5G Wireless Technical Overview Training

5G Wireless Technical Overview Training Course with Hands-on Exercises (Online, Onsite and Classroom Live)

This 5G Wireless Technical Overview Training course focuses on the key aspects of the 5G System (5GS), which includes both the 5G Core (5GC) and the 5G Radio Access Network (5G RAN), known as New Radio (5G NR). An emphasis is placed on security throughout this course, concluding with the final section dedicated to the topic of 5G security. Being that this course is three days, it does not delve into the details at the physical (radio link) layer. However, it provides a complete section of the 5G RAN, along with a separate section that follows, which describes the Centralized RAN (C-RAN) architecture. Below are descriptions of what is covered in each section.

Section 1 delves into the meaning of a Service Based Architecture (SBA), and why this is a big departure from all previous generations of mobile cellular technologies and standards.

Section 2 provides an overview of Software Defined Networks (SDN) and Network Function Virtualization (NFV). It describes how SDN and NFV are fundamental to the 5G Core (5GC) network architecture. Section 3 provides a detailed description of 5G Core Network functions. This section also provides an example of Vehicle to Anything (V2X) deployment model. It concludes with an overview of the Security Edge Protection Proxy (SEPP), which provides security between mobile operator roaming partner networks.

Section 3 provides extensive coverage of the 5G Radio Access Network (RAN), referred to as New Radio (NR). Some of the topics include the frequency bands defined for use with 5G NR, how Massive MIMO is being deployed in 5G NR, and duplexing modes & supplementary frequency bands.

Section 4 expands on the previous section’s topic by defining the Centralized-RAN, or C-RAN, for 5G. Since the 5G RAN includes macrocells and small cells, RAN architectures can very significantly, allowing for many different deployment options. This section provides key examples, using ladder diagrams to show the protocol flows used in 5G C-RANs.

Section 5, the final section, introduces the details of 5G security, which was previously introduced as a high-level topic earlier in the course. This section begins with the topic on Private/Public key pairs to demonstrate one of the most significant security procedures for 5G, the protection of the mobile’s IMSI, while attaching to the network. This is followed by a demonstration of the Subscription Concealed Identifier (SUCI) procedure, step-by-step. security algorithms, which many are brought forward from the LTE security architecture. A 5G Security overview is then provided, along with the Authentication and Key Agreement (AKA) procedure. Next, theh5G key hierarchy is shown in detail. The course wraps up with a summary of the security procedures and securing the communication between the access and core networks.

5G Wireless Technical Overview TrainingDuration: 3 days

  • We can adapt this 5G Wireless Technical Overview Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this 5G Wireless Technical Overview Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the 5G Wireless Technical Overview Training Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the 5G Wireless Technical Overview Training course in manner understandable to lay audiences.

The target audience for this 5G Wireless Technical Overview Training course:

  • 5G Training Highlights is aimed at technical, managerial, marketing/sales, and other professionals who require a high-level technical overview of 5G Wireless Systems

The knowledge and skills that a learner must have before attending this 5G Wireless Technical Overview Training course are:

  • 5G Technical Overview Training requires a background in Information Technology or Telecommunications.
5G Wireless Technical Overview Training - OBJECTIVES

Upon completing this 5G Wireless Technical Overview Training course, learners will be able to meet these objectives:

  • Deep Learning ILT introduces you to cloud based
5G Wireless Technical Overview Training - COURSE SYLLABUS

A Technical Overview of the 5G System

The 5G System (5GS) – Service Based Architecture (SBA)

  • Submission of initial 5G description for IMT-2020
  • LTE-M & NB-IoT Introduced in 4G LTE-Advanced
  • 3GPP Release Timeline for Specifications
  • 5G Performance and Flexibility Enables New Use Cases
  • Technical Requirements for 5G
  • 5G-PPP KPI Evaluation of Use Cases
  • Attack Surfaces Open with Interconnections Between CS Domain and Internet
  • Overview of 5G Access and Core Networks
  • EPC migration to Control & User Plane Separation (CUPS)
  • Mapping EPC Functions to 5G CN Functions
  • LTE Network Security Issues with the Diameter Protocol
  • LTE Network Security Issues with the Diameter Protocol
  • Reference Point Representation of the 5G Core
  • 5G System (5GS) Service Based Architecture (SBA)
  • Introduction to Multi-Access Edge Computing (MEC)
  • Multi-Access Edge Computing (MEC) in 5G
  • Expected Edge Evolution
  • Service Based Architecture (SBA) Service Framework
  • Non-Stand Alone (NSA) Architecture
  • 5G Standalone Architecture (SA)
  • 5G NR Architecture Deployment Options
  • LTE-NR Dual Connectivity with Carrier Aggregation
  • Next Generation Satellites and 5G: SaT5G

SDN and NFV Fundamental to the 5G Core Architecture

    • Major Trends in Mobile Networking
    • 5G Mobile Network Architecture
    • SDN in NFV Architectural Framework
    • Part A: Development of Software Defined Networks:
      • Evolution of Networked Computing: Server Form Factors
      • Emergence of Virtual Machines
  • Intro to Software Defined Networks (SDNs)
  1. Northbound and Southbound Interfaces Defined for SDN
  2. Application Program Interface (API) Defined
  3. Transport API Architecture
  • SDN Control and User Planes
  • SDN Provides Scale and Resiliency
  • Part B: Intro to Network Functions Virtualization (NFV) Traditional Switches & Routers
  1. Switch Virtualization with Open vSwitch
  2. Network Functions Virtualization (NFV) Framework
  • NFV Infrastructure - NFVI Layers: Hardware Resources, Virtualization Layer & Virtualized Resources
  1. Virtual Network Function (VNF)
  2. Management and Network Orchestration (MANO)
  3. Operational & Business Support Systems
  • 5G NFV Main Components
  • SDN/NFV used in 5G Network Architecture
  • Edge Computing uses AI/ML with Training and Orchestration Across the Network

5G Core Functions

    • 5G System (5GS)
    • User Plane Function (UPF)
    • Access and Mobility Management Function (AMF)
    • Session Management Function (SMF)
    • Policy Control Function (PCF)
    • Unified Data Management (UDM)
    • Unified Data Repository (UDR)
    • Application Function (AF)
    • Authentication Server Function (AUSF)
    • Network Slicing Explained
    • Network Slice Selection Function (NSSF)
    • Introduction to the Service Capability Exposure Function (SCEF)
    • Network Exposure Function (NEF)
    • Network Repository Function (NRF)
    • Simplified Example of 5G API Calls
    • NFs Offer Services to other NFs in a Structured Way
    • V2X Deployment Model
    • Security Edge Protection Proxy (SEPP): End-to-End HTTP/2 Roaming Architecture
    • 5GS Roaming Architecture – Local Break Out (LBO)
      1. Service Based Interface Representation
      2. Reference Point Representation
    • 5GS Roaming Architecture – Home Routed (HR)
      1. Service Based Interface Representation
      2. Reference Point Representation

5G Radio Access Network (5G RAN)

    • 5G Control/User Plane Split and New Radio (NR) Interface
    • 5G User Plane (UP) Protocol Stack
    • 5G Control Plane (CP) Protocol Stacks
    • New Multiple Access Schemes for NR
    • Higher Order Modulation Rates Supported with 5G NR
    • 5G NR Frame and Bandwidth Numerologies
    • Frame Slots for Different Numerology Configurations
    • Massive Multiple-Input Multiple-Output (MIMO)
    • Frequency Ranges for 5G New Radio (NR)
      1. FR1 Frequency Division Duplex (FDD) Frequency Bands
      2. FR1 Time Division Duplex (TDD) Frequency Bands
  • FR2 Time Division Duplex (TDD) Frequency Bands
  1. Supplementary Uplink (SUL) Frequency Bands
  2. Supplementary Downlink (SDL) Frequency Bands
  • CBRS Tiered User Classes and Frequency Spectrum
  • Using Unlicensed Spectrum for 5G NR (NR-U)
  • 5G Distributed & Centralized RAN Elements
  • 5G Xn - Control and User Plane Protocol Stacks
  • XnAP within the Xn-C (Control) Protocol Stacks
  • F1 Application Protocol (F1AP)
  • F1 Protocol Stack Split Between CU and DU
  • F1 Functional Split Options
  • Bandwidth Considerations for C-RAN
  • Quality of Service (QoS) Flows Across the Xn-User Plane (Xn-U)

Centralized-RAN (C-RAN) for 5G

    • Alternative Splitting Options for Centralized RAN Architecture
    • Alternative C-RAN Solutions: enhanced Common Public Radio Interface (eCPRI)
    • Multiple Splits Can Be Adopted by Service Providers: Combining 3GPP (Option 2) and eCPRI (Option 6 or 7)
    • IEEE 1914: Next Generation Fronthaul Interface (NGFI)
    • Other Alternatives for C-RAN Architectural Splits
    • NG-RAN Transport Network: Midhaul Connections
    • NG-RAN Transport Network: Fronthaul Connections
    • Centralized Radio Access Network (C-RAN) Transport
    • 5G C-RAN Procedures: UE Initial Access
    • Intra-gNB-CU Handover Illustrated
    • 5G C-RAN Procedures: Intra gNB-CU Handover
    • 5G C-RAN Procedures: Dual Connectivity (EN-DC)
  1. Introduction to 5G Security
  • Generating and Using Private/Public Key Pairs
  • Public Key Infrastructure (PKI)
  • 5G Identity Exchange Between UE and Network
  • 5G Security Overview
  • UE Must Identify which Authentication and Key Agreement (AKA) Mechanism to Utilize
  • Generating the Key Access Security Function (KAUSF)
  • Generating the 5G Home Environment Authentication Vector (HE AV)
  • 5G Key Hierarchy
  • Key Distribution in 5G
  • Non-3GPP Access to 5G Core Networks
  • 5G Authentication and Key Agreement (AKA) Procedure
  • Generation of 5G Authentication Vector (AV)
  • Device (UE) Authentication Procedure
  • Authentication Confirmation and UDM Validity Monitoring
  • IPX Allowed to Modify HTTP/2 Messages
5G Wireless Technical Overview Training Course Wrap-Up

Whether you are looking for general information or have a specific question, we want to help.
Request More Information

    Time frame: