5G Jumpstart: Unofficial Guide To Nokia Certified 5G Associate
5G Jumpstart: Unofficial Guide To Nokia Certified 5G Associate
5G Jumpstart: Unofficial Guide To Nokia Certified 5G Associate
2
*unofficial guide to Nokia Certified 5G Associate
Pillars of 5G:
LTE Rel 8 - 9
LTE-A Rel 10 - 11
LTE-B Rel 12 - 14
5G Rel 15 – 17
5G-A Rel 18
5G NR New Radio:
5G New Radio (NR) is the global standard for a unified, more capable 5G wireless air
interface. It will deliver significantly faster and more responsive mobile broadband
experiences, and extend mobile technology to connect and redefine a multitude of new
industries.
Massive MIMO, is an extension of MIMO, which essentially groups together
antennas at the transmitter and receiver to provide better throughput and better
spectrum efficiency
The 5G spectrum is a range of radio frequencies in the sub-6 GHz range and the
millimeter-wave (mmWave) frequency range that is 24.25 GHz and above. The 5G
spectrum refers to the radio frequencies that carry data from user equipment (UE) to
cellular base stations to the data's endpoint.
.
TTI, Transmission Time Interval, is a parameter in UMTS and 5GNR related to
encapsulation of data from higher layers into frames for transmission on the radio
link layer. TTI refers to the duration of a transmission on the radio link. Unlike
LTE 5G offers variable TTI i.e. 0.25ms to 1.0ms adjusted per delay or payload
scenario (eMBB, URLLC).
5GC Core:
UDSF: Unstructured Data Storage Function In 5G, the UDSF supports data
storage for stateless network functions. That is, rather than a given
network function holding its own storage resources, it will instead store UE
context data in the UDSF.
5G Service-based architecture: The 3GPP defines a Service-Based
Architecture (SBA), whereby the control plane functionality and common
data repositories of a 5G network are delivered by way of a set of
interconnected Network Functions (NFs), each with authorization to access
each other's services.
5G QOS:
4G QCI: (1 ERAB + 1 PDP)
5G 5QI: Multiple RB Radio Bearer to 1 PDU (PDP in LTE) single tunnel
multiple flows
QFI: QoS Flow ID mapping APP to Radio Barer , GBR, Non GBR, Low
Latency
5G Security
1 — Confidentiality
Which ensures no unauthorized entity can read the communication. To ensure wireless
communication is confidential it is encrypted, and the encryption is done hop-by-hop in
the network. So, at both RAN and CN, the unencrypted information is available.
2 — Integrity
Which ensures no unauthorized entity can modify the communication. To ensure this
wireless communication is integrity protected, integrity is also implemented hop-by-hop
in the network. So, the information is available at both RAN and CN to be tampered
with.
3 — Availability
Which ensure that communication service is available uninterrupted to the users. This
also has to be ensured at both the RAN and CN level, as both can contribute to service
discontinuity.
5G Network Slicing
In order to facilitate network traffic from billions of connected nodes and the
coming wave of new compute-intensive 5G applications, networks must
transform to be able to deliver faster speeds, lower latency, and more
capacity. Cloudification prepares for 5G’s 10X less latency, 100X faster
speed, and 1000X more capacity, laying the foundation for revolutionary
customer experiences, business efficiencies, and products and services.
IAAS: The IaaS model shares hardware resources among the users.
Cloud providers typically bill IaaS services according to the utilization of
hardware resources by the users.
PAAS: The IaaS model shares hardware resources among the users.
Cloud providers typically bill IaaS services according to the utilization of
hardware resources by the users.
SAAS: The SaaS model is the software layer. In the SaaS layer, clients are
not allowed to modify the lower levels such as hardware resources and
application platform.
Cloud Elasticity: The Elasticity refers to the ability of a cloud
to automatically expand or compressed the infrastructural resources on
a sudden-up and down in the requirement so that the workload can be
managed efficiently.
Virtualization sprawl is a phenomenon that occurs when the number of
virtual machines (VMs) on a network reaches a point where administrators
can no longer manage them effectively. Virtualization sprawl is also
referred to as virtual machine sprawl, VM sprawl or virtual server sprawl.
COTS (Commercial off-the-Shelf Servers): AKA “Cheap Intel Servers”
Hybrid Cloud: Hybrid cloud computing is an environment that combines
public clouds and private clouds by allowing data and applications to be
shared between them. Private Cloud is an environment where Compute
and Storage servers are owned by the user, while Public Cloud is when the
equipment is owned by a vendor ie Microsoft, AWS.
MEC: (Mobile Edge Computing) is a distributed computing framework
that brings enterprise applications closer to data sources such as IoT
devices or local edge servers. This proximity to data at its source can
deliver strong business benefits, including faster insights, improved
response times and better bandwidth availability.
Hypervisors: Hypervisor is computer software, firmware or hardware that
creates and runs virtual machines. A computer on which a hypervisor runs
one or more virtual machines is called a host machine, and each virtual
machine is called a guest machine.
Type 1: Type 1 hypervisor run directly on the host’s physical
hardware without loading the attack-prone underlying OS, making them
very efficient and secure.
Type 2: Type 2 hypervisors are also known as hosted hypervisors,
because they are installed on existing OSs, and rely on them for
virtualization and resource management.
Common Products: VM-ware vSphere, Microsoft Hyper V, Xen Server,
KVM, Redhat Virtualization.
Containers: containers hold individual applications and their corresponding
software, commands, and configurations. This allows applications to be
transferred to different cloud or OS environments without having integration
or run issues because of the change in environment (Dockers, Kubernetes
Container Name-Space: isolates the applications from each other within
single or multiple container' scope. When multiple processes / services are
being run on multiple containers (on a single host system) then such
isolation is a necessity from security and stability standpoints.
Some of the 5G applications which come under this use case are :
➢ Smart Cities, Smart Homes and Smart Buildings
➢ Intelligent Agriculture Systems
➢ Patient Monitoring Systems
➢ Traffic Management Systems
5G URLLC:
WiFi Internetworking:
N3IWF: Non-3GPP Internetworking Function: Gateway to connect 5GC
to Wifi Access Point.
ATSSS: Access Traffic Steering, Switching, Splitting
“Steering” refers to the possibility of selecting for user-plane traffic,
according to the service (QoS-type for a data flow), the best link to use
“Switching” describes the possibility of performing handover without
service interruption to the other link when necessary
“Splitting” means the simultaneous use (bonding) of the two links.
5G Wired Broadband:
The AGF provides AAA services plus hierarchical traffic shaping and
policing for fixed network (FN) and 5G residential gateways (RGs) being
served from a standard 3GPP User Plane Function (UPF) within a common
5G Core (5GC).
ATSSS applies the same rules as WIFI.
5G small cell
Small cells are low-powered cellular radio access nodes that operate in
licensed and unlicensed spectrum that have a range of 10 meters to a few
kilometers and that are typically backhaul connected via wired connections.
Acronyms