Home > Articles

This chapter is from the book

3.3 3GPP 5G Architecture

As discussed in Chapter 2, the 3rd Generation Partnership Project (3GPP) is the organization responsible for developing reports and specifications that define 5G networks. The project covers cellular telecommunications technologies—including the air interface, RAN, core network, and service capabilities—that provide a complete system description for 5G mobile telecommunications. The 3GPP specifications also provide hooks for fixed access to the core network and for interworking with 4G networks and networks outside the 3GPP specifications.

Hundreds of 3GPP reports and specifications related to 5G together describe an extraordinarily complex system. This book provides an overview that encompasses the scope of 5G technology and networks, based on the 3GPP documents. This section provides a “big picture” overview of 5G, summarizing the two key 3GPP documents that together describe the 5G architecture:

  • TS 23.501 (Technical Specification Group Services and System Aspects; System Architecture for the 5G System (5GS); Stage 2 (Release 16), December 2020): This document describes the core network architecture, together with its services and interfaces.

  • TS 38.300 (Technical Specification Group Radio Access Network; NR; NR and NG-RAN Overall Description; Stage 2 (Release 16), December 2020): This document describes the radio access network architecture, together with its services and interfaces.

5G Core Network Architecture

The 5G architecture model provides a framework within which detailed specifications can be developed.

Principles

TS 23.501 lists the following as the key principles for the architecture:

  • Separate the user plane (UP) functions from the control plane (CP) functions to allow independent scalability, evolution, and flexible deployments (e.g., centralized location or distributed [remote] location).

  • Modularize the function design (e.g., to enable flexible and efficient network slicing).

  • Wherever applicable, define procedures (i.e., the set of interactions between network functions) as services so that their reuse is possible.

  • Enable each network function (NF) and its network function services (NFS) to interact with other NF and its NFS directly or indirectly via a service communication proxy, if required. The architecture does not preclude the use of another intermediate function to help route control plane messages.

  • Minimize dependencies between the access network (AN) and the core network (CN). The architecture is defined with a converged core network with a common AN–CN interface that integrates different access types (e.g., 3GPP access and non-3GPP access).

  • Support a unified authentication framework.

  • Support stateless NFs. A stateless NF separates an NF into a processing module and a data store module containing state information. This design results in a more agile NF in terms of scalability, resilience, and ease of deployment [KABL17].

  • Support capability exposure. As mentioned in Chapter 2, this refers to the ability to provide relevant information about network capabilities to third parties.

  • Support concurrent access to local and centralized services. To support low-latency services and access to local data networks, UP functions can be deployed close to the access network.

  • Support roaming with both home-routed traffic as well as local breakout traffic in the visited public land mobile network (PLMN).

Roaming

The final item in the preceding list references some important concepts. A PLMN, often called a carrier, is a telecommunications network that provides mobile cellular services. A home PLMN for a given mobile phone subscriber is the PLMN that is contracted to provide cellular service to the subscriber. Roaming is the ability for a user to function in a serving network different from the home network, called the visited network. Roaming can occur internationally, in which case mobile subscribers get coverage and at least basic services similar to their domestic package from a network operator in another country. For 5G, any user device should work in any other country. With 4G and earlier, there are multiple technologies in use, and a cell phone from one country may not be able to operate on a network in another country. National roaming refers to the ability to move from one mobile operator to another in the same country.

Both the home and visited PLMN use the same network architecture, which defines protocols, services, and interfaces between the home PLMN and the visited PLMN. The 3GPP specifications support two models of operation: home routed and local breakout (LBO). In the home-routed roaming model, the subscriber’s data traffic is serviced by the subscriber’s home network, which gives the home network operator more control over the user’s traffic and is preferable when the relationship between the two operators is not totally trustworthy. In the LBO model, the subscriber’s data is serviced by the visited network; this model delivers more efficient routing in terms of bandwidth and latency. In the case of LBO, the home network owner loses control of the customer and has no role in delivering services to that user. The LBO model is used when there is a trusted relationship between the two operators.

An architecture that includes roaming adds complexity but no change to the basic network services and functionality. Therefore, this section focuses on the non-roaming case.

Architecture Diagrams

TS 23.501 contains a number of architecture diagrams from several different points of view and at varying levels of detail. All of the diagrams depict the architecture in terms of a number of interconnected network functions (NFs). An NF is a processing function in a network that has defined functional behavior and interfaces. A network function can be implemented either as a network element on dedicated hardware, as a software instance running on dedicated hardware, or as a virtualized function instantiated on an appropriate platform.

The interconnection between NFs is represented in two ways:

  • Service-based representation: NFs within the control plane enable other authorized NFs to access their services. This representation illustrates how a set of services is provided/exposed by a given network interface. This interface defines how one network function within the control plane allows other network functions that have been authorized to access its services. This representation also includes point-to-point reference points where necessary.

  • Reference point representation: This representation uses labeled point-to-point links to show the interaction that exists between two NFs or between an NF and an external functional module or network. The reference point representation is beneficial when showing message sequence charts. It shows the relationships between NFs that are used in the message sequence charts.

There are several advantages to this form of architectural representation. The modular structure provides a framework for developing detailed specifications for each NF. The service-based interfaces and reference points provide a framework for developing detailed specifications of the interaction between NFs in terms of data formats, protocols, and service calls. In addition, the detailed interface specifications promote interoperability between different hardware/software providers. Finally, this type of architecture definition provides a way of ensuring that all 5G functional and service requirements are satisfied.

