We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details >

  
AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers

Computer and Network Administration

5G Mobile Cellular Networks

Group Training + View more dates & times
    
                     
  • Overview

    This course provides a comprehensive overview of the 5G system. The course begins with the 5G system Service Based Architecture (SBA).

    Section 1 focuses on the evolution to 5G and the effort performed by the International Telecommunication Unition – Radiocommunications (ITU-R) sector in identifying the characteristics and goals of the 5G system. This is followed by a description outlining the actual 5G System standardization process by the 3rd Generation Partnership Project (3GPP). The implementation of the 5G System by mobile operators will evolve the evolution of their 4G LTE networks, a key topic on the Evolved Packet Core (EPC) Migration to Control & User Plane Separation (CUPS) is covered showing this important step that will be required to successfully migrate to a 5G network. This section then provides an integrated look at the various functions and Radio Access Network (RAN) connections in the 5G System and Service Based Architecture (SBA). It concludes with an overview of the many optional deployments for 5G, involving both Standalone Architecture (SA) and Non-Standalone Architecture (NSA).

    Section 2 covers the fundamental design of the 5G Core Architecture, which involve a Software Defined Network (SDN) and Network Functions Virtualization (NFV). Both of these are integral to the development, deployment and operation of 5G networks. This section also delves into the topic of security with regard to SDN and NFV. Software Defined Network (SDN) security deals with the challenges, principles, and requirements. Network Functions Virtualization (NFV) Security focuses on critical Security elements, NFV-based Security Management, and Security Management and Orchestration.

    Section 3 takes a more in-depth look at the 5G core functions. Each one of the functions are covered at in detail. The course has a student exercise that provides the student with additional details on these core functions. In addition, this section provides additional details on the Security Edge Protection Proxy (SEPP), which is at the heart of 5G security, which involves the zero-trust model between roaming partners for 5G external connections.

    Section 4 provides an in-depth look at the 5G Radio Access Network (5G RAN). Here, the 5G User and Control Plane protocol stacks are covered, along with many details involving the two 5G Frequency Ranges (FR-1 and FR2). The RAN protocols are also covered, including the 5G Xn (that operates between gNBs) and F1 Application Protocol (F1AP). The section concludes with coverage on Quality of Service (QoS) flows across the Xn-User Plane.

    Section 5 focuses on  the Centralized-RAN (C-RAN) for 5G. The 5G RAN has several alternative splitting options, ones that go beyond direct support for the 3GPP standards. So, this section provides an overview of other standards organizations and consortiums that provide additional options in support of a robust 5G access network. Several ladder diagrams are used in this section to show how the protocol exchange works various types of handovers between cells, including dual connectivity.

    Section 6 comprises of the identifiers used in 5G mobile networks. One of the most problematic privacy issues in past mobile cellular generations has been the exposure of the International Mobile Subscriber Identity (IMSI) during the authentication process of the subscriber’s mobile. The 3GPP working group on security has successfully implemented the solution in the form of the Structure of Subscription Concealed Identifier (SUCI) for protecting the IMSI from ever having to be transmitted unencrypted. So, this section introduces the many different identifiers that have been defined for use in 5G networks, including the Remapping the (Globally Unique Temporary Identifier (GUTI) in handovers between 4G and 5G networks.

    Section 7 provides an in-depth security primer for 5G networks. The section begins with a review of how Public Key Infrastructure (PKI) functions, which is the key to encrypting the IMSI into the format of the SUCI, mentioned in the introduction of the previous section above. This section also provides explanations of the 5G Authentication and Key Agreement (AKA) and Procedure Generation of 5G Authentication Vector (AV).

    Section 8 furnishes a technical overview of 5G security. It provides examples of the terms that were explained in the previous section and delves into the details of the zero trust security concept and shows how that is implemented between roaming partners to keep identities of mobile subscriber accounts protected, along with the location of the subscriber’s mobile devices. This section concludes with some detailed latter diagrams explaining the steps involved with 5G key distribution and the 5G authentication and Key Agreement (AKA) procedure.

    Section 9 provides an overview for the evolution of SIMs and remote provisioning of Embedded SIMs (eSIMs), used in 5G devices today. Remote provisioning is the key to scaling Massive Machine Type Communications (mMTC) services. This methodology was crafted by the GSM Association (GSMA) and is at the heart of both M2M remote provisioning and consumer device remote provisioning architectures.

  • Schedule
  • Course Outline
    1. The 5G System (5GS) Service Based Architecture (SBA)
    • Submission of initial 5G description for IMT-2020
    • LTE-M & NB-IoT Introduced in 4G LTE-Advanced
    • 3GPP Release Timeline for Specifications
    • 5G Performance and Flexibility Enables New Use Cases
    • Technical Requirements for 5G
    • 5G-PPP KPI Evaluation of Use Cases
    • Attack Surfaces Open with Interconnections Between CS Domain and Internet
    • 2G GSM, 3G UMTS, 4G LTE: Reference Point Architecture
    • EPC migration to Control & User Plane Separation (CUPS)
    • Mapping EPC Functions to 5G CN Functions
    • LTE Network Security Issues with the Diameter Protocol
    • Overview of 5G Access and Core Networks
    • Reference Point Representation of the 5G Core
    • 5G System (5GS) Service Based Architecture (SBA)
    • Introduction to Multi-Access Edge Computing (MEC)
    • Multi-Access Edge Computing (MEC) in 5G
    • Expected Edge Evolution
    • Service Based Architecture (SBA) Service Framework
    • Non-Stand Alone (NSA) Architecture
    • 5G Standalone Architecture (SA)
    • 5G NR Architecture Deployment Options
    • LTE-NR Dual Connectivity with Carrier Aggregation
    • Next Generation Satellites and 5G: SaT5G
    1. SDN and NFV: Fundamental to the 5G Core Architecture
    • Major Trends in Mobile Networking
    • 5G Mobile Network Architecture
    • SDN in NFV Architectural Framework
    • Part A – Development of Software Defined Networks:
      • Evolution of Networked Computing: Server Form Factors
      • Emergence of Virtual Machines
      • Intro to Software Defined Networks (SDNs)
      • Northbound and Southbound Interfaces Defined for SDN
      • Application Program Interface (API) Defined
      • Transport API Architecture
      • SDN Control (Signaling) and Data (User) Planes
      • SDN Provides Scale and Resiliency
      • Software Defined Network (SDN) Security
        • Introduction to SDN Security
        • SDN Security Challenges
        • SDN Security Principles
        • SDN Security Requirements
        • Security Analysis of the OpenFlow Switch Specification
      • Part B: Introduction to Network Functions Virtualization (NFV) Traditional Switches & Routers
        • Switch Virtualization with Open vSwitch
        • Network Functions Virtualization (NFV) Framework
        • NFV Infrastructure – NFVI Layers: Hardware Resources, Virtualization Layer & Virtualized Resources
        • Virtual Network Function (VNF)
        • Management and Network Orchestration (MANO)
        • Operational & Business Support Systems
        • 4G LTE Core Network Virtualization: Prep for 5G Core
        • Technology Breakthrough with RAN Architecture
        • 5G NFV Main Components
        • SDN/NFV used in 5G Network Architecture
        • Edge Computing uses AI/ML with Training and Orchestration Across the Network
        • NFV Security
          • NFV Security and Trust Guidance Overview
          • Critical Security Elements: Firewalls and Deep Packet Inspection (DPI)
          • NFV-based Security Management
            • Essential Security Requirements
            • Middleboxes
            • Security Service Orchestration
            • NFV-based Security Management Platforms
          • Security Management and Orchestration
    1. 5G Core Functions
      • 5G System (5GS)
      • User Plane Function (UPF)
      • Access and Mobility Management Function (AMF)
      • Session Management Function (SMF)
      • Policy Control Function (PCF)
      • Unified Data Management (UDM)
      • Unified Data Repository (UDR)
      • Application Function (AF)
      • Authentication Server Function (AUSF)
      • Network Slicing Explained
      • Network Slice Selection Function (NSSF)
      • Introduction to the Service Capability Exposure Function (SCEF)
      • Network Exposure Function (NEF)
      • Network Repository Function (NRF)
      • Simplified Example of 5G API Calls
      • NFs Offer Services to other NFs in a Structured Way
      • V2X Deployment Model
      • Security Edge Protection Proxy (SEPP):
        End-to-End HTTP/2 Roaming Architecture
      • 5GS Roaming Architecture – Local Break Out (LBO)
      • Service Based Interface Representation
      • Reference Point Representation
      • 5GS Roaming Architecture – Home Routed (HR)
      • Service Based Interface Representation
      • Reference Point Representation
    2. 5G Radio Access Network (5G RAN)
      • 5G Control/User Plane Split and New Radio (NR) Interface
      • 5G User Plane (UP) Protocol Stack
      • 5G Control Plane (CP) Protocol Stacks
      • New Multiple Access Schemes for NR
      • Higher Order Modulation Rates Supported with 5G NR
      • 5G NR Frame and Bandwidth Numerologies
      • Frame Slots for Different Numerology Configurations
      • Massive Multiple-Input Multiple-Output (MIMO)
      • Frequency Ranges for 5G New Radio (NR)
      • FR1 Frequency Division Duplex (FDD) Frequency Bands
      • FR1 Time Division Duplex (TDD) Frequency Bands
      • FR2 Time Division Duplex (TDD) Frequency Bands
      • Supplementary Uplink (SUL) Frequency Bands
      • Supplementary Downlink (SDL) Frequency Bands
      • FR1 Supplementary Bands for 5G-New Radio (5G-NR)
      • CBRS Tiered User Classes and Frequency Spectrum
      • Using Unlicensed Spectrum for 5G NR (NR-U)
      • 5G Distributed & Centralized RAN Elements
      • 5G Xn – Control and User Plane Protocol Stacks
      • XnAP within the Xn-C (Control) Protocol Stacks
      • F1 Application Protocol (F1AP)
      • F1 Protocol Stack Split Between CU and DU
      • F1 Functional Split Options
      • Bandwidth Considerations for C-RAN
      • Quality of Service (QoS) Flows Across the Xn-User Plane (Xn-U)
    3. Centralized-RAN (C-RAN) for 5G
      • Alternative Splitting Options for Centralized RAN Architecture
      • Alternative C-RAN Solutions: enhanced Common Public Radio Interface (eCPRI)
      • Multiple Splits Can Be Adopted by Service Providers: Combining 3GPP (Option 2) and eCPRI (Option 6 or 7)
      • IEEE 1914: Next Generation Fronthaul Interface (NGFI)
      • Other Alternatives for C-RAN Architectural Splits
      • NG-RAN Transport Network: Midhaul Connections
      • NG-RAN Transport Network: Fronthaul Connections
      • Centralized Radio Access Network (C-RAN) Transport
      • 5G C-RAN Procedures: UE Initial Access
      • Intra-gNB-CU Handover Illustrated
      • 5G C-RAN Procedures: Intra gNB-CU Handover
      • 5G C-RAN Procedures: Dual Connectivity (EN-DC)

     

    1. Identifiers Used in 5G Mobile Networks
      • Overview of 5G Subscriber Related Identities
      • 5G Subscriber Permanent Identifier (SUPI) Formats
      • Structure of Subscription Concealed Identifier (SUCI)
      • Concealing the Subscriber Permanent Identifier (SUPI)
      • Output for Elliptic Curve Integrated Encryption Scheme (ECIES)
      • How the Subscription Concealed ID (SUCI) Process Works
      • 5G Permanent Equipment Identifier (PEI)
      • Structure of the 5G-GUTI and the 5G-S-TMSI
      • Globally Unique AMF ID (GUAMI)
      • 5G Network Related Identities
      • Remapping the GUTI in a Handover Between 4G and 5G
      • Fixed Mobile Convergence (FMC)

     

    1. Security Primer for 5G
      • Generating and Using Private/Public Key Pairs
      • Public Key Infrastructure (PKI)
      • 5G Identity Exchange Between UE and Network
      • 5G Security Overview
      • UE Must Identify which Authentication and Key Agreement (AKA) Mechanism to Utilize
      • Generating the Key Access Security Function (KAUSF)
      • Generating the 5G Home Environment Authentication Vector (HE AV)
      • 5G Key Hierarchy
      • Non-3GPP Access to 5G Core Networks
      • Key Distribution in 5G
      • 5G Authentication and Key Agreement (AKA) Procedure
      • Generation of 5G Authentication Vector (AV)
      • Device (UE) Authentication Procedure
      • Authentication Confirmation and UDM Validity Monitoring
      • IPX Allowed to Modify HTTP/2 Messages

     

    1. Millimeter Wave (mmWave) in the RF Spectrum Band
      • 5G mmWave Phased Array Antenna Systems: Expensive, but Necessary!
      • Propagation Loss in Millimeter Wave (mmWave)
      • Millimeter Wave (mmWave) Propagation & Signal Attenuation
      • 5G mmWave Frequency Bands: Free Space Path Loss Calculation Exercise
      • mmWave: Propagation Path Loss
      • mmWave: Building Penetration Loss and Other Objects
      • Examples of Penetration Loss on 5G Frequencies
      • 5G Antenna Diversity: Reducing the Effects of Signal Blocking by the Human Body
      • Human Body Detectors in 5G Mobiles
      • 5G-Based FWA Broadband Use Case Study by Ericsson
      • 5G Fixed Wireless Access (FWA) Broadband
      • 5G New Radio – Unlicensed (NR-U)

     

    1. Evolution of SIMs and Remote Provisioning of Embedded SIMs (eSIMs)
      • Universal Integrated Circuit Card (UICC) Logical Structure
      • Application Toolkits for SIMs
      • USIM Application Toolkit (USAT) Features
      • USIM Application Toolkit (USAT): Location Information
      • Characteristics of the Universal Integrated Circuit Card (UICC)
      • Expanding Terminology for SIMs
      • File Types and Related Security Access Conditions
      • Universal SIM (USIM) File System Structure for 5G Access
      • IMS Application Data File (ISIM)
      • USIM File System Structure: Security, Unique Subscriber Identity and Service Table
      • USIM Card File System Structure for 5G: Mobility Management & Security
      • The Difference Between M2M and IoT
      • MFF2 SIM Linear Distribution & Subscription Model for M2M
      • Issues with using MFF2 SIMs for M2M Devices
      • How eSIMs are Changing the Market
      • Introduction to Embedded SIMs (eSIMs)
      • Overview of eUICC Service Provider Profiles
      • Remote Provisioning using eSIMs
      • Two Remote Provisioning Methods for Operational Profiles
      • Two Provisioning Models for eSIMs
      • GSMA’s M2M Remote Provisioning Architecture
      • GSMA’s Consumer Remote Provisioning Architecture
      • How Consumer Remote SIM Provisioning Works
      • eUICC Architecture Overview
      • Operator Profile Download and Installation Flow
      • The Integrated SIM (iSIM)
  • FAQs
    Is there a discount available for current students?

    UMBC students and alumni, as well as students who have previously taken a public training course with UMBC Training Centers are eligible for a 10% discount, capped at $250. Please provide a copy of your UMBC student ID or an unofficial transcript or the name of the UMBC Training Centers course you have completed. Online courses are excluded from this offer.

    What is the cancellation and refund policy?

    Student will receive a refund of paid registration fees only if UMBC Training Centers receives a notice of cancellation at least 10 business days prior to the class start date for classes or the exam date for exams.

Contact Us