centralizing and automating the discovery of network functions (NFs)

Op-d
Which NRF service is responsible for discovering candidate NF instances with specific NF services or
target NF types?

Nrf_NFManagement

Nnrf_AccessToken

Nrf_Discovery

Nnrf_EventExposure

Op-c

The NEF is primarily responsible for:

Managing NF performance monitoring

Exposing network capabilities to external applications

Storing user location data

Network Function registration and discovery

Op-b

The Nnrf_AccessToken service provides OAuth2 access tokens primarily for:

Registering new network functions in the NRF

Granting third-party applications access to network resources

Enabling NF-to-NF authorization

Authenticating NF to NRF communications

Op-d
The Nnrf_AccessToken service provides OAuth2 access tokens primarily for:

Enabling NF-to-NF authorization

Authenticating NF to NRF communications

Registering new network functions in the NRF

Granting third-party applications access to network resources

Op-a

What does the NRF help automate for NF/NF services?

Authorization procedures

Profile creation

Configuration required for NF discovery and selection

Traffic routing

Op-c

Which service operation in NRF allows NFs to register, update, or deregister their NF profile?

Nrf_Discovery
Nrf_NFManagement

Nnrf_EventExposure

Nnrf_AccessToken

Op-b

The NEF provides exposure of network services to external applications through:

NF profile updates

Network Function registration

REST APIs

HTTP protocols

Op-c

Which of the following best describes the purpose of OAuth2 in the NRF architecture?

It maintains user session details.

It registers network function instances.

It provides secure access tokens for NF-to-NF authorization.

It manages network resources.

Op-c
The NRF in 5G primarily supports which function in NF management?

Service discovery and access control

Mobile edge computing support

Service discovery and access control

Event notification to NFs

Op-a or c

What is one of the main purposes of the NEF in a 5G network?

Ensuring data privacy for users

Allowing third-party applications to access network capabilities

Enforcing network access policies

Managing spectrum allocation

Op-b
Which function does PCF provide for service data flows?

Data Security

Authorized QoS and charging control

Data Filtering

Data Encryption

Op-b
Which of the following is NOT a responsibility of the PCF?

Policy control for session management

Management of service area restrictions

Security authentication for UEs

Charging control for service data flows

Op-c

Which function is responsible for providing event exposure to PCF?

AF

SMF

NEF

AMF

Op-c
PCF also assists in managing the selection of which of the following?

Network Slice

User Equipment

Device IDs

IP Addresses

Op-a

PCF supports the management of service area restrictions through which entity?

AMF

NEF

AF

SMF

Op-a

What is the role of the Npcf_UPolicyControl interface in PCF?

Charging Enforcement

Data Security

Policy control related to user plane traffic

Event management

Op-c
What does the interface Npcf_SMPPolicyControl handle?

Session Management Policy control

QoS policy enforcement

Access control for mobility

Charging control

Op-a

Which protocol interface is used for event exposure in PCF?

Npcf_EventExposure

Npcf_AMPolicyControl

Npcf_UPolicyControl

Npcf_PolicyAuthorization

Op-a
Which interface handles Policy Authorization requests in the PCF architecture?

Npcf_PolicyAuthorization

Npcf_EventExposure

Npcf_AMPolicyControl

Npcf_SessionManagement

Op-a

Which interface handles Policy Authorization requests in the PCF architecture?

Npcf_SessionManagement

Npcf_AMPolicyControl

Npcf_PolicyAuthorization

Npcf_EventExposure

Op-c
What function does PCF perform regarding access and mobility management?

QoS adjustment

Data path selection

Handover management

Management of service area restrictions

Op-d

What is SUPI in 5G?

Subscriber Permanent Identification Number

Service User Personal Identity

Subscription Permanent Identifier

Subscription Concealed Identifier

Op-c

During the authentication procedure in the 5G core network, which identifier is encrypted using the
home network's public key to protect the UE's identity?

MSISDN

SUPI

GUTI

RNTI

Op-b
Within the 5G core network's authentication framework, which identifier is used in the AKA
(Authentication and Key Agreement) procedure to establish secure communication?

SUPI

GUTI

UE_RADIO_CAPABILITY_ID

S-TMSI

Op-a

In the 5G NR protocol stack, which identifier is leveraged by the AMF to determine the appropriate
Security Anchors and derive encryption keys?

PLMN_SNPN

UE_RADIO_CAPABILITY_ID

MSISDN

SUPI/SUCI

Op-d

In 5G, what is the primary role of SUPI during identity exchange?

To uniquely identify the device

To temporarily identify the user during radio communication

To encrypt the user's phone number

To serve as the user's permanent identifier for subscription

Op-d
In the 5G NR protocol stack, where is the SUPI typically utilized for secure authentication
procedures?

Physical Layer

NAS (Non-Access Stratum) Layer

RRC (Radio Resource Control) Layer

MAC Layer

Op-b

Which of the following is used to provide privacy by encrypting SUPI before transmission?

GUTI

IMEI

MSISDN

SUCI

RNTI

IMEISV

PLMN_SNPN

Op-d
During the registration process in the 5G core network, which identifier is primarily used to
authenticate the UE to the AMF?

RNTI

GUTI

IMEI

IMEISV

PLMN_SNPN

SUCI

MSISDN

Op-f

In the context of the 5G NR protocol stack, during the NAS signaling procedures, which identifier
ensures that the UE's subscription information remains confidential?

SUCI

RNTI

PLMN_SNPN

IMEI

GUTI

MSISDN

IMEISV
Op-a

During the registration update procedure in the 5G core network, which identifier ensures that the
UE's new location is accurately reflected without exposing its SUPI?

IMEISV

GUTI

RNTI

IMEI

SUCI

PLMN_SNPN

MSISDN

Op-e

In the 5G NR protocol stack, which identifier is essential for ensuring that NAS messages are correctly
decrypted and processed by the intended AMF?

SUCI

IMEISV

MSISDN

GUTI

IMEI

PLMN_SNPN

RNTI
Op-a

In the 5G NR protocol stack, which identifier is essential for ensuring that NAS messages are correctly
decrypted and processed by the intended AMF?

MSISDN

RNTI

IMEISV

PLMN_SNPN

GUTI

IMEI

SUCI

Op-g

Which identifier is used by the network to anonymize the user's identity temporarily?
RNTI

SUCI

IMEI

PLMN_SNPN

GUTI

MSISDN

IMEISV

Op-e

Which identifier is utilized by the 5G network to maintain the association between the UE and its
active sessions across different AMFs?

GUTI

SUCI

IMEI

IMEISV

MSISDN

PLMN_SNPN

RNTI

Op-a
In 5G, which identifier is essential for linking the UE's subscription information with its current
session in the network?

GUTI

MSISDN

IMEISV

IMEI

PLMN_SNPN

RNTI

SUCI

Op-a

In the 5G core network, which identifier is critical for the SMF to associate a data session with the
correct UE after successful registration?

MSISDN

PLMN_SNPN

IMEI

IMEISV

RNTI

GUTI
SUCI

Op-e

In the 5G NR protocol stack, which identifier is utilized during the PDU session establishment to link
the UE's subscription with its data flows?

SUCI

IMEISV

RNTI

PLMN_SNPN

IMEI

GUTI

MSISDN

Op-f

In the 5G core network's mobility management, which identifier ensures that the UE can seamlessly
switch between different AMFs without revealing its permanent identity?

PLMN_SNPN

SUCI

MSISDN

IMEI

RNTI
GUTI

IMEISV

Op-f

In the context of the 5G core network's session management, which identifier is utilized to maintain
state information across different network functions?

SUCI

IMEISV

GUTI

RNTI

PLMN_SNPN

IMEI

MSISDN

Op -c

In the 5G core network, which identifier is critical for the UPF (User Plane Function) to route user
data packets to the correct UE?

PLMN_SNPN

MSISDN

IMEISV

SUCI
GUTI

IMEI

RNTI

Op-e

During the establishment of a PDU session in the 5G core network, which identifier ensures that the
session is associated with the correct UE's subscription and context?

IMEISV

SUCI

PLMN_SNPN

MSISDN

GUTI

IMEI

RNTI

Op-e

In the 5G core network's mobility management procedures, which identifier is crucial for maintaining
session continuity when a UE moves between different geographical areas served by distinct AMFs?