Service-Based System Architecture

Figure 3.6, based on TS 23.501, depicts the overall non-roaming 5G service-based architecture (SBA) for the core network. The functional components of the control plane of the network are network functions (NFs) that offer their services to any other applicable NFs via a common framework of interfaces accessible to all NFs. Network repository functions (NRFs) allow every NF to discover the services offered by other NFs present in the network; network exposure functions (NEFs) expose capability information and services of the 5G core network NFs to external entities. This model aims to maximize the modularity, reusability, and self-containment of network functions and to foster the ability to grow flexibly while taking advantage of network functions virtualization and software-defined networking.

FIGURE 3.6

FIGURE 3.6 Non-Roaming 5G System Architecture

The figure includes the following NFs and other modules:

  • Authentication server function (AUSF): Performs authentication between UE and the network.

  • Access and mobility management function (AMF): Receives all connection- and session-related information from the user equipment (UE) (N1/N2) but is responsible only for handling connection, registration, reachability, and mobility management tasks. All messages related to session management are forwarded to the session management function (SMF).

  • Network exposure function (NEF): Provides an interface for outside applications to communicate with the 5G network to obtain network-related information in the following categories:

    • Monitoring capability: Allows an external entity to request or subscribe to UE-related events of interest. The monitored events include a UE’s roaming status, UE loss of connectivity, UE reachability, and location-related events.

    • Provisioning capability: Allows an external entity to provide information about expected UE behavior to the 5G system (e.g., predicted UE movement, communication characteristics).

    • Policy/charging capability: Handles QoS and charging policy for the UE, based on a request from an external party.

    • Analytics reporting capability: Allows an external party to fetch or subscribe/unsubscribe to analytics information generated by the 5G system.

  • Network repository function (NRF): Allows NFs to register their functionality and to discover the services offered by other NFs present in the network.

  • Network slice selection function (NSSF): Selects the set of network slice instances to accommodate the service request from a UE. When a UE requests registration with the network, AMF sends a network slice selection request to NSSF with information on the preferred network slice selection. The NSSF responds with a message that includes a list of appropriate network slice instances for the UE.

  • Network slice-specific authentication and authorization (NSSF): Performs authentication and authorization specific to a slice.

  • Policy control function (PCF): Provides functionalities for the control and management of policy rules, including rules for QoS enforcement, charging, and traffic routing. PCF enables end-to-end QoS enforcement with QoS parameters (e.g., maximum bit rate, guaranteed bit rate, priority level) at the appropriate granularity (e.g., per UE, per flow, per protocol data unit [PDU] session).

  • Session management function (SMF): Responsible for PDU session establishment, modification, and release between a UE and a data network. A PDU session, or simply a session, is an association between the UE and a data network that provides a PDU connectivity service. A PDU connectivity service is a service that provides for the exchange of PDUs between a UE and a data network.

  • Unified data management (UDM): Responsible for access authorization and subscription management. UDM works with the AMF and AUSF as follows: The AMF provides UE authentication, authorization, and mobility management services. The AUSF stores data for authentication of UEs, and the UDM stores UE subscription data.

  • User plane function (UPF): Handles the user plane path of PDU sessions. This function is described subsequently.

  • Application function (AF): Provides session-related information to the PCF so that the SMF can ultimately use this information for session management. The AF interacts with application services that require dynamic policy control. The AF extracts session-related information (e.g., QoS requirements) from application signaling and provides it to the PCF in support of its rule generation. An example is the IP multimedia subsystem (IMS), which may interface with the PCRF to request QoS support for VoIP calls.

  • User equipment (UE): Allows a user access to network services. An example is a mobile phone. For the purpose of 3GPP specifications, the interface between the UE and the network is the radio interface.

  • (Radio) Access Network ((R)AN): Provides access to a 5G core network. This includes the 5G RAN and other wireless and wired access networks.

  • Data network (DN): Allows UE to be logically connected by a session. It may be the Internet, a corporate intranet, or an internal services function within the mobile network operator’s core (including content distribution networks).

  • Service communication proxy (SCP): Allows NFs and NFSs to communicate directly or indirectly. The SCP enables multiple NFs to communicate with each other and with user plane entities in a highly distributed multi-access edge compute cloud environment. This provides routing control, resiliency, and observability to the core network.

The ovals on NFs in Figure 3.6 indicate service interfaces that can be accessed by other NFs. Each interface is identified by a label consisting of an uppercase N followed by the abbreviation of the NF in lowercase. For example, the network slice selection function has a service interface labeled Nnssf.

It is informative to compare Figure 3.6 with Figure 2.13, which shows the ITU-T Y.3102 (Framework of the IMT-2020 Network, May 2018) representation of the core network, which provides a somewhat different functional breakdown. This can be considered an earlier version of the core network architecture that has been superseded by the current 3GPP architecture.

Reference Point Representation

Figure 3.7, based on TS 23.501, depicts the overall non-roaming 5G architecture using the reference point representation, showing how the NFs interact with each other.

FIGURE 3.7

FIGURE 3.7 Non-Roaming 5G System Architecture in Reference Point Representation

Note that there are fewer interconnections depicