Core Engineering
Core Engineering
Network Engineering
About the course
This comprehensive course provides a deep dive into the
fundamental principles and technologies that underpin modern
core networks. Participants will gain a strong understanding of
network architecture, protocols, and technologies used to
interconnect various network elements, ensuring efficient and
reliable data transmission across large-scale networks.
Course Objective
• The objective of this course is to:
• Understand the core network structure in 4G and 5G networks.
• Familiarize with core network components and their roles.
• Explore how user sessions, data routing, and mobility management are
handled in core networks.
• Understand the key protocols used in core networks.
• Explore the security and QoS mechanisms in core networks.
Course Schedule
Topic Name Day
• Introduction to core network elements in 4G: MME, SGW, PGW, and HSS 2
• Function and purpose of each network element
• Transition from 4G elements to 5G components
• Introduction to 5G’s SBA elements such as AMF, SMF, UPF, and NRF
• Flat architecture
S3
S6a
S4
X2
eNodeB S1-MME
Uu
Gx
S11
eNodeB
S1-U S5 / S8
SGi
Combined into SAE -
GW PDN
LTE Core Network (EPC and IMS)
PDN Connectivity Services
E-UTRAN
EPC
Additional Network Elements
PS Interworking
CS Interworking
Non 3GPP Access Interworking
LTE User Services
Transport Network Hierarchy
AG3 AG3 A pair of AG3 routers per site
AG1 AG1
Up to 10 AG1 rings
Up to 4 AG1 routers in a ring
AG1 AG1
eNB CSR Dual-homed ring with AG2 routers
CSR
CSR CSR Up to 4 CSR rings
eNB Up to 5 (fiber) or 4 (MW or fiber + MV)
AG2 node
eNB eNBs per ring
CSR and eNB
eNB Dual-homed with AG1 routers
Introduction to Router
Router: a network-layer device that forwards data packets on the Internet. Based on the destination
address in a received packet, a router selects a path to send the packet to the next router or destination.
The last router on the path is responsible for sending the packet to the destination host.
Implementing communication between networks of
the same type or different types
Isolating broadcast domains
Router
Maintaining the routing table and running
routing protocols
Selecting routes and forwarding IP packets
Implementing WAN access and network
address translation
Connecting Layer 2 networks established through switches
5G Advanced Communication
4G and 5G Core
3GPP 5GC (the only specification for a 5G
mobile packet core)
3GPP’s 5G System architecture is defined to support data connectivity and services enabling deployments to
use techniques such as e.g. Network Function Virtualization and Software Defined Networking. The 5G System
architecture shall leverage service- based interactions between Control Plane (CP) Network Functions where
identified. Some key principles and concept are to:
Separate the User Plane (UP) functions from the Control Plane (CP) functions, allowing independent scalability,
evolution and flexible deployments e.g. centralized location or distributed (remote) location.
Modularize the function design, e.g. to enable flexible and efficient network slicing.
Wherever applicable, define procedures (i.e. the set of interactions between network functions) as services, so
that their re-use is possible.
Enable each Network Function and its Network Function Services to interact with other NF and its Network
Function Services directly or indirectly via a Service Communication Proxy if required. The architecture does not
preclude the use of another intermediate function to help route Control Plane messages (e.g. like a DRA).
Minimize dependencies between the Access Network (AN) and the Core Network (CN). The architecture is defined
with a converged core network with a common AN – CN interface which integrates different Access Types e.g.
3GPP access and non-3GPP access.
Support a unified authentication framework.
3GPP 5GC (the only specification for a 5G
mobile packet core)
Support “stateless” NFs, where the “compute” resource is decoupled from the “storage” resource.
Support capability exposure.
Support concurrent access to local and centralized services. To support low latency services and access to
local data networks, UP functions can be deployed close to the Access Network.
Support roaming with both Home routed traffic as well as Local breakout traffic in the visited PLMN.
The 5G architecture is defined as service-based and the interaction between network functions is represented in
the following two ways:
A service-based representation(SBA), where network functions (e.g. AMF) within the Control Plane enables other
authorized network functions to access their services. This representation also includes point-to-point reference
points where necessary.
A reference point representation, shows the interaction exist between the NF services in the network functions
described by point-to-point reference point (e.g. N11) between any two network functions (e.g. AMF and SMF).
3GPP 5G Core Network Standard
Feature Category Detailed Function
■ Service based architecture with service-based interfaces
Architectural enablers for ■ Data Storage architecture enabling Compute and Storage separation
Network
virtualized deployment ■ Support for AMF resiliency (e.g., AMF change with no service disruption)
Architecture
The 5G NSA core network can be 2 or 3 in the figure below. In case of KT, it corresponds to 3. SK
Telecom and LG U+ correspond to 2.
Functional blocks within 5G Core Network
Architecture
AUSF = Authentication Server Function UE = User Equipment
AMF = Core Access and Mobility Management Function UPF = User Plane Function
SMF = Session Management Function DN = Data Network, e.g. operator services, Internet or 3rd party
services
PCF = Policy Control Function
AF = Application Function
NR Reference Point System Architecture
AMF : - Core Access and Mobility Management Function
UPF : - User plane Function
SMF : - Session Management Control Function . DN : - Data
Network (DN)
NSSF : - Network Slice Selection Function.
■ Connecting to the Internet POP (Point of Presence). The UPF may optionally integrate the Firewall and Network Address Translation
(NAT) functions.
■ Mobility anchor for Intra RAT and Inter-RAT handovers Lawful intercept Maintains and reports traffic statistics
20
5G with CUPS
Reconfiguring LTE network functions. Support for native CUPS.
Virtualized NFs on commodity hardware based architecture.
Distributed UPFs to edge to reduce latency and backhaul traffic.
Enabling standard – based MEC by supporting routing to local UPFs located at edge sites.
CUPS extended to RAN
Enabling E2E network slicing by supporting independent parts for each service.
NG RAN N4
5GC
NR Uu
Data Network
N3 (e.g. operator or
N6 Internet)
gNB UPF
NR UE
R D C
U U U GW-U
5G Functions Synthesis
5GC (5G Core)
Functions: Authentication Security, Session management and aggregation of traffic from end devices. Use NFV
as an integral design concept with virtualized software functions in the network.
EAP authentication server functionality and acts as storage for keys and provides keying material to the
requester NF.
Responsible for termination of NAS signaling, NAS ciphering & integrity protection, registration management,
connection management, mobility management, access authentication and authorization, security context
management.
AMF also includes the Network Slice Selection Function (NSSF) and acts as the termination point for RAN CP
interfaces (N2).
It carries out session management (session establishment, modification and release), UE IP address allocation
& management, DHCP functions, termination of NAS signalling related to session management, DL data
notification and traffic steering configuration for UPF for proper traffic routing.
5GC Network Functions
User Plane Function (UPF):
Carries out packet routing & forwarding, packet inspection, QoS handling, acts as external PDU session point of
interconnect to Data Network (DN), and is an anchor point for intra- & inter-RAT mobility. 7
Supports exposure of capabilities and events, secure provision of information from external application to 3GPP
network and translation of internal/external information. It acts as an API gateway that allows external users,
such as enterprises or partner operators, the ability to monitor, provision and enforce application policy, for
users inside the operator network. Thus, it
a) Provides security when services or Application Functions (AF) access 5G Core nodes.
b) Acts as a proxy, or API aggregation point, or translator into the Core Network.
5GC Network Functions
NF Repository Function (NRF):
Discovers network function instances. When it receives an NF discovery request from a NF instance, it provides
the discovered NF instances.
Maintains/supports:
a) Profiles of Network Function (NF) instances and their supported services within the network. (Function ID,
function type, network slice identifiers, capacity information, supported services, and endpoint information such as
IP addresses)
Control-plane functions communicate with one another, via the NRF, over service-based interfaces. These are self-
contained software modules that are reusable independently of each other and can be thought of as micro
services. The network function is either a producer or consumer of services.
Network Functions
Policy Control Function (PCF):
Carries out unified policy framework, providing policy rules to CP functions, access subscription information for
policy decisions in UDR. This provides a policy framework incorporating network slicing, roaming and mobility
management.
Stores subscriber data and profiles and carries out generation of Authentication and Key Agreement (AKA)
credentials, user identification handling, access authorization, subscription management.
Resembles an application server that can interact with the other control-plane NFs. AFs can exist for different
application services, and can be owned by the network operator or by trusted third parties.
Service Based Architecture
5G Core Architecture SA vs NSA Architecture
The 5G Core Network has been designed around services that are invoked using a standard
API.
Mechanisms:
Request-Response -> In this, communication
is one-to-one between two NFs (consumer
and producer) and a one-time response within
a certain timeframe
UE (R)AN N3 UPF N6 DN
Uu Data Network (DN) -
NG- operator services,
UE gNB N9 Internet access
U
User Plane Function
(UPF)
Day 2 – Agenda
• Introduction to core network elements in 4G: MME, SGW,
PGW, and HSS
AMF UDM
AMF PCF
AMF
•A single (virtualized) AMF that can scale in/scale out AMF Region
without signaling towards RAN/UE.
AMF Set-1 AMF Set-2
MCC MNC AMF Region ID AMF Set ID AMF Pointer Data Storage
Subscriber Identifiers
•Each subscriber in the 5G System shall be allocated one 5G Subscription Permanent Identifier (SUPI) for use
SUPI within the 3GPP system
SUCI •The Subscription Concealed Identifier (SUCI) is a privacy preserving identifier containing the concealed SUPI
For interworking with the EPC, the SUPI allocated to the 3GPP UE shall always be based on an IMSI to enable the UE to present an
IMSI to the EPC.
The subscription identifier SUPI, contains sensitive subscriber as well as subscription information thus it should not be transferred in
clear text. The SUbscription Concealed Identifier, called SUCI, is a privacy preserving identifier containing the concealed SUPI.
SUPI de-concealment
Subscription Permanent Identifier (SUPI) Subscription Concealed Identifier (SUCI)
ARPF/UD
M MCC MNC Decrypted MSIN MCC MNC Encrypted MSIN
Subscriber Identifiers
GUAMI 5G-TMSI
The 5G-TMSI is generated by the AMF during
the generation of the subscriber’s 5G-GUTI.
The 5G-TMSI uniquely identifies the UE within
Globally Unique AMF ID (GUAMI) identifies one or more AMF(s) the AMF, across all allocated 5G-GUTIs
MCC MNC AMF Region ID AMF Set ID AMF Pointer
•is the shortened form of the GUTI to enable more efficient radio signaling procedures (e.g. during Paging and
5G-S-TMSI Service Request)
Session and Mobility Management in 5G
Session Management Function (SMF) -> Substitute of SGW-C &
PGW-C
The SMF performs the session management functions that are handled by
the 4G MME, SGW-C, and PGW-C
Npcf_SMPolicyControl
managing the Policy and Charging Control (PCC) rules that govern
service data flows in the user plane and the session rules that
govern individual PDU sessions.
PCC rules control data flow detection, gating, QoS, traffic steering,
flow-based charging and usage reporting. Session rules, however,
control AMBR, default QoS, and usage and condition data
Session and Mobility Management in 5G
User plane function (UPF) -> Substitute of SGW-U & PGW-U
The UPF is essentially a fusion of the data plane parts of the SGW and PGW. In the context of the
CUPS architecture:
•EPC SGW-U + EPC PGW-U → 5G UPF
The SMF selects a new UPF and using N4 configures the UPF as a new PDU Session
Anchor of the multi-homed PDU Session. In the process, a new IPv6 prefix (IP@2) is
allocated for the PDU Session.
In the Downlink, the UPF uses policy from the PCF and the SMF to identify flows and
adds a QFI tag to downlink packets. Then, the RAN uses the QFI tag and policy to
map flows to Data Radio Bearers (DRBs).
PDU (packet data unit) Session may be associated with multiple IPv6 prefixes
Session and Mobility Management in 5G
Policy Control Function (PCF)
Application Layer
Session Layer
Transmission 0 1 1 0 0 1 0 1 0 1 ...
Media
Internet Protocol
IP is short for the Internet Protocol. IP is the name of a protocol file with small content. It defines
and describes the format of IP packets.
The frequently mentioned IP refers to any content related directly or indirectly to the Internet
Protocol, instead of the Internet Protocol itself.
Function Version
Header Type of
Version Total Length
Length Service
Identification Flags Fragment Offset
Fixed size:
20 bytes TTL Protocol Header Checksum
Source IP Address
Destination IP Address
Optional size:
Options Padding
0–40 bytes
What Is an IP Address?
An IP address identifies a node (or an interface on a network device) on a network.
IP addresses are used to forward IP packets on the network.
IP Address
IP 1 IP 5 An IP address identifies a
IP 4
node on a network and is
IP 2
used to find the destination
IP 3 for data.
Data
IP address Notation
An IPv4 address is 32 bits long.
It is in dotted decimal notation.
27 26 25 24 23 22 21 20
Power
Conversion between 128 64 32 16 8 4 2 1
decimal and binary
systems Bit 1 1 0 0 0 0 0 0
= 128 + 64 = 192
IPv4 address range is 0.0.0.0–255.255.255.255.
IP address Notation
An IPv4 address is 32 bits long.
It is in dotted decimal notation.
27 26 25 24 23 22 21 20
Power
Conversion between 128 64 32 16 8 4 2 1
decimal and binary
systems Bit 1 1 0 0 0 0 0 0
= 128 + 64 = 192
IPv4 address range is 0.0.0.0–255.255.255.255.
IP Addressing
Network part (network ID): identifies a network.
Host part: identifies a host and is used to differentiate hosts on a network.
Network part
10.0.1.0/24 10.0.2.0/24
10.0.1.1/24 10.0.2.1/24
Assigned to
Class B 10NNNNNN NNNNNNNN NNNNNNNN NNNNNNNN 128.0.0.0–191.255.255.255
hosts
IPv4 IPv6
• Address length: 32 bits • Address length: 128 bits
• Address types: unicast address, broadcast • Address types: unicast address, multicast
address, and multicast address address, and anycast address
• Characteristics: • Characteristics:
▫ IPv4 address depletion ▫ Unlimited number of addresses
▫ Inappropriate packet header design ▫ Simplified packet header
▫ ARP dependency-induced flooding ▫ Automatic IPv6 address allocation
▫ ... ▫ ...
Day 4 – Agenda
• Overview of SIP (Session Initiation Protocol) and its role in
VoLTE
Voice over LTE (VoLTE) is expected to become the mainstream solution for providing voice services in commercial LTE
networks in the upcoming years, it integrates voice over IP (VoIP), LTE radio network (i.e., E-UTRAN), LTE core network
(i.e., EPC), and the IMS (IP Multimedia Subsystem) to support voice services.
The SIP (Session Initiation protocol) protocol plays a essential role in VoLTE calls. It is used to create, update and
terminate a VoLTE call. During a VoLTE call, there’re SIP messages resembling those in 2G/3G voice call such as CALL
SETUP, SETUP, ALERTING, CONNECT etc.
SIP messages are transmitted in QCI5, which is a default EPS bearer from UE towards IMS APN, so the SIP Signaling is
actually not in conventional CS(Circuit Switch) domain, but in PS(Packet Switch) domain.
Call Session Control Functions
PCSCF
ICSCF
SCSCF
IM CN Subsystem Entities
IM CN Subsystems Entities Cont..
