5G for the Connected World
Buy Rights Online Buy Rights

Rights Contact Login For More Details

  • Wiley

More About This Title 5G for the Connected World

English

Comprehensive Handbook Demystifies 5G for Technical and Business Professionals in Mobile Telecommunication Fields 

Much is being said regarding the possibilities and capabilities of the emerging 5G technology, as the evolution towards 5G promises to transform entire industries and many aspects of our society. 5G for the Connected World offers a comprehensive technical overview that telecommunication professionals need to understand and take advantage of these developments.

The book offers a wide-ranging coverage of the technical aspects of 5G (with special consideration of the 3GPP Release 15 content), how it enables new services and how it differs from LTE. This includes information on potential use cases, aspects of radio and core networks, spectrum considerations and the services primarily driving 5G development and deployment. 

The text also looks at 5G in relation to the Internet of Things, machine to machine communication and technical enablers such as LTE-M, NB-IoT and EC-GSM. Additional chapters discuss new business models for telecommunication service providers and vertical industries as a result of introducing 5G and strategies for staying ahead of the curve. Other topics include: 

  • Key features of the new 5G radio such as descriptions of new waveforms, massive MIMO and beamforming technologies as well as spectrum considerations for 5G radio regarding all possible bands
  • Drivers, motivations and overview of the new 5G system – especially RAN architecture and technology enablers (e.g. service-based architecture, compute-storage split and network exposure) for native cloud deployments
  • Mobile edge computing, Non-3GPP access, Fixed-Mobile Convergence
  • Detailed overview of mobility management, session management and Quality of Service frameworks
  • 5G security vision and architecture
  • Ultra-low latency and high reliability use cases and enablers, challenges and requirements (e.g. remote control, industrial automation, public safety and V2X communication)
  • An outline of the requirements and challenges imposed by massive numbers of devices connected to cellular networks

While some familiarity with the basics of 3GPP networks is helpful, 5G for the Connected World is intended for a variety of readers. It will prove a useful guide for telecommunication professionals, standardization experts, network operators, application developers and business analysts (or students working in these fields) as well as infrastructure and device vendors looking to develop and integrate 5G into their products, and to deploy 5G radio and core networks.

English

DEVAKI CHANDRAMOULI is Head of North American Standardization at Nokia. She leads the 5G System Architecture specification in 3GPP SA2. She holds an M.S. in Computer Science from the University of Texas at Arlington, USA.

RAINER LIEBHART is Head of 5G Solution Architecture in Mobile Networks Global Product Sales at Nokia. He holds an M.S. in Mathematics from the Ludwig-Maximilians University in Munich, Germany.

JUHO PIRSKANEN is a Standardization and Alliance Expert at Wirepas located in Tampere, Finland. He holds an M.S. in Engineering from Tampere University of Technology, Finland.

English

Foreword

About the Editors

Preface

Acknowledgements

Introduction

Terminology

1 Drivers and Motivation for 5G

Betsy Covell, Rainer Liebhart

1.1 Drivers for 5G

1.2 ITU-R and IMT 2020 Vision

1.3 NGMN

1.4 5GPPP

1.5 Requirements for support of known and new Services

1.5.1 Massive IoT

1.5.2 Time Critical Communication

1.5.3 Enhanced Mobile Broadband

1.5.4 Enhanced Vehicular Communications

1.5.5 Network Operations

1.6 5G Use Cases

1.6.1 5G to the Home

1.6.2 In-Vehicle Infotainment

1.6.3 Hot Spots

1.6.4 Truck Platooning

1.6.5 Connected Health Care

1.6.6 Industry 4.0

1.6.7 Megacities

1.7 Business Models

1.7.1 Asset Provider Role

1.7.2 Connectivity Provider Role

1.7.3 Partner Service Provider Role

1.8 Deployment Strategies

1.9 3GPP Role and Timelines

1.10 References

2 Wireless Spectrum for 5G

Juho Pirskanen, Karri Ranta-aho, Rauno Ruismäki and Mikko Uusitalo

2.1 Current Spectrum for Mobile Communication

2.2 Spectrum Considerations for 5G

2.3 Identified New Spectrum

2.4 Spectrum Regulations

2.4.1 Licensed Spectrum

2.4.2 License-exempt Spectrum

2.4.3 New Regulatory Approaches

2.5 Characteristics of Spectrum available for 5G

2.5.1 Pathloss

2.5.2 Multipath Propagation

2.6 NR Bands defined by 3GPP

2.7 References

3 Radio Access Technology

Sami Hakola, Toni Levanen, Juho Pirskanen, Karri Ranta-aho, Samuli Turtinen, Fred Vook

3.1 Evolution towards 5G

3.1.1 Introduction

3.1.2 Pre-Standard Solutions

3.2 Basic Building Blocks

3.2.1 Waveforms for Downlink and Uplink

3.2.2 Multiple Access

3.2.3 5G Numerology and Frame Structures

3.2.4 Bandwidth and Carrier Aggregation

3.2.5 Massive MIMO

3.2.6 Channel Coding

3.2.6.1 Channel Coding for User Plane Data

3.2.6.2 Channel Coding for Physical Control Channels

3.3 Downlink Physical Layer

3.3.1 Synchronization and Cell Detection

3.3.1.1 Primary Synchronization Signal (PSS)

3.3.1.2 Secondary Synchronization Signal (SSS)

3.3.1.3 Physical Broadcast Channel (PBCH)

3.3.1.4 SS Block Burst Set

3.3.2 System Information Broadcast (SIB)

3.3.2.1 Remaining Minimum System Information (RMSI)

3.3.2.2 Other System Information

3.3.3 Downlink Data Transmission

3.4 Uplink Physical Layer

3.4.1 Random Access

3.4.1.1 Long Sequence

3.4.1.2 Short Sequence

3.4.2 Uplink Data Transmission

3.4.3 Contention Based Access

3.5 Radio Protocols

3.5.1 Overall Radio Protocol Architecture

3.5.2 Medium Access Control (MAC)

3.5.2.1 Logical Channels and Transport Channels

3.5.2.2 MAC PDU Structures for Efficient Processing

3.5.2.3 Procedures to support UL Scheduling

3.5.2.4 Discontinuous Reception and Transmission

3.5.2.5 Random Access Procedure

3.5.2.6 Beam Failure Management

3.5.3 Radio Link Control (RLC)

3.5.3.1 Segmentation

3.5.3.2 Error Correction through ARQ

3.5.3.3 Reduced RLC Functions for Efficient Processing

3.5.4 Packet Data Convergence Protocol (PDCP)

3.5.4.1 Reordering

3.5.4.2 Security

3.5.4.3 Header Compression

3.5.4.4 Duplication

3.5.5 Service Data Adaptation Protocol (SDAP)

3.5.5.1 Mapping of QoS Flows to Data Radio Bearer

3.5.5.2 QoS Flow remapping between Data Radio Bearer

3.5.6 Radio Resource Control (RRC)

3.6 Mobile Broadband

3.6.1 Introduction

3.6.2 Indoor Solutions

3.6.3 Outdoor-Urban Areas

3.7 References

4 Next Generation Network Architecture

Devaki Chandramouli, Subramanya Chandrashekar, Andreas Maeder, Tuomas Niemela, Thomas Theimer, Laurent Thiebaut

4.1 Drivers and Motivation for a New Architecture

4.1.1 New Services Emerging

4.1.2 Targets for the New Architecture

4.1.3 Shortcomings of the Current Architecture

4.2 Architecture Requirements and Principles

4.2.1 Overview

4.2.2 Architecture Domains

4.2.3 Flexible Connectivity Models

4.2.4 Service Based Architecture

4.2.5 Unified Policy Framework

4.2.6 Programmable Network

4.2.7 Cloud-native Network Functions

4.2.8 Architectures for different Spectrum Options

4.2.9 RAN Architecture Principles

4.2.10 Interworking Principles

4.3 5G System Architecture

4.3.1 5G System Architecture Reference Model

4.3.2 Functional Description

4.3.2.1 Access and Mobility Management Function (AMF)

4.3.2.2 Session Management Function (SMF)

4.3.2.3 Policy Control Function (PCF)

4.3.2.4 Unified Data Management (UDM)

4.3.2.5 Authentication Server Function (AUSF)

4.3.2.6 Unified Data Repository (UDR)

4.3.2.7 Unstructured Data Storage Function (UDSF)

4.3.2.8 Network Repository Function (NRF) and Network Slice Selection Function (NSSF)

4.3.2.9 Network Exposure Function (NEF)

4.3.2.10 Security Edge Protection Proxy (SEPP)

4.3.2.11 User Plane Function (UPF)

4.3.2.12 Application Function (AF)

4.4 NG RAN Architecture

4.4.1 Principles and Objectives

4.4.2 Overall NG-RAN Architecture

4.4.3 Logical NG-RAN Split

4.4.4 Lower-Layer Split

4.4.5 Service-Aware Function Placement

4.4.6 Connectivity to Multiple RAT

4.5 Non-Standalone and Standalone Deployment Options

4.5.1 Architecture Options

4.5.2 Non-Standalone Architecture with EPS

4.6 Identifiers

4.6.1 Overview

4.6.2 Subscription Permanent Identifier

4.6.3 Subscription Concealed Identifier

4.6.4 Temporary Identifier

4.7 Network Slicing

4.7.1 Introduction and Definition

4.7.2 Isolation Properties

4.7.3 Slicing Architecture

4.7.4 Slice Selection

4.7.5 Interworking with EPS (e)DECOR

4.8 Multi-Access Edge Computing

4.9 Data Storage Architecture

4.9.1 Introduction

4.9.2 Compute-Storage Split

4.9.3 What is “stateless”? How “stateless” is “stateless”?

4.9.4 AMF Resiliency and State-efficient AMF

4.10 Network Capability Exposure

4.10.1 Introduction

4.10.2 Bulk Subscription

4.10.3 NEF Capabilities

4.11 Interworking and Migration with EPS

4.11.1 Background

4.11.2 Migration from EPS towards 5GS

4.11.3 System level Interworking with EPS

4.11.4 Interworking between EPC and 5GC using N26

4.11.5 Interworking between EPC and 5GC without N26

4.12 Support for Non-3GPP Access

4.12.1 Introduction

4.12.2 Interworking with EPC in case of Non-3GPP Access

4.12.3 Multi-access PDU Sessions

4.13 Fixed Mobile Convergence

4.14 Network Function Service Framework

4.14.1 Principles of a Service Framework

4.14.2 What is an NF Service?

4.14.3 Consumer/Producer Interactions

4.14.4 Network Function Service Authorization

4.14.5 Network Function Registration and De-registration

4.14.6 Network Function Discovery

4.14.7 Network Function Services

4.14.7.1 AMF Services

4.14.7.2 SMF Services

4.14.7.3 UDM Services

4.14.7.4 NRF Services

4.15 Support for IMS Services

4.15.1 Overview

4.15.2 Support for System/EPS Fallback for Voice

4.15.3 Support for RAT/E-UTRA Fallback for Voice

4.16 Emergency Services

4.16.1 Overview

4.16.2 Support for Emergency Services Fallback

4.17 Location Services

4.18 Support for Short Message Service

4.18.1 Overview

4.18.2 SMS over NAS

4.19 Public Warning System

4.20 5G System Protocol Stacks

4.20.1 Control Plane Protocol Stacks

4.20.2 User Plane Protocol Stacks

4.21 Charging

4.22 Summary and Outlook of 5G System Features

4.23 Terminology and Definitions

4.24 References

5 Access Control and Mobility Management

Devaki Chandramouli, Subramanya Chandrashekar, Jarmo Makinen, Mikko Säily, Sung Hwan Won

5.1 General Principles

5.1.1 Mobility Management Objectives

5.1.2 Mobility Requirements for the 5G System

5.1.3 Mobility Support in the 5G System

5.2 Mobility States and Functionalities

5.2.1 NAS State Machine and State Transitions

5.2.2 RRC State Machine and State Transitions

5.2.3 Inter-RAT Operation of RRC States

5.2.4 Benefits of the new RRC State Model

5.3 Initial Access and Registration

5.4 Connected Mode Mobility

5.4.1 NSA Mobility Scenarios

5.4.2 Standalone (SA) Mobility Scenarios

5.4.3 Conditional Handover

5.5 Idle Mode Mobility and UE Reachability

5.5.1 Overview

5.5.2 Mobility Registration and Periodic Registration

5.5.3 Network Initiated Paging

5.6 RRC Inactive State Mobility and UE Reachability

5.6.1 Overview

5.6.2 Cell Selection and Reselection

5.6.3 Paging and Notification from RAN

5.6.4 RAN Notification Area

5.6.5 RRC Inactivation

5.6.6 RRC Activation

5.7 Beam Level Mobility

5.7.1 Overview

5.7.2 Beam Management

5.7.3 Beam Level and Cell Level Mobility

5.8 Support for High Speed Mobility

5.8.1 Overview

5.8.2 Enablers for High Speed Mobility

5.9 Support for Ultra Low Latency and Reliable Mobility

5.9.1 URLLC Requirements

5.9.2 The Challenges of URLLC Mobility

5.9.3 Multi-Connectivity as a Solution for URLLC Mobility

5.10 UE Mobility Restrictions and Special Modes

5.10.1 Mobility Restrictions

5.10.2 MICO Mode

5.11 Inter-System (5GS-EPS) Mobility

5.11.1  Inter-System Change in Single Registration Mode

5.11.2  Inter-System Change in Dual Registration Mode

5.12 Outlook

5.13 References

6 Sessions, User Plane and QoS Management

Devaki Chandramouli, Thomas Theimer, Laurent Thiebaut

6.1 Introduction

6.2 Basic Principles of PDU Sessions

6.2.1 What is a PDU Session?

6.2.2 Multiple Concurrent Access to the same Data Network

6.2.3 Support of SSC (Session and Service Continuity) Modes

6.2.4 Support of PDU Sessions available/authorized only in some Location (LADN)

6.2.5 Data Network Authentication and Authorization of PDU Sessions

6.2.6 Allocation of IPv4 Address and IPv6 Prefix for PDU Sessions

6.2.7 Support of PDU Sessions when Roaming

6.2.8 Summary of the UPF Topology Options

6.3 Ultra-Reliable Low Latency Communication

6.4 QoS Management in 5GS

6.4.1 What is a QoS Flow?

6.4.2 QoS Parameters handled in 5G System

6.4.3 Reflective QoS

6.4.4 QoS Enforcement and Rate Limitation

6.4.5 QoS Control within 5GS

6.4.6 Delay Critical GBR QoS Flows and their Characteristics

6.4.7 Packet Filter Set

6.5 User Plane Transport

6.6 Policy Control and Application Impact on Traffic Routing

6.6.1 Overview

6.6.2 Application Impact on UP traffic routing

6.6.3 PCF Policies Targeting a PDU Session

6.6.4 PCF Policies Targeting a Service Data Flow

6.7 Session Management

6.7.1 Overview

6.7.2 PDU Session Establishment

6.7.3 UPF Selection

6.8 SMF Programming UPF Capabilities

6.9 References

7 Security

Peter Schneider

7.1 Drivers, Requirements and High-Level Security Vision

7.1.1 5G Security Drivers

7.1.2 5G Security Requirements

7.1.3 5G Security Vision

7.1.3.1 Supreme built-in security

7.1.3.2 Flexible security mechanisms

7.1.3.3 Security automation

7.2 Overall 5G Security Architecture

7.2.1 Security between mobile devices and the network

7.2.2 Security in the Telco Cloud

7.3 3GPP specific Security Mechanisms

7.3.1 Security between UE and Network

7.3.1.1 EAP-based Authentication

7.3.1.2 5G AKA

7.3.1.3 Access Stratum (AS) Security

7.3.1.4 Key Hierarchy and Crypto Algorithms

7.3.1.5 Security for untrusted Non-3GPP access

