NG-RAN and 5G-NR. Frédéric Launay

NG-RAN and 5G-NR - Frédéric Launay


Скачать книгу
the 5GC core network, when the mobile wants to establish a logical connection for a data service, it sends the RRC Service Request to the AMF with the S-NSSAI flag. The AMF selects the most suitable SMF.

      On NG-RAN, the gNB-CU entity selects the gNB-DU entity based on the S-NSSAI flag. The division of the network on radio access is defined by:

      1 – common RRC functions (management of sharing of radio resources between slices) and specific RRC functions (DRX, eDRX, timers, QoS, etc.);

      2 – PDCP, RLC, common or specific functions (header compressions, acknowledgment, etc.);

      3 – sequencing (MAC function) and prioritization on the physical layer.

      The objective of virtualizing the network is to provide network flexibility and dynamic adaptation to the needs of different users, in order to meet performance indicators specific to the services requested (latency, throughput, packet loss, etc.). This flexibility is provided by an orchestrator which supervises the network functions and delegates the traffic management to the radio controllers (SD-RAN – Software Defined RAN) and network controllers (SDN: Software Defined Networking). In addition, virtualization allows isolation of the different slices.

      All standards can be downloaded from the ETSI website: https://www.etsi.org/standards.

      3GPP TS 37.340

       Universal Mobile Telecommunications System (UMTS); LTE; 5G; NR; Multi-connectivity; Overall description; Stage-2

       Version 15.3.0 Release 15

      3GPP TS 38.401

       5G - NG-RAN: Architecture description

       Version 15.2.0 Release 15

      3GPP TS 24.501

       5G - Non-Access-Stratum (NAS) protocol for 5G System (5GS); Stage 3

       Version 15.0.0 Release 15

      3GPP TS 23.003

       Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); Numbering, addressing and identification

       Version 15.5.0 Release 15

       5G - Security architecture and procedures for 5G System

       Version 15.2.0 Release 15

      For a color version of all the figures in this chapter, see www.iste.co.uk/launay/5g.zip.

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEBLAEsAAD/7SEqUGhvdG9zaG9wIDMuMAA4QklNBAQAAAAAACUcAgAAAgAA HAJQAAxTYW1pIE1lbmFzY2UcAgUACExheW91dCAxADhCSU0EJQAAAAAAELX3qB9z4ksiHblsoQqR Gig4QklNBDoAAAAAAOUAAAAQAAAAAQAAAAAAC3ByaW50T3V0cHV0AAAABQAAAABQc3RTYm9vbAEA AAAASW50ZWVudW0AAAAASW50ZQAAAABDbHJtAAAAD3ByaW50U2l4dGVlbkJpdGJvb2wAAAAAC3By aW50ZXJOYW1lVEVYVAAAAAEAAAAAAA9wcmludFByb29mU2V0dXBPYmpjAAAADABQAHIAbwBvAGYA IABTAGUAdAB1AHAAAAAAAApwcm9vZlNldHVwAAAAAQAAAABCbHRuZW51bQAAAAxidWlsdGluUHJv b2YAAAAJcHJvb2ZDTVlLADhCSU0EOwAAAAACLQAAABAAAAABAAAAAAAScHJpbnRPdXRwdXRPcHRp b25zAAAAFwAAAABDcHRuYm9vbAAAAAAAQ2xicmJvb2wAAAAAAFJnc01ib29sAAAAAABDcm5DYm9v bAAAAAAAQ250Q2Jvb2wAAAAAAExibHNib29sAAAAAABOZ3R2Ym9vbAAAAAAARW1sRGJvb2wAAAAA AEludHJib29sAAAAAABCY2tnT2JqYwAAAAEAAAAAAABSR0JDAAAAAwAAAABSZCAgZG91YkBv4AAA AAAAAAAAAEdybiBkb3ViQG/gAAAAAAAAAAAAQmwgIGRvdWJAb+AAAAAAAAAAAABCcmRUVW50RiNS bHQAAAAAAAAAAAAAAABCbGQgVW50RiNSbHQAAAAAAAAAAAAAAABSc2x0VW50RiNQeGxAcsAAAAAA AAAAAAp2ZWN0b3JEYXRhYm9vbAEAAAAAUGdQc2VudW0AAAAAUGdQcwAAAABQZ1BDAAAAAExlZnRV bnRGI1JsdAAAAAAAAAAAAAAAAFRvcCBVbnRGI1JsdAAAAAAAAAAAAAAA

Скачать книгу