SIP Signaling and user data flow paths
Internet Multimedia Protocol Stack
IMS NEs
Voice over LTE (VoLTE) service depends on deployment of IMS which is a complex subsystem, and consist of
many new NEs. Some of the typical NEs are listed in the table below.
Bearers for VoLTE
QCI1/QCI2/QCI5 are setup in order to support voice & video call over LTE networks recommended by 3GPP . Each
QCI’s parameters is standardized for different purposes such as priority/PLR etc.
The bellow table lists the relevant QCIs’ Attributes defined by 3GPP
QCI Resource Priority Packet Delay Packet Error Loss QCI purpose
Type Budget Rate
Radio network may setup QCI5&CQI1&QCI2 bearers for VoLTE services. These QCIs have higher priority of scheduling,
Less PLR, lower latency, and so on.
The bellow table shows us the combination of bearers in different scenarios.
Non-VoLTE UE VoLTE UE
Idle Voice call Over LTE Voice & Video call Over LTE
SIP runs on top of IP. The network-layer protocol is IP and the transport-layer protocol is TCP or UDP (recommended).
The bellow figure shows the SIP protocol stack.
SIP Messages
SIP messages are either requests or responses
The access Points that are supported by the GGSN are preconfigured
on the GGSN.
Enterprise
Competition
Information Science
Providing CIA Protection for Information Assets
Confidentiality
Private data should not be disclosed to
unauthorized individuals.
Integrity Availability
Information and procedure cannot
I A Systems should provide
be accessed by intentional or services in time and should not
unintentional unauthorized deny authorized users.
manipulation.
Confidentiality and Leakage Model
Leakage model
Sender Recipient
Eavesdropper
Integrity and Tampering Model
Tampering model
Sender Recipient
Interpolator
Prevent data from accidental modification, destruction, or loss by
unauthorized users.
Availability and Anti-sabotage Model
Anti-sabotage model
Sender Recipient
Attacker
Ensure effectiveness that information and information systems provide
services for authorized users anytime.
What Threatens Information Security?
Risk Confidentiality Integrity Availability
Natural disaster ● ●
Hardware fault ● ● ●
Software defect ● ● ●
Unauthorized access ● ●
DoS ●
Data leakage ● ●
Forging and spoofing ● ●
Wiretapping ●
Computer virus ● ●
Trojan horse ● ●
Backdoor and trap ● ● ●
Electromagnetic radiation ●
Theft ● ● ●
Is Technology Assurance Alone Enough
Management Technical
factors factors
Human factors
To resolve information security issues, we must consider many factors, including personnel and
management, technology and products, work flows and systems.
TCP/IP Protocol Stack - IPv4 Security Risks
Lack of a
confidential
guarantee
mechanism
TCP/IP
(IPv4)
Lack of an Lack of a
integrity data source
verification verification
mechanism mechanism
Common Security Risks of TCP/IP Protocol Stack
Device damage,
interception Physical layer
OSI Security System Structure
OSI TCP/IP
Function
Application layer
layer
Representation layer
Application layer
Session layer
mechanism
Digital signature
Encryption mechanism
mechanism
mechanism
Authentication switching
Routing control
Compatibility mechanism
Notarization mechanism
Access control
Data integrity
Data
confidentiality
Non-
repudiation
Information Security Technology - Network Security
Network security
Network
protocol Network security device Network architecture security
security
switching devices
Network security
Security of route
interconnection
Network egress
security system
access control
configuration
Open system
VLAN design
address and
architecture
redundancy
Network IP
Network
Firewal Other network security
policy
zone
IDS
l devices
Firewall Router
Controlling Addressing and forwarding
packet forwarding Ensuring network interconnection
Defending against
attacks, viruses,
and Trojan
Block
Switch
Aggregation for a LAN
Layer-2/3 fast packet
forwarding
Trust
Server area
Manager Untrust
Marketing Firewall
department
Research Manufacture
DMZ
1 How to
Trust indicate the 4 Untrust
2 firewall itself?
Firewall
Firewall
Enterprise
× intranet
PC
• DDoS attack
• Scanning and sniffing attacks
• Malformed-packet attack
• Special-packet attack Web server
Attacker
Jump-off
Attacker
point
Attack target
Control traffic
Botnet
Attack traffic
Zombie host
DDoS attackers control zombie hosts to send a large number of attack packets to targets.
According to attack modes, DDoS attacks can be classified into traffic attacks (SYN Flood
and UDP Flood) and application-layer attacks (HTTP Flood, HTTPS Flood, and DNS Flood).
NGFWs can defend against common DDoS attacks, such as SYN Flood and UDP Flood.
PCC
Information Storage
LTE & 5G Bearer architecture
LTE Bearer Service 5G Bearer Service Architecture
Architecture
UE eNB S-GW P-GW Peer UE gNB UPF DN
Entity
E2E Service E2E Service
External External
EPS Bearer with QCI PDU Session with QoS Flow
Bearer Bearer
S5/S8
E-RAB
Bearer
Uu S1 S5/S8 Gi Uu N3 N6
LTE Bearers • EPS Bearer
• Logical pipe between UE and P-GW
• Associated with a set of QoS parameters
• PDN Connection
• IP session between UE and the PDN
• EPS bearers in a PDN connection have
IP / PDN Connection the same IP
PDN
EPS Bearer
UE
EPC
Types of EPS Bearers
Default Bearer
Dedicated Bearer
UE
• Additional EPS bearer that
Dedicated may be activated based on
EPC demand
bearer
• Can be GBR or non-GBR
Service Data Flow (SDF)
SDF1 IP Flow 1
• An SDF corresponds to a QoS / policy
Filtering
IP Flow 2
IP Flow 3
PDN treatment by the policy function
SDF2
• An EPS Bearer can carry only one SDF
Aggregate
EPC
QoS Levels
• Service Data Flows (SDF’s) defined
Service Level
• QoS and policy applied based on the SDF
Non-GBR
7 7 100 ms 10-3 Voice, Video (Live Streaming), Interactive Gaming
8 8
Video (Buffered Streaming), TCP-based (e.g., www, e-
300 ms 10-6
9 9 mail, chat, ftp, p2p file sharing, progressive video, etc.)
… … … … Operator-specified class
Example of LTE QoS Differentiation
UE eNodeB
QCI & ARP per
bearer
• A Service Data Flow is defined to determine the policy & QoS treatment to be
applied to a service
• A Quality Class Indicator is used to define different QoS types and priorities
QoS QFI-A
Flows
QFI-B
EPC QoS Model
UE (R)AN UPF
SDAP SDAP
PDCP PDCP
RLC RLC
UPF DN
N6
N3 Slice Specific Network Functions
Shared resources
Dedicated resources
Identification and selection of a Network Slice
Say,
SD = 1 => eMBB generic Network Slice Provider A
SD = 2 => eMBB gaming
• Network Slice Selection Assistance Information MBB Slice
NSSAI: • The NSSAI is a collection of up to 8 S-NSSAIs
NSSAI
S-NSSAI SD# Network Slice Provider B
SST#1
#1 A
S-NSSAI SD#
S-NSSAI: • S-NSSAI : Single Network Slice Selection #2
SST#2
B URLLC Slice
Assistance information S-NSSAI SD#
Single NSSAI • It identifies a Network Slice. #3
SST#2
C Network Slice Provider C
S-NSSAI
• A Slice/Service type (SST), which refers to the #n URLLC Slice
expected Network Slice behavior in terms of
features and services
S-NSSAI • A Slice Differentiator (SD). which is optional
SST SST value Characteristics.
information that complements the Slice/Service
is comprised of: type(s) to allow further differentiation for selecting
a Network Slice from the potentially multiple
eMBB
1
Slice suitable for the handling of 5G
enhanced Mobile Broadband.