MSISDN

GUTI

IMEI

RNTI
SUCI

PLMN_SNPN

IMEISV

Op-b

During the context transfer in the 5G NR protocol stack, which identifier ensures that the UE's
session context is accurately migrated to the target gNB without revealing sensitive subscription
information?

PLMN_SNPN

GUTI

RNTI

SUCI

IMEISV

IMEI

MSISDN

Op-b

When a UE undergoes a handover between gNBs, which identifier is maintained to ensure session
continuity within the 5G core network?

MSISDN

RNTI

GUTI
IMEISV

SUCI

IMEI

PLMN_SNPN

Op-c

What does the PEI in 5G typically represent?

SUCI

GUTI

IMEI

MSISDN

RNTI

PLMN_SNPN

IMEI

Op-c
Which identifier is used to determine the user's phone number in 5G?

PLMN_SNPN

RNTI

MSISDN

IMEI

GUTI

SUCI

IMEI

Op-c

Which identifier is used as a temporary identifier for radio communication sessions

SUCI
IMEI

RNTI

IMEI

MSISDN

GUTI

PLMN_SNPN

Op-c

Which identifier represents the network type as either public or private in 5G?

GUTI

SUCI

IMEI

RNTI

MSISDN

PLMN_SNPN

IMEI

Op-f
Which identifier is used to manage and optimize radio resources based on UE capabilities?

UE_RADIO_CAPABILITY_ID

IMEI

GUTI

IMEI

SUCI

RNTI

MSISDN

Op-a

Which of the following best describes the relationship between GUTI and S-TMSI in 5G networks? S-
TMSI is used for paging and handover.

GUTI is used for device identification, while S-TMSI is for user identity

GUTI is a broader identifier that can encompass S-TMSI as a temporary identifier

S-TMSI replaces GUTI in 5G networks

GUTI and S-TMSI are interchangeable terms in 5G

Op-b
What does the term PDU Session represent in 5G networks?

A connection between a UE and a data network (DN) for transferring user data

A session that manages user equipment mobility

The control signaling between UE and AMF

The encryption mechanism used for user data

Op-a

Which of the following types of PDUs is supported in 5G networks?

IPv4, IPv6, Ethernet, and Unstructured PDU

Only Ethernet

Only IPv4 and IPv6

TCP and UDP

Op-a

Which network function is responsible for managing the PDU Session in 5G?

UPF

AMF

gNB
SMF

Op-d

What is the function of the SMF in relation to the PDU Session?

It encrypts user data for security

It manages handover between radio access networks

It monitors user mobility between cells

It handles the establishment, modification, and termination of PDU sessions and allocates IP
addresses to UEs

Op-d

In a 5G network, which protocol is used between the UE and UPF for data transfer during a PDU
session?

HTTP

TCP

DNS

GTP-U (GPRS Tunneling Protocol - User plane)

Op-d

What does the term DNN (Data Network Name) specify in the context of a PDU session?

The radio access technology used

The network slice or specific data network to which the PDU session is connected
The encryption method for user data

The priority of control plane signaling

Op-b

Which of the following is true regarding the Ethernet PDU Session in 5G?

It is only used for voice services

It is limited to non-GBR traffic only

It allows the UE to connect to a data network using an Ethernet interface, often for enterprise or
industrial IoT use cases

It only supports IPv6 addresses

Op-c

How are multiple QoS flows handled within a single PDU session?

Only one QoS flow is allowed per PDU session

QoS flows are handled by the AMF

All QoS flows must have the same priority level

A single PDU session can carry multiple QoS flows, each identified by a unique QFI (QoS Flow
Identifier)

Op-d

What is the primary difference between IPv4/IPv6 PDU Session and Ethernet PDU Session in 5G?

IPv4/IPv6 PDU session is only used for IoT devices

Ethernet PDU session enables Layer 2 connectivity, whereas IPv4/IPv6 PDU session provides Layer 3
IP connectivity
Ethernet PDU session is used for voice services only

IPv4/IPv6 PDU session cannot handle QoS flows

Op-b

Which PDU session type would be most suitable for industrial IoT (IIoT) use cases requiring Layer 2
connectivity?

Ethernet PDU session

IPv6 PDU session

IPv4 PDU session

Unstructured PDU session

Op-a

Which of the following is a type of QoS flow in 5G?

Guaranteed Bit Rate (GBR) and Non-Guaranteed Bit Rate (Non-GBR)

Reliable Broadcast Flow

High Throughput Flow

Best Effort QoS

Op-a

What is the main characteristic of a GBR (Guaranteed Bit Rate) QoS flow?
It is only used for control plane signaling

It guarantees a minimum bit rate for the traffic flow

It does not guarantee any bandwidth

It provides the best-effort data rate

Op-b

Which type of QoS flow is typically used for real-time applications like video calling or online gaming?

GBR

Delay-insensitive QoS

Non-GBR

Reflective QoS

Op-a

What is the role of Reflective QoS in 5G?

It allows the UE to apply the QoS rules of the downlink flow to the corresponding uplink flow
automatically

It only applies to delay-sensitive traffic

It is responsible for encryption of user data

It is used to ensure a minimum bit rate

Op-a
In 5G QoS, Delay Critical GBR flows are used for which type of traffic?

High-bandwidth data downloads

Voice over IP (VoIP) traffic

Non-critical background traffic

Ultra-low latency applications, such as industrial automation

Op-d

What does AMBR (Aggregate Maximum Bit Rate) control in 5G QoS?

The minimum bit rate for each QoS flow

The bandwidth allocation for control plane messages

The maximum bit rate allowed for all Non-GBR flows for a specific UE or session

The overall latency of QoS flows

Op-c

Which QoS parameter specifies the Packet Error Rate (PER) for a QoS flow?

AMBR

Traffic Handling Priority (THP)

PER defines the maximum acceptable packet error rate for a given QoS flow

Packet Delay Budget (PDB)


Op-c

What does the Traffic Handling Priority (THP) parameter do?

It determines the order in which packets are handled in case of congestion

Determines the time to live (TTL) of data packets

Controls the encryption level for user traffic

Defines the maximum number of packets that can be sent

Op-a

What does the Packet Delay Budget (PDB) parameter specify?

The maximum error rate in packet delivery

The maximum allowable delay for packets within a QoS flow

The maximum bit rate for a flow

The retry mechanism for failed packets

Op-b

In which QoS flow type would you typically see the GBR (Guaranteed Bit Rate) parameter used?

Real-time applications requiring guaranteed performance, like VoIP or video conferencing

Background system updates

Broadcast services in 5G

Best-effort file downloads


Op-a

What does the QFI (QoS Flow Identifier) parameter represent in 5G QoS?

The maximum data rate for a QoS flow

The priority level of a network slice

The modulation scheme for the radio interface

A unique identifier for each QoS flow within a PDU session

Op-d

What is GBR (Guaranteed Bit Rate) in the context of 5G QoS parameters?

A QoS parameter that ensures a minimum bit rate is guaranteed for certain QoS flows

A mechanism to prioritize control plane traffic

A metric that monitors user mobility

A parameter that controls signaling priority

Op-a

Which QoS parameter ensures that there is an upper limit on the total data rate for non-GBR flows?

GBR

AMBR (Aggregate Maximum Bit Rate)

ARP
QFI

Op-b

How does the Packet Delay Budget (PDB) QoS parameter impact a QoS flow?

It controls how often the PDU session is refreshed

It determines the number of retries for a failed transmission

It defines the maximum time delay allowed for packets of a QoS flow

It specifies the maximum allowed packet loss rate

Op-c

What is the function of the Packet Error Rate (PER) QoS parameter?

It sets the packet scheduling priority

It controls the encryption method for user traffic

It defines the maximum acceptable packet error rate for a QoS flow to ensure quality

It monitors how many packets are being sent in a second

Op-c

Which of the following best describes the UL/DL Maximum Bit Rate (MBR) parameter in 5G QoS?

It determines the maximum number of active PDU sessions per user

It defines the absolute upper limit for the uplink and downlink data rates for a GBR flow

It manages control plane signaling rates


It controls the modulation and coding scheme

Op-b

How does the Traffic Handling Priority (THP) parameter affect QoS flows?

It prioritizes certain QoS flows over others during congestion

It adjusts the handover mechanism for the user device

It defines the maximum bit rate for all PDU sessions

It applies only to GBR flows

Op-a

In 5G QoS architecture, which parameter is responsible for specifying the priority of a QoS flow when
multiple flows compete for network resources?

Packet Delay Budget (PDB)

Traffic Handling Priority (THP)

QFI

AMBR

Op-b

Which of the following QoS parameters defines the maximum allowable packet loss for a particular
QoS flow?

Packet Error Rate (PER)


AMBR

Packet Delay Budget (PDB)

ARP

Op-a

In 4G, the equivalent of the PDU Session in 5G is called:

Data Radio Bearer

EPS Bearer (Evolved Packet System Bearer)

GTP Tunnel

QoS Session

Op-b

Which of the following is a key difference between 4G EPS bearers and 5G PDU sessions?

4G supports IPv6 only, while 5G supports both IPv4 and IPv6

5G PDU sessions support multiple QoS flows, while 4G EPS bearers have a one-to-one relationship
with QoS flows

Both 4G and 5G handle PDU sessions the same way

5G has more bearers than 4G

Op-b

One major improvement in 5G QoS architecture over 4G is:


In 5G, multiple QoS flows can be carried within a single PDU session, providing more flexible and
efficient management of data flows

5G uses the same QCI mechanism as 4G but with higher values

The introduction of more EPS bearers in 5G

5G has more bearers than 4G

Op-a

What is a key difference between the QoS handling mechanism in 4G and 5G?

4G uses dedicated EPS bearers for each QoS flow, whereas 5G can handle multiple QoS flows within a
single PDU session

4G supports fewer bearers per device compared to 5G

5G does not prioritize QoS, unlike 4G

5G does not support GBR, while 4G does

Op-a

What is a significant difference between 4G EPS bearers and 5G QoS flows regarding traffic types?

In 5G, a single PDU session can support both GBR and Non-GBR traffic through different QoS flows,
whereas in 4G, each EPS bearer is dedicated to a specific type of traffic (GBR or Non-GBR)

4G EPS bearers only support voice services, while 5G supports data services

5G only supports best-effort traffic, while 4G handles guaranteed bit rate traffic

Both 4G and 5G handle traffic types in the same way

Op-a

What is the main distinction between the way resource allocation is handled in 4G compared to 5G?

4G allocates resources more dynamically


5G allows dynamic allocation of resources at the QoS flow level, whereas 4G allocates resources at
the EPS bearer level

4G allows multiple bearers per service, but 5G does not

Both handle resource allocation in a similar manner

Op-b

In 5G, Reflective QoS allows a UE to automatically apply QoS rules for uplink traffic based on the
downlink QoS. Does 4G have a similar mechanism?

Reflective QoS is a core feature in both 4G and 5G

4G has Reflective QoS for control traffic only

Yes, 4G has reflective QoS

No, 4G does not support Reflective QoS

Op-d

How does Service Data Flow (SDF) mapping in 5G differ from that in 4G?

5G does not use SDFs, unlike 4G

SDF mapping works the same in both 4G and 5G

In 4G, an SDF is directly mapped to an EPS bearer, while in 5G, an SDF can be mapped to multiple
QoS flows within the same PDU session

4G supports SDFs only for control signaling

Op-c

In the 5G QoS architecture, which network function is primarily responsible for enforcing QoS
policies at the user plane level?
UPF

AMF

gNB

SMF

Op-a

How is the QoS Flow Identifier (QFI) used in the 5G QoS architecture?

It defines the priority of an entire network slice

It maps a PDU session to an application

It defines the maximum throughput for a user session

It uniquely identifies a QoS flow within a PDU session

Op-d

What role does the SMF (Session Management Function) play in the 5G QoS architecture?

It defines the data encryption algorithms for user data

It enforces radio resource scheduling

It handles user authentication and session termination

It manages PDU sessions and QoS rules by coordinating with the UPF and applying policy decisions

Op-d

In 5G QoS architecture, how are GBR and non-GBR flows distinguished?


Non-GBR flows are prioritized over GBR flows

GBR flows are assigned to the control plane only

GBR flows are guaranteed to have a minimum bandwidth, while non-GBR flows do not have
bandwidth guarantees

Both types of flows are treated equally in resource allocation

Op-c

What is the primary function of the QoS rule in the 5G QoS architecture?

It handles the encryption of user data packets

It defines the mapping of a service data flow (SDF) to a specific QoS flow and sets parameters like QFI
and traffic handling priority

It specifies the power allocation for the UE

It defines the mobility policy for the user equipment (UE)

Op-b

Which component of the 5G QoS architecture ensures that a particular service flow receives its
allocated resources and treatment?

AMF

RAN

SMF

QoS Profile

Op-d

What is the significance of the QoS Flow in the 5G QoS architecture?


It is the finest granularity of QoS in 5G, ensuring specific treatment for each data flow based on the
application requirements

It defines the physical layer modulation techniques

It defines the control plane signaling requirements

It only handles emergency services

Op-a

Which of the following is true about the relationship between the QoS profile and the PDU session in
5G?

A PDU session can have multiple QoS profiles, with each QoS profile associated with specific QoS
flows based on the application's requirements

Each PDU session is limited to a single QoS profile

The QoS profile defines the mobility characteristics of the PDU session

The QoS profile is used only for control plane traffic

Op-a

What is the role of the AMBR (Aggregate Maximum Bit Rate) parameter in the 5G QoS architecture?

It defines the maximum throughput of a single QoS flow

It prioritizes signaling messages over user data

It specifies the latency requirements for GBR flows

It limits the total data rate for all non-GBR flows within a PDU session or across multiple PDU
sessions for a user

Op-d

What is the role of the AMBR (Aggregate Maximum Bit Rate) parameter in the 5G QoS architecture?
It prioritizes GBR flows over non-GBR flows

It sets the modulation and coding scheme for the radio interface

It determines the priority of a QoS flow in situations of network congestion, affecting how resources
are allocated

It defines the scheduling of control plane signaling

Op-c

What is the primary role of the User Plane Function (UPF) in 5G regarding QoS flow enforcement?

Managing mobility between cells

Establishing control plane connections

Enforcing QoS rules by mapping QoS flows to data bearers and applying traffic forwarding rules

Allocating radio resources to the UE

Op-c

How does the GTP-U (GPRS Tunneling Protocol - User plane) tunnel contribute to QoS in 5G
networks?

It encapsulates user plane traffic to ensure QoS flows are delivered across the network segments like
the UPF and gNB

It enables session management for the control plane

It secures user data using encryption

It reduces the signaling load in the control plane

Op-a
What is the main advantage of using Reflective QoS in 5G?

It enables the UE to apply downlink QoS settings to uplink traffic dynamically without explicit
signaling

It reduces the need for QoS profiles in the core network

It prioritizes emergency services over all other traffic

It allows the UE to negotiate QoS directly with the SMF

Op-a

In the context of QoS, what is an SDF (Service Data Flow) template primarily used for?

To define filters that map specific application data flows to QoS flows by matching IP addresses,
ports, and other parameters

To configure UE mobility and handover procedures

To manage user session authentication and authorization

To allocate bandwidth across multiple users on a shared channel

Op-a

What is the role of the Allocation and Retention Priority (ARP) in QoS profile management?

It provides information about maximum bit rate requirements

It ensures data packets are encrypted during transmission

It defines the priority for assigning resources and retaining them during congestion or overload
scenarios

It determines the type of service (e.g., GBR or non-GBR) allocated to a flow

Op-c

Which of the following is true about Network Slicing and QoS flows in 5G?
Network slices are only relevant for control plane operations

Each network slice can have its own dedicated set of QoS flows and QoS profiles tailored to the
specific service needs of the slice

Network slicing does not support non-GBR flows

All slices must share the same QoS configuration

Op-b

How does the Session AMBR (Aggregate Maximum Bit Rate) parameter affect QoS flows in a 5G PDU
session?

It defines the maximum bit rate for all non-GBR flows within a PDU session, limiting overall data
throughput to prevent congestion

It manages the priority for emergency services

It allocates a specific amount of bandwidth to each GBR flow

It determines the latency tolerance of the QoS flow

Op-a

In 5G, how is the QoS Flow Identifier (QFI) used in conjunction with the SDF template to manage
traffic?

The QFI uniquely identifies a QoS flow, and the SDF template ensures that traffic matching specific
criteria (e.g., IP address, port number) is mapped to this QoS flow

The SDF template is not related to QoS flows

The QFI is used to prioritize control plane signaling

The QFI dynamically changes based on network conditions

Op-a
Which element in the 5G network primarily interacts with the SDF template to enforce QoS rules at
the packet level?

SMF

UPF

AMF

gNB

op-b

In a scenario with limited network resources, which factor within the QoS profile helps decide which
flows are maintained and which are pre-empted?

QoS Flow Identifier (QFI)

Session AMBR

Allocation and Retention Priority (ARP)

Reflective QoS

Op-c
Which downlink channels are crucial for initial access in a 5G network?
PUSCH and PUCCH

PRACH and PMCH

PDSCH and PDCCH

PSS, SSS, and Broadcast Channels

Op-d

How many subcarriers does the Primary Synchronization Signal (PSS) exclusively utilize within a
frame?

240 subcarriers

126 subcarriers

56 subcarriers

336 subcarriers

Op-b

What is the primary purpose of the Physical Cell Identity (PCI) in a 5G network?

Transmitting synchronization signals

Handling user authentication

Identifying individual users

Differentiating cells within an area

Op-d
How frequently are the PSS and SSS transmitted in a 5G network?

Every 30 milliseconds

Every 10 milliseconds

Every 1 millisecond

Every 20 milliseconds

Op-d

In the Physical Broadcast Channel (PBCH), how many OFDM symbols are utilized, and how many of
these symbols remain unused within the block?

Four symbols utilized, one symbol unused

Three symbols utilized, two symbol unused

Three symbols utilized, one symbol unused

Two symbols utilized, two symbol unused

Op-c
What is the primary reason for introducing the concept of bandwidth parts in 5G networks?

To limit the number of available frequency bands

To increase interference among user devices

To reduce the carrier bandwidth in 5G

To conserve device power and reduce interference

Op-d

How does 5G differ from 4G regarding the utilization of carrier bandwidth?

In 4G, carrier bandwidth allocation is dynamic

In 5G, carrier bandwidth is consistently transmitted

4G utilizes broader carrier bandwidth compared to 5G

5G demands more efficient usage due to wider bandwidth

Op-d

What is the function of the Downlink Control Indicator (DCI) in managing bandwidth parts?

Allocates carrier spectrum for user selection

Switches between different carrier frequencies


Defines numerology for bandwidth allocation

Manages dynamic switching between active bandwidth parts

Op-d

How are bandwidth parts defined for users in 5G networks?

By allowing users to select any portion of the spectrum at any time

By subdividing the allocated frequency spectrum into smaller sections

Through static allocation of specific frequency bands

Through continuous transmission of the entire allocated frequency spectrum

Op-b

What role does efficient utilization of resource blocks play within the channel bandwidth in 5G?

Reduces the number of available bandwidth parts

Helps conserve device power and optimizes communication

Impacts the Downlink Control Indicator's functionality

Increases interference and power consumption

Op-b

What is the primary role of subcarrier spacing variations in 5G networks?

To decrease the number of subcarriers in a resource block


To increase the number of resources within a resource block

To impact resource block composition and symbol duration

To influence the frequency allocation for Bandwidth Parts (BWPs)

Op-c

What is the fundamental composition of a resource block in 5G networks?

15 kHz subcarrier spacing

Varying symbol durations

12 subcarriers

12 resource elements

Op-c

How does doubling the subcarrier spacing impact symbol duration in 5G networks?

Symbol duration increases

Symbol duration becomes unpredictable

Symbol duration remains unchanged

Symbol duration decreases

Op-d
What impact does halving the subcarrier spacing have on symbol duration in 5G networks?

Symbol duration remains unchanged

Symbol duration decreases

Symbol duration increases

Symbol duration becomes unpredictable

Op-c

How does adjusting subcarrier spacing influence Bandwidth Parts (BWPs) in 5G networks?

It increases the symbol duration for BWPs

It doesn’t affect BWPs

It reduces the number of available BWPs

It alters resource allocations within the spectrum for BWPs

Op-d
What is the primary purpose of using a guard band in Orthogonal Frequency Division Multiplexing
(OFDM) within the frequency domain?

To decrease spectrum utilization efficiency

To maintain separation between subcarriers and prevent interference

To increase interference among subcarriers

To limit the utilization of available spectrum

Op-b

In OFDM, how are non-transmitting subcarriers managed while one specific subcarrier transmits
data?

They maintain zero amplitude to prevent interference

They transmit data simultaneously to maximize bandwidth

They switch frequencies rapidly to avoid overlapping

They maintain maximum amplitude to enhance data transmission

Op-a

What advantage does Orthogonal Frequency Division Multiple Access (OFDMA) offer over traditional
Time Division Multiplexing (TDM)?

Increased interference between frequency and time domains

Efficient utilization of resources irrespective of time slots for any user

Reduced resource sharing among different users

Limitation of resource allocation within specific slots or carriers

Op-b
What flexibility does OFDMA introduce compared to traditional resource allocation methods?

Allowing any user to access specific resources within a resource frame, regardless of time slot

Limiting user access to resources within predefined time slots

Allocating resources to a single user for a specific slot or carrier

Maintaining fixed resource distribution among users

Op-a

How does OFDM differ from OFDMA in terms of resource allocation among users?

OFDMA allows any user to access resources within a resource frame regardless of time slots or
carriers

OFDMA allows any user to access resources irrespective of frequency domains

OFDM allocates resources based on specific time slots for each user

OFDM provides exclusive resource access to one user at a time

Op-a

What is the primary role of modulation in 5G networks?

To adjust carrier signals for effective data transmission

To limit the use of multiplexing for different signals

To increase interference among carrier signals

To reduce the number of modulation technique


Op-a

How does modulation contribute to reducing the antenna size needed for transmitting lower
frequency information?

By employing a larger number of carrier signals

By increasing the size of antennas at lower frequencies

By adjusting carrier signals to higher frequencies

By maintaining a constant amplitude for all carrier signals

Op-c

Which aspect of modulation helps in minimizing interference among signals?

Reducing the number of modulation schemes used

Transmitting baseband signals at lower frequencies

Adjusting carrier signals in terms of amplitude or phase

Employing carrier signals with constant amplitude

Op-c

What purpose do different modulation schemes serve in 5G networks?

They utilize varying numbers of bits per symbol for efficient data transmission

They reduce the efficiency of data transmission per symbol


They limit the use of amplitude and phase differences for data distinction

They enable uniform data transmission irrespective of carrier frequencies

Op-a

How do modulation schemes like QPSK and 16QAM differ in their transmission efficiency?

QPSK transmits more bits per symbol compared to 16QAM

Both QPSK and 16QAM transmit the same number of bits per symbol

Neither QPSK nor 16QAM transmit bits per symbol

QPSK transmits fewer bits per symbol compared to 16QAM

Op-d

What do modulation orders such as QPSK, 16QAM, and 256QAM primarily determine in 5G
communication?

The total number of time slots available for data transmission

The number of bits transmitted within a symbol

The number of users connected to a specific cell site

The frequency range allocated for uplink data transmission

Op-b

In 5G networks, what parameter influences the selection of modulation orders like QPSK or
256QAM?
Downlink transmission frequency allocation

Channel Quality Indicator (CQI) feedback from user equipment

Uplink transmission power of the user equipment

The total number of available antennas at the cell site

Op-b

How does increasing the modulation order impact the code rate in 5G communication?

It decreases the code rate

It increases the code rate

It has no impact on the code rate

It alters the transmission power

Op-b

What is the range of CQI values in the uplink that influences efficient data transmission in 5G
networks?

0 to 10

0 to 5

0 to 15

0 to 25

Op-c
How do factors like signal degradation due to distance impact the modulation order and overall
network performance in 5G?

Higher signal degradation ensures better network performance

Signal degradation can lower the modulation order and impact network performance

Signal degradation has no impact on modulation orders or network performance

Higher signal degradation leads to higher modulation orders for efficient transmission

Op-b
Which statement accurately describes the fundamental difference between Time Division Duplex
(TDD) and Frequency Division Duplex (FDD) in 5G?

TDD allocates different frequencies for uplink and downlink, while FDD uses the same carrier
frequency.
FDD involves the same carrier frequency for uplink and downlink, whereas TDD separates
transmissions by time intervals.

TDD uses separate carrier frequencies for uplink and downlink, while FDD utilizes the same
frequency.

FDD separates transmissions in the time domain, while TDD employs separate carrier frequencies.

Op-b

What is the primary challenge in Frequency Division Duplex (FDD) concerning effective resource
allocation?

Synchronization issues between users and base stations

Increased interference due to shared carrier frequencies

Limited bandwidth availability for separate carrier frequencies

Inefficient utilization of the time domain

Op-a

Which duplexing scheme offers flexibility in allocating resources across different time domains or
frequencies?

Frequency Division Duplex (FDD)

Half Duplex (HD)

Full Duplex (FD)

Time Division Duplex (TDD)

Op-d
In Time Division Duplex (TDD), how is resource allocation managed for uplink and downlink
transmissions?

By employing different modulation techniques

By employing different modulation techniques

By using separate carrier frequencies

By allocating distinct frequency bands for each direction

Op-c

What capability does Full Duplex (FD) offer in 5G communication?

Transmission separation in both frequency and time domains

Transmission separation only in frequency domains

Transmission separation in either frequency or time domains

Transmission separation only in time domains

Op-c

What distinguishes Frequency Division Duplex (FDD) from Time Division Duplex (TDD) in 5G
communication?

FDD utilizes the same frequency for uplink and downlink, while TDD uses different frequencies.

FDD demands synchronization between user and base station, unlike TDD, which requires no
synchronization.
FDD separates transmissions in a time domain, whereas TDD allocates separate carrier frequencies.

FDD uses different modulation techniques for uplink and downlink, while TDD employs the same
technique.

Op-d

What role does synchronization play in Time Division Duplex (TDD) to ensure efficient transmission in
5G networks?

To enable seamless communication without interference between uplink and downlink

To prevent the negotiation of resource allocation between devices and cells

To increase interference between uplink and downlink transmissions

To limit the flexibility of OFDM symbol allocation within a time slot

Op-a

What does 5G's flexibility in allocating different OFDM symbols within a time slot facilitate?

Negotiation between devices and cells for better synchronization

Fixed allocation patterns for uplink and downlink transmissions

Negotiation between devices and cells for efficient resource utilization

Fixed modulation orders for uplink and downlink communication

Op-c

What is defined within a 10-millisecond duration at the cell level in 5G communication?


Fixed carrier frequencies for uplink and downlink communication

Dynamic negotiation patterns between devices and cells

Flexible modulation techniques for efficient resource utilization

Specific allocation patterns for uplink and downlink transmissions

Op-d

What purpose does the Dynamic Slot Format Indicator serve in 5G networks?

To synchronize carrier frequencies between devices and cells

To restrict negotiation between devices and cells for resource utilization

To signal uplink and downlink allocations dynamically for efficient resource usage

To eliminate flexibility in OFDM symbol allocation within time slots

Op-c
What is the primary purpose of carrier aggregation in 5G NR?

To restrict the use of different frequency bands for carrier aggregation


To reduce the number of frequency carriers used in data transmission

To limit the data rates achievable in 5G networks

To aggregate various frequency carriers and achieve multi-gigabit data rates

Op-d

How does 5G differ from LTE regarding carrier spacing and data rate requirements?

LTE had higher carrier spacing compared to 5G for achieving higher data rates

LTE had limited carrier spacing of 20 megahertz, whereas 5G demands planning for 20 times higher
data rates

LTE required less planning for higher data rates compared to 5G

5G demands less carrier aggregation compared to LTE for similar data rates

Op-b

In situations where telecom operators lack contiguous spectrum, how does carrier aggregation help
achieve desired data rates in 5G?

By restricting the use of multi-gigabit data rates

By aggregating carriers from different frequency ranges

By reducing the need for diverse frequency ranges

By limiting the available data rates

Op-b
What are the two primary options available for carrier aggregation in 5G?

Intra-band and extra-band aggregation

Multi-band and single-band aggregation

Multi-carrier and single-carrier aggregation

Inter-band and contiguous aggregation

Op-d

At which protocol layer is carrier aggregation implemented for enhancing data rates in 5G?

Data Link layer (DLL)

Medium Access Control (MAC) layer

Network layer (Layer 3)

Physical layer (PHY)

Op-b

What is the primary role of the scheduler operating at the MAC layer in 5G NR?

To manage user equipment hardware components

To control the physical layer modulation techniques

To regulate the power levels of individual devices

To allocate diverse resources across the air interface to different users

Op-d
What factors influence resource allocation by the scheduler in 5G NR?

Only user-defined Quality of Service (QoS)

Assigned bandwidth per user

User equipment hardware specifications

Channel quality indicators (CQI) and modulation efficiency

Op-d

How does the scheduler prioritize resource allocation concerning users' varying throughput needs in
5G NR?

By reducing resource allocation for users with higher throughput requirements

By allocating higher resources to users with lower throughput needs

By assigning more resources to users requiring higher throughput

By employing a single scheduler for all users, regardless of their needs

Op-c

What approach does the scheduler adopt concerning users located at cell edges in 5G NR?

Allocating the same resources to all users, irrespective of their locations

Granting more resources to users at cell edges to meet a minimum threshold of throughput

Providing minimal resources to users at cell edges due to their remote location

Prioritizing users at cell edges for minimal resource allocation


Op-b

Why is it crucial for the scheduler in 5G NR to avoid extreme resource allocation discrepancies
between users?

To limit the overall data throughput in the network

To prioritize specific users based on their modulation techniques

To increase interference among users with varying radio conditions

To maintain fairness and ensure a judicious distribution of resources

Op-d
Which network performance indicators are significantly influenced by various scheduler modes in 5G
NR?

Signal propagation and interference levels

Throughput, delays, and fairness index

Data rate and modulation techniques

Latency and spectral efficiency

Op-b

What is the primary impact of the MaxRB scheduler mode in an illustrative scenario with three users
connected to a single cell in 5G NR?

It evenly allocates resources among all users, ensuring optimal throughput.

It prioritizes quality for resource allocation, leading to potential throughput imbalances.

It guarantees fairness by allocating resources based on users' signal strengths.

It significantly improves the Modulation and Coding Schemes (MCS) for Users 2 and 3.

Op-b

What drawback is observed with the Round Robin scheduler mode concerning users with lower
Modulation and Coding Schemes (MCS) in the illustrative scenario?

It significantly improves throughput for all users.

It guarantees fairness by allocating resources based on users' signal strengths.


It maximizes resource allocation for Users 2 and 3, enhancing their MCS.

It distributes resources unevenly among users, affecting fairness.

Op-d

What distinguishes the Proportional Fair scheduler mode from MaxRB and Round Robin concerning
resource allocation in 5G NR?

It maximizes resource allocation for Users 1 and 2 to maintain fairness.

It prioritizes quality and signal strengths for all users equally.

It focuses solely on optimizing delay metrics for each user in the cell.

It balances resources, ensuring better throughput and fairness across users.

Op-d

How do advanced scheduler algorithms in 5G NR, leveraging machine learning and deep learning,
contribute to resource optimization?

By prioritizing users with higher MCS, disregarding fairness across the cell

By ensuring static and unalterable resource allocation to maintain fairness

By limiting resource allocation to users based on predefined patterns

By dynamically optimizing resource allocation based on changing network conditions

Op-d

Started on Thursday, 3 October 2024, 3:31 PM

State Finished

Completed on Thursday, 3 October 2024, 3:37 PM


Time taken 5 mins 11 secs

Grade 17.00 out of 17.00 (100%)

Question 1

Correct

Mark 6.00 out of 6.00

Flag question

Question text

Match the process that occurs when a user connects to the internet via a 5G network.

The process of identifying the user's Answer 1Choose...Traffic RoutingMobility


device and assigning a temporary ManagementSecurity Key SetupUser
identity. AuthenticationSession EstablishmentUser Registration

Continuously monitors the user's Answer 2Choose...Traffic RoutingMobility


mobility and manages handovers within ManagementSecurity Key SetupUser
the coverage area. AuthenticationSession EstablishmentUser Registration

Managing the routing of user data traffic Answer 3Choose...Traffic RoutingMobility


between the base station and external ManagementSecurity Key SetupUser
networks. AuthenticationSession EstablishmentUser Registration

Answer 4Choose...Traffic RoutingMobility


The establishment of communication
ManagementSecurity Key SetupUser
sessions for user data traffic.
AuthenticationSession EstablishmentUser Registration

Answer 5Choose...Traffic RoutingMobility


Involves verifying the user's identity
ManagementSecurity Key SetupUser
using authentication protocols.
AuthenticationSession EstablishmentUser Registration

Setting up security keys to secure the Answer 6Choose...Traffic RoutingMobility


connection between the user's device ManagementSecurity Key SetupUser
and the network. AuthenticationSession EstablishmentUser Registration

Feedback

Your answer is correct.