7.3.1.6 Security for Non-Standalone Architecture with EPS (EN-DC)

7.3.1.7 Subscription Identifier Privacy

7.3.1.8 Usage of the UICC

7.3.1.9 Secondary Authentication

7.3.2 Security for Network Interfaces

7.3.2.1 Non-Service-Based Interfaces

7.3.2.2 Service-Based Interfaces

7.3.2.3 Interconnection Security

7.3.3 Summary and Outlook

7.4 SDN Security

7.5 NFV Security

7.6 Network Slicing Security

7.6.1 Isolation

7.6.2 Enhanced Slice Isolation Infrastructure

7.6.2.1 Over-the-Top Security

7.6.3 Other Aspects

7.7 Private Network Infrastructure

7.8 References

8 Critical Machine Type Communication

Zexian Li, Rainer Liebhart

8.1 Introduction

8.1.1 Industrial Automation

8.1.2 V2X

8.1.3 Public Safety

8.2 Key Performance Indicators

8.3 Solutions

8.3.1 System Design Challenges

8.3.2 Low Latency

8.3.3 High Reliability and Availability

8.4 References

9 Massive Machine Type Communication and the Internet of Things

Devaki Chandramouli, Betsy Covell, Volker Held, Hannu Hietalahti, Jürgen Hofmann, Rapeepat Ratasuk

9.1 Massive M2M versus IoT

9.2 Requirements and Challenges

9.2.1 Long Battery Life

9.2.2 Mobility Patterns

9.2.3 Bursty Data

9.2.4 Bulk Device Management

9.2.5 Flexible Subscription Management

9.2.6 Security

9.2.7 Others

9.3 Technology Evolution

9.4 EPS Architecture Evolution

9.4.1 MTC Architecture

9.4.2 Identifiers

9.4.3 Addressing

9.4.4 Device Triggering

9.4.5 PS-only Service Provision

9.4.6 Dual Priority Devices

9.4.7 Extended Access Barring

9.4.8 Short Message Service in MME

9.5 Cellular Internet of Things

9.5.1 General

9.5.2 CIoT EPS Optimisations

9.5.3 Attach without PDN Connection

9.5.4 UE requested and Network supported CIoT Capabilities

9.5.5 Selection of Control or User Plane

9.5.6 Control Plane CIoT EPS Optimisations

9.5.7 User Plane CIoT EPS Optimisation

9.5.8 Non-IP PDN Connection

9.5.9 SMS Transport

9.5.10 Rel-14 CIoT Extensions

9.5.11 Northbound API for SCEF (NAPS)

9.6 GERAN

9.6.1 Introduction

9.6.2 Objectives

9.6.3 Feature Design Overview

9.6.4 Logical Channel Design

9.6.5 Coverage Class Concept

9.6.6 Overlaid CDMA

9.6.7 MS Support Level for EC-GSM-IoT

9.6.8 Operation in Idle Mode

9.6.9 Operation in Connected Mode

9.6.10 Location Services

9.6.11 Core Network Support

9.6.12 Security Enhancements

9.6.13 Operation in Reduced Spectrum Allocation

9.6.14 Rel-14 Enhancements

9.6.15 Rel-15 Enhancements

9.7 LTE-M

9.8 NB-IoT

9.8.1 Introduction

9.8.1.1 Downlink

9.8.1.2 Uplink

9.8.2 Coverage

9.8.3 Capacity

9.8.4 Extended Battery Life

9.8.5 Rel-14 NB-IoT Enhancements

9.9 5G for M2M

9.9.1 Requirements

9.9.2 Challenges

9.9.3 Architecture Enablers

9.9.3.1 General

9.9.3.2 Mobile Initiated Communication Only (MICO)

9.9.3.3 RRC Inactive

9.9.3.4 Idle Mode DRX and High Latency Communication

9.10 Comparison of EPS and 5GS

9.10.1 Goals of MTC and IoT Optimisations

9.10.2 UE Simplicity and Power Saving

9.10.3 Connectionless Registration

9.10.4 Small and Infrequent Data

9.11 Future Enhancements

9.11.1 General Rel-16 IoT Aspects

9.11.2 Small Data

9.11.3 UE Power Saving and High Latency Communication

9.11.4 Management of Enhanced Coverage

9.11.5 Overload Control for Small Data

9.11.6 Reliable Data Service

9.11.7 Northbound API

9.11.8 Network Parameter Configuration

9.11.9 Monitoring

9.11.10 NB-IoT Inter-RAT Mobility

9.11.11 QoS Support for NB-IoT

9.12 Other Technologies

9.13 References

10 Summary and Outlook

Rainer Liebhart, Devaki Chandramouli

10.1 Summary

10.2 Outlook

11 Appendix of 3GPP Reference Points

loading