Network Slices that all comply with the indicated
Slice/Service type Slice suitable for the handling of ultra-
URLLC 2
reliable low latency communications.
Slice suitable for the handling of
S-NSSAI = Slice/Service type (SST) + Slice Differentiator (SD) MIoT 3
massive IoT.
Slice examples in 5G Core and 5G RAN
N1 ( SST#1, SD#A)
SHARED DEDICATED
SST#1: eMBB Service Slice 5G (R)AN
SST#2: eMTC Service Slice
SD#A: Enterprise A N2
AMF SMF SLICE #1
SD#B: Enterprise B
RRC ( SST#1, SD#A) RR
C N2
PDC N3 Enterprise A
UE 1 NSSAI UPF eMBB
P DNN#A
S- SST# RLC
NSSAI#1 1
SD#A UE 1
MAC Enterprise B
SHARED UPF eMTC
PHY DNN#C
• Allowed NSSAI may include one or more S-NSSAIs. These S-NSSAIs are valid for the current Registration Area provided by
the serving AMF the UE has registered with and can be used simultaneously by the UE.
Allowed NSSAI • UE receives as part of the Initial Access procedure the Allowed NSSAI
• For each PLMN, the UE shall store the Configured NSSAI and, if any, the Allowed NSSAI. When the UE receives an Allowed
NSSAI for a PLMN, it shall store it and override any previously stored Allowed NSSAI for this PLMN.
• Can be either Configured NSSAI (or subset of it), Allowed NSSAI (or subset of it) or a combination of those (or a subset of the
Requested NSSAI combination.
• If an S-NSSAI is marked as default, then the network is expected to serve the UE with the related Network Slice even when
the UE does not send any S-NSSAI to the network in a Registration request.
Default S-NSSAI • At most 8 S-NSSAI can be marked as Default S-NSSAI.
• A single UE may be served by at most 8 Network Slices at a time.
Slice configuration Slice activation in gNB
• Note: If NRBTS.actNetworkSlicing = 1 (TRUE)* and NRBTS.gNbCuType = 1* (value corresponds to Stand Alone mode)
then at least one S-NSSAI instance must be configured.
* NRBTS.actNetworkSlicing parameter is removed in 5G20A therefore, activation of the feature will be based on
NRBTS.gNbCuType (NRBTS.gNbCuType=1 (SA) or NRBTS.gNbCuType=2 (both SA and NSA))
Slice configuration Slice definition in gNB
Slice in gNB can be defined on
the gNB level by setting up the
NSSAI parameters set. One set of
MRBTS/NRBTS/SNSSAI parameters defines one slice
(example on next slides) .
userLabel userLabel =
This parameter denotes a label that can be used for a user-friendly
name of the slice instance. (user friendly name)
Slice configuration Slice in Tracking Area setup
MRBTS/NRBTS/NRCELL/
trackingAreaDN
MRBTS/NRBTS/TRACKINGAREA/ MRBTS/NRBTS/SNSSAI/
snssaiDNList snssaiID = 1
trackingAreaId sst = 1 (eMBB)
fiveGsTac sd = 1
operationalState = 1 (enabled)
administrativeState = 1 (enabled)
userLabel = "factoryA eMBB slice”
S-NSSAI is assigned to TA
One TA can have more than MRBTS/NRBTS/SNSSAI
one slice (up to 20 – snssaiID = 2
limitation on NRBTS)
sst = 128
sd = (not defined)
operationalState = 1 (enabled)
administrativeState = 1 (enabled)
userLabel = "remote surgery”
Slice configuration Slice in Tracking Area setup
Notes:
• On the NRBTS level it is possible to create support of up to 20 slices
identified by S-NSSAI.
Delivering QoS Using RAN Slicing
Service Differentiation
gNB
Each non GBR DRB profile (based on PLMN ID, Slice ID(S-NSSAI) and 5QI
contains operator configurable settings like -> Scheduling weight, used by
scheduler, RLC profile, PDCP profile, DSCP setting, Logical channel priority
Thank You