The correct answer is:

The process of identifying the user's device and assigning a temporary identity. → User Registration,

Continuously monitors the user's mobility and manages handovers within the coverage area. →
Mobility Management,

Managing the routing of user data traffic between the base station and external networks. → Traffic
Routing,

The establishment of communication sessions for user data traffic. → Session Establishment,
Involves verifying the user's identity using authentication protocols. → User Authentication,

Setting up security keys to secure the connection between the user's device and the network. →
Security Key Setup

Question 2

Correct

Mark 11.00 out of 11.00

Flag question

Question text

Match the 5G Core module's functionality with the particular module's name

Answer 1Choose...Network Repository Function (NRF)Unified Data


Responsible for managing Management (UDM)Application Function (AF)Network Slice Selection
the user's mobility, Function (NSSF)Network Exposure Function (NEF)Policy Control Function
including handovers (PCF)Access and Mobility Management Function (AMF)Network Data
within the network. Analytics Function (NWDAF)User Plane Function (UPF)Authentication
Server Function (AUSF)Session Management Function (SMF)

Answer 2Choose...Network Repository Function (NRF)Unified Data


Management (UDM)Application Function (AF)Network Slice Selection
Provides real-time data
Function (NSSF)Network Exposure Function (NEF)Policy Control Function
analytics and insights for
(PCF)Access and Mobility Management Function (AMF)Network Data
network optimization.
Analytics Function (NWDAF)User Plane Function (UPF)Authentication
Server Function (AUSF)Session Management Function (SMF)
Answer 3Choose...Network Repository Function (NRF)Unified Data
Serves as a repository for Management (UDM)Application Function (AF)Network Slice Selection
information about Function (NSSF)Network Exposure Function (NEF)Policy Control Function
network services and (PCF)Access and Mobility Management Function (AMF)Network Data
functions. Analytics Function (NWDAF)User Plane Function (UPF)Authentication
Server Function (AUSF)Session Management Function (SMF)

Answer 4Choose...Network Repository Function (NRF)Unified Data


Management (UDM)Application Function (AF)Network Slice Selection
Manages subscriber data Function (NSSF)Network Exposure Function (NEF)Policy Control Function
and user profiles. (PCF)Access and Mobility Management Function (AMF)Network Data
Analytics Function (NWDAF)User Plane Function (UPF)Authentication
Server Function (AUSF)Session Management Function (SMF)

Answer 5Choose...Network Repository Function (NRF)Unified Data


Management (UDM)Application Function (AF)Network Slice Selection
Manages and controls the
Function (NSSF)Network Exposure Function (NEF)Policy Control Function
quality of service (QoS)
(PCF)Access and Mobility Management Function (AMF)Network Data
and policy enforcement.
Analytics Function (NWDAF)User Plane Function (UPF)Authentication
Server Function (AUSF)Session Management Function (SMF)

Answer 6Choose...Network Repository Function (NRF)Unified Data


Management (UDM)Application Function (AF)Network Slice Selection
Provides authentication
Function (NSSF)Network Exposure Function (NEF)Policy Control Function
and authorization services
(PCF)Access and Mobility Management Function (AMF)Network Data
for the network.
Analytics Function (NWDAF)User Plane Function (UPF)Authentication
Server Function (AUSF)Session Management Function (SMF)

Answer 7Choose...Network Repository Function (NRF)Unified Data


Management (UDM)Application Function (AF)Network Slice Selection
Exposes network
Function (NSSF)Network Exposure Function (NEF)Policy Control Function
capabilities and services to
(PCF)Access and Mobility Management Function (AMF)Network Data
external applications.
Analytics Function (NWDAF)User Plane Function (UPF)Authentication
Server Function (AUSF)Session Management Function (SMF)

Answer 8Choose...Network Repository Function (NRF)Unified Data


Manages the forwarding Management (UDM)Application Function (AF)Network Slice Selection
of user data packets and Function (NSSF)Network Exposure Function (NEF)Policy Control Function
performs data plane (PCF)Access and Mobility Management Function (AMF)Network Data
functions. Analytics Function (NWDAF)User Plane Function (UPF)Authentication
Server Function (AUSF)Session Management Function (SMF)

Answer 9Choose...Network Repository Function (NRF)Unified Data


Management (UDM)Application Function (AF)Network Slice Selection
Offers data and
Function (NSSF)Network Exposure Function (NEF)Policy Control Function
application services within
(PCF)Access and Mobility Management Function (AMF)Network Data
the 5G network.
Analytics Function (NWDAF)User Plane Function (UPF)Authentication
Server Function (AUSF)Session Management Function (SMF)
Answer 10Choose...Network Repository Function (NRF)Unified Data
Management (UDM)Application Function (AF)Network Slice Selection
Handles the establishment
Function (NSSF)Network Exposure Function (NEF)Policy Control Function
and management of
(PCF)Access and Mobility Management Function (AMF)Network Data
communication sessions.
Analytics Function (NWDAF)User Plane Function (UPF)Authentication
Server Function (AUSF)Session Management Function (SMF)

Answer 11Choose...Network Repository Function (NRF)Unified Data


Responsible for selecting Management (UDM)Application Function (AF)Network Slice Selection
the appropriate network Function (NSSF)Network Exposure Function (NEF)Policy Control Function
slice based on user (PCF)Access and Mobility Management Function (AMF)Network Data
requirements. Analytics Function (NWDAF)User Plane Function (UPF)Authentication
Server Function (AUSF)Session Management Function (SMF)

Feedback

Your answer is correct.

The correct answer is:

Responsible for managing the user's mobility, including handovers within the network. → Access and
Mobility Management Function (AMF),

Provides real-time data analytics and insights for network optimization. → Network Data Analytics
Function (NWDAF),

Serves as a repository for information about network services and functions. → Network Repository
Function (NRF),

Manages subscriber data and user profiles. → Unified Data Management (UDM),

Manages and controls the quality of service (QoS) and policy enforcement. → Policy Control Function
(PCF),

Provides authentication and authorization services for the network. → Authentication Server
Function (AUSF),

Exposes network capabilities and services to external applications. → Network Exposure Function
(NEF),

Manages the forwarding of user data packets and performs data plane functions. → User Plane
Function (UPF),

Offers data and application services within the 5G network. → Application Function (AF),

Handles the establishment and management of communication sessions. → Session Management


Function (SMF),

Responsible for selecting the appropriate network slice based on user requirements. → Network
Slice Selection Function (NSSF)
Started on Saturday, 5 October 2024, 10:04 PM

State Finished

Completed on Saturday, 5 October 2024, 10:06 PM

Time taken 2 mins 1 sec

Marks 1.00/1.00

Grade 10.00 out of 10.00 (100%)


Question 1

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Match the following for "Initial Cell Search and Registration When UE Turns on"

Answer 1Choose...Cell Search SSB (PSS, SSS, PBCH)InitialContextSetupRequest


(UE Capability + AS SMC + RRC Connection Reconfiguration)NAS
UE synchronizes with Authentication RequestRACH Preamble (MSG1) and RACH Response
the carrier frequency. (MSG2)Registration Complete + PDU Session EstablishmentFrequency
(FREQ SEARCH) Synchronization (ARFCN)NAS Security Mode CommandNAS Identity
RequestRRC Setup Request (MSG3), RRC Setup (MSG4),
RRCSetupCompeteComplete

Answer 2Choose...Cell Search SSB (PSS, SSS, PBCH)InitialContextSetupRequest


UE detects SSB and (UE Capability + AS SMC + RRC Connection Reconfiguration)NAS
acquires cell Authentication RequestRACH Preamble (MSG1) and RACH Response
information. (DL (MSG2)Registration Complete + PDU Session EstablishmentFrequency
SYNC) Synchronization (ARFCN)NAS Security Mode CommandNAS Identity
RequestRRC Setup Request (MSG3), RRC Setup (MSG4),
RRCSetupCompeteComplete

Answer 3Choose...Cell Search SSB (PSS, SSS, PBCH)InitialContextSetupRequest


UE achieves uplink (UE Capability + AS SMC + RRC Connection Reconfiguration)NAS
synchronization. (UL Authentication RequestRACH Preamble (MSG1) and RACH Response
SYNC) (MSG2)Registration Complete + PDU Session EstablishmentFrequency
Synchronization (ARFCN)NAS Security Mode CommandNAS Identity
RequestRRC Setup Request (MSG3), RRC Setup (MSG4),
RRCSetupCompeteComplete

Answer 4Choose...Cell Search SSB (PSS, SSS, PBCH)InitialContextSetupRequest


(UE Capability + AS SMC + RRC Connection Reconfiguration)NAS
UE sends request to Authentication RequestRACH Preamble (MSG1) and RACH Response
initiate registration. (MSG2)Registration Complete + PDU Session EstablishmentFrequency
Synchronization (ARFCN)NAS Security Mode CommandNAS Identity
RequestRRC Setup Request (MSG3), RRC Setup (MSG4),
RRCSetupCompeteComplete

Answer 5Choose...Cell Search SSB (PSS, SSS, PBCH)InitialContextSetupRequest


(UE Capability + AS SMC + RRC Connection Reconfiguration)NAS
Authentication RequestRACH Preamble (MSG1) and RACH Response
(MSG2)Registration Complete + PDU Session EstablishmentFrequency
Synchronization (ARFCN)NAS Security Mode CommandNAS Identity
RequestRRC Setup Request (MSG3), RRC Setup (MSG4),
RRCSetupCompeteComplete
Answer 6Choose...Cell Search SSB (PSS, SSS, PBCH)InitialContextSetupRequest
(UE Capability + AS SMC + RRC Connection Reconfiguration)NAS
Authentication RequestRACH Preamble (MSG1) and RACH Response
(MSG2)Registration Complete + PDU Session EstablishmentFrequency
Synchronization (ARFCN)NAS Security Mode CommandNAS Identity
RequestRRC Setup Request (MSG3), RRC Setup (MSG4),
RRCSetupCompeteComplete

Answer 7Choose...Cell Search SSB (PSS, SSS, PBCH)InitialContextSetupRequest


(UE Capability + AS SMC + RRC Connection Reconfiguration)NAS
Authentication RequestRACH Preamble (MSG1) and RACH Response
(MSG2)Registration Complete + PDU Session EstablishmentFrequency
Synchronization (ARFCN)NAS Security Mode CommandNAS Identity
RequestRRC Setup Request (MSG3), RRC Setup (MSG4),
RRCSetupCompeteComplete

Answer 8Choose...Cell Search SSB (PSS, SSS, PBCH)InitialContextSetupRequest


(UE Capability + AS SMC + RRC Connection Reconfiguration)NAS
Authentication RequestRACH Preamble (MSG1) and RACH Response
(MSG2)Registration Complete + PDU Session EstablishmentFrequency
Synchronization (ARFCN)NAS Security Mode CommandNAS Identity
RequestRRC Setup Request (MSG3), RRC Setup (MSG4),
RRCSetupCompeteComplete

Answer 9Choose...Cell Search SSB (PSS, SSS, PBCH)InitialContextSetupRequest


(UE Capability + AS SMC + RRC Connection Reconfiguration)NAS
Authentication RequestRACH Preamble (MSG1) and RACH Response
(MSG2)Registration Complete + PDU Session EstablishmentFrequency
Synchronization (ARFCN)NAS Security Mode CommandNAS Identity
RequestRRC Setup Request (MSG3), RRC Setup (MSG4),
RRCSetupCompeteComplete

Feedback

Your answer is correct.

The correct answer is:

UE synchronizes with the carrier frequency. (FREQ SEARCH) → Frequency Synchronization (ARFCN),

UE detects SSB and acquires cell information. (DL SYNC)

→ Cell Search SSB (PSS, SSS, PBCH),

UE achieves uplink synchronization. (UL SYNC)

→ RACH Preamble (MSG1) and RACH Response (MSG2),

UE sends request to initiate registration.

→ RRC Setup Request (MSG3), RRC Setup (MSG4), RRCSetupCompeteComplete,


→ NAS Identity Request,

→ NAS Authentication Request,

→ NAS Security Mode Command,

→ InitialContextSetupRequest (UE Capability + AS SMC + RRC Connection Reconfiguration),

→ Registration Complete + PDU Session Establishment

Finish review

◄ Early Open Quiz -01 (5G Call Flow)

Jump to... Jump to... Course Feedback Quiz 5G


Introduction 5G Overview 5G Architecture 5G New Radio
(NR) 5G Standardization Device Testing and Certification Quality of Service
(QoS) Flow in 5G 5G Identities 5G (SA): Initial access and Registration
Procedure 5G Core Network Early Open Quiz -01 (5G Call
Flow) Early Open Quiz -03 (MIB SIB Information) Early Open Quiz -04 (5G
Identities) Call Flow -01 Call Flow -02 Call Flow -03 Call
Flow -04 Call Flow -05 Call Flow -06 5G Call Flow (SA) Video

Early Open Quiz -03 (MIB SIB Information) ►

Started on Saturday, 5 October 2024, 9:57 PM

State Finished

Completed on Saturday, 5 October 2024, 9:58 PM

Time taken 1 min 17 secs

Grade 2.00 out of 2.00 (100%)


Question 1

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Match the followings:


Initial Registration Answer 1Choose...MIB and SIB1SIB6- SIB8SIB2 - SIB5

Cell Reselection Answer 2Choose...MIB and SIB1SIB6- SIB8SIB2 - SIB5

Emergency Services Answer 3Choose...MIB and SIB1SIB6- SIB8SIB2 - SIB5

Feedback

Your answer is correct.

The correct answer is:

Initial Registration → MIB and SIB1,

Cell Reselection → SIB2 - SIB5,

Emergency Services → SIB6- SIB8


Question 2

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Match the followings:


MIB and SIB1 Answer 1Choose...Initial RegistrationCell ReselectionEmergency Services

SIB2 - SIB5 Answer 2Choose...Initial RegistrationCell ReselectionEmergency Services

SIB6- SIB8 Answer 3Choose...Initial RegistrationCell ReselectionEmergency Services

Feedback

Your answer is correct.

The correct answer is:

MIB and SIB1 → Initial Registration,

SIB2 - SIB5 → Cell Reselection,

SIB6- SIB8 → Emergency Services

Started on Saturday, 5 October 2024, 9:55 PM

State Finished
Completed on Saturday, 5 October 2024, 9:57 PM

Time taken 1 min 27 secs

Marks 1.00/1.00

Grade 10.00 out of 10.00 (100%)

Question 1

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Choose the Correct Option

Answer 1Choose...Radio Network Temporary Identifier (RNTI)Permanent


Equipment Identifier (PEI)International Mobile Equipment Identity
A long-term, privacy- (IMEI)Globally Unique AMF Identifier (GUAMI)Subscription Concealed
sensitive identifier for a IdentifierServing Temporary Mobile Subscriber Identity (S-TMSI)Mobile
user, similar to IMSI in 4G. Station International Subscriber Directory Number:Public Land Mobile
Network and Standalone Non-Public Network Identifier
(PLMN_SNPN)Globally Unique Temporary IdentifierUE Radio Capability
Identifier (UE_RADIO_CAPABILITY_ID)IMSI Software Version
(IMEISV)Subscription Permanent Identifier (SUPI)

Answer 2Choose...Radio Network Temporary Identifier (RNTI)Permanent


Equipment Identifier (PEI)International Mobile Equipment Identity
(IMEI)Globally Unique AMF Identifier (GUAMI)Subscription Concealed
An encrypted form of
IdentifierServing Temporary Mobile Subscriber Identity (S-TMSI)Mobile
SUPI, ensuring privacy
Station International Subscriber Directory Number:Public Land Mobile
when transmitted over the
Network and Standalone Non-Public Network Identifier
air.
(PLMN_SNPN)Globally Unique Temporary IdentifierUE Radio Capability
Identifier (UE_RADIO_CAPABILITY_ID)IMSI Software Version
(IMEISV)Subscription Permanent Identifier (SUPI)

Answer 3Choose...Radio Network Temporary Identifier (RNTI)Permanent


Equipment Identifier (PEI)International Mobile Equipment Identity
(IMEI)Globally Unique AMF Identifier (GUAMI)Subscription Concealed
A temporary identifier IdentifierServing Temporary Mobile Subscriber Identity (S-TMSI)Mobile
used to anonymize users Station International Subscriber Directory Number:Public Land Mobile
and provide privacy. Network and Standalone Non-Public Network Identifier
(PLMN_SNPN)Globally Unique Temporary IdentifierUE Radio Capability
Identifier (UE_RADIO_CAPABILITY_ID)IMSI Software Version
(IMEISV)Subscription Permanent Identifier (SUPI)

Answer 4Choose...Radio Network Temporary Identifier (RNTI)Permanent


Equipment Identifier (PEI)International Mobile Equipment Identity
(IMEI)Globally Unique AMF Identifier (GUAMI)Subscription Concealed
Identifies the AMF (Access
IdentifierServing Temporary Mobile Subscriber Identity (S-TMSI)Mobile
and Mobility Management
Station International Subscriber Directory Number:Public Land Mobile
Function) region and the
Network and Standalone Non-Public Network Identifier
network.
(PLMN_SNPN)Globally Unique Temporary IdentifierUE Radio Capability
Identifier (UE_RADIO_CAPABILITY_ID)IMSI Software Version
(IMEISV)Subscription Permanent Identifier (SUPI)

Answer 5Choose...Radio Network Temporary Identifier (RNTI)Permanent


Equipment Identifier (PEI)International Mobile Equipment Identity
(IMEI)Globally Unique AMF Identifier (GUAMI)Subscription Concealed
A temporary identifier
IdentifierServing Temporary Mobile Subscriber Identity (S-TMSI)Mobile
used by the network to
Station International Subscriber Directory Number:Public Land Mobile
page or address a UE (User
Network and Standalone Non-Public Network Identifier
Equipment) for services.
(PLMN_SNPN)Globally Unique Temporary IdentifierUE Radio Capability
Identifier (UE_RADIO_CAPABILITY_ID)IMSI Software Version
(IMEISV)Subscription Permanent Identifier (SUPI)

Answer 6Choose...Radio Network Temporary Identifier (RNTI)Permanent


Used to identify the user Equipment Identifier (PEI)International Mobile Equipment Identity
equipment, typically the (IMEI)Globally Unique AMF Identifier (GUAMI)Subscription Concealed
IMEI (International Mobile IdentifierServing Temporary Mobile Subscriber Identity (S-TMSI)Mobile
Equipment Identity). Station International Subscriber Directory Number:Public Land Mobile
Network and Standalone Non-Public Network Identifier
(PLMN_SNPN)Globally Unique Temporary IdentifierUE Radio Capability
Identifier (UE_RADIO_CAPABILITY_ID)IMSI Software Version
(IMEISV)Subscription Permanent Identifier (SUPI)

Answer 7Choose...Radio Network Temporary Identifier (RNTI)Permanent


Equipment Identifier (PEI)International Mobile Equipment Identity
(IMEI)Globally Unique AMF Identifier (GUAMI)Subscription Concealed
A unique identifier for
IdentifierServing Temporary Mobile Subscriber Identity (S-TMSI)Mobile
mobile devices, used to
Station International Subscriber Directory Number:Public Land Mobile
track devices or in theft
Network and Standalone Non-Public Network Identifier
prevention.
(PLMN_SNPN)Globally Unique Temporary IdentifierUE Radio Capability
Identifier (UE_RADIO_CAPABILITY_ID)IMSI Software Version
(IMEISV)Subscription Permanent Identifier (SUPI)

Answer 8Choose...Radio Network Temporary Identifier (RNTI)Permanent


Equipment Identifier (PEI)International Mobile Equipment Identity
(IMEI)Globally Unique AMF Identifier (GUAMI)Subscription Concealed
Adds the software version
IdentifierServing Temporary Mobile Subscriber Identity (S-TMSI)Mobile
to the IMSI, enhancing
Station International Subscriber Directory Number:Public Land Mobile
device identification in
Network and Standalone Non-Public Network Identifier
networks.
(PLMN_SNPN)Globally Unique Temporary IdentifierUE Radio Capability
Identifier (UE_RADIO_CAPABILITY_ID)IMSI Software Version
(IMEISV)Subscription Permanent Identifier (SUPI)

Answer 9Choose...Radio Network Temporary Identifier (RNTI)Permanent


Equipment Identifier (PEI)International Mobile Equipment Identity
(IMEI)Globally Unique AMF Identifier (GUAMI)Subscription Concealed
The phone number
IdentifierServing Temporary Mobile Subscriber Identity (S-TMSI)Mobile
assigned to a mobile
Station International Subscriber Directory Number:Public Land Mobile
device, used for voice
Network and Standalone Non-Public Network Identifier
services and billing.
(PLMN_SNPN)Globally Unique Temporary IdentifierUE Radio Capability
Identifier (UE_RADIO_CAPABILITY_ID)IMSI Software Version
(IMEISV)Subscription Permanent Identifier (SUPI)

Answer 10Choose...Radio Network Temporary Identifier


(RNTI)Permanent Equipment Identifier (PEI)International Mobile
Equipment Identity (IMEI)Globally Unique AMF Identifier
Assigned to a UE for radio
(GUAMI)Subscription Concealed IdentifierServing Temporary Mobile
communications in 5G,
Subscriber Identity (S-TMSI)Mobile Station International Subscriber
ensuring temporary user
Directory Number:Public Land Mobile Network and Standalone Non-
anonymity.
Public Network Identifier (PLMN_SNPN)Globally Unique Temporary
IdentifierUE Radio Capability Identifier (UE_RADIO_CAPABILITY_ID)IMSI
Software Version (IMEISV)Subscription Permanent Identifier (SUPI)

Identifies the radio Answer 11Choose...Radio Network Temporary Identifier


capabilities of a UE for (RNTI)Permanent Equipment Identifier (PEI)International Mobile
better resource Equipment Identity (IMEI)Globally Unique AMF Identifier
management in the (GUAMI)Subscription Concealed IdentifierServing Temporary Mobile
network. Subscriber Identity (S-TMSI)Mobile Station International Subscriber
Directory Number:Public Land Mobile Network and Standalone Non-
Public Network Identifier (PLMN_SNPN)Globally Unique Temporary
IdentifierUE Radio Capability Identifier (UE_RADIO_CAPABILITY_ID)IMSI
Software Version (IMEISV)Subscription Permanent Identifier (SUPI)

Answer 12Choose...Radio Network Temporary Identifier


(RNTI)Permanent Equipment Identifier (PEI)International Mobile
Equipment Identity (IMEI)Globally Unique AMF Identifier
Identifies the network, (GUAMI)Subscription Concealed IdentifierServing Temporary Mobile
whether it's public (PLMN) Subscriber Identity (S-TMSI)Mobile Station International Subscriber
or private (SNPN). Directory Number:Public Land Mobile Network and Standalone Non-
Public Network Identifier (PLMN_SNPN)Globally Unique Temporary
IdentifierUE Radio Capability Identifier (UE_RADIO_CAPABILITY_ID)IMSI
Software Version (IMEISV)Subscription Permanent Identifier (SUPI)

Feedback

Your answer is correct.

The correct answer is:

A long-term, privacy-sensitive identifier for a user, similar to IMSI in 4G. → Subscription Permanent
Identifier (SUPI),

An encrypted form of SUPI, ensuring privacy when transmitted over the air. → Subscription
Concealed Identifier,

A temporary identifier used to anonymize users and provide privacy. → Globally Unique Temporary
Identifier,

Identifies the AMF (Access and Mobility Management Function) region and the network. → Globally
Unique AMF Identifier (GUAMI),

A temporary identifier used by the network to page or address a UE (User Equipment) for services. →
Serving Temporary Mobile Subscriber Identity (S-TMSI),

Used to identify the user equipment, typically the IMEI (International Mobile Equipment Identity). →
Permanent Equipment Identifier (PEI),

A unique identifier for mobile devices, used to track devices or in theft prevention. → International
Mobile Equipment Identity (IMEI),

Adds the software version to the IMSI, enhancing device identification in networks. → IMSI Software
Version (IMEISV),

The phone number assigned to a mobile device, used for voice services and billing. → Mobile Station
International Subscriber Directory Number:,

Assigned to a UE for radio communications in 5G, ensuring temporary user anonymity. → Radio
Network Temporary Identifier (RNTI),

Identifies the radio capabilities of a UE for better resource management in the network. → UE Radio
Capability Identifier (UE_RADIO_CAPABILITY_ID),
Identifies the network, whether it's public (PLMN) or private (SNPN). → Public Land Mobile Network
and Standalone Non-Public Network Identifier (PLMN_SNPN)

You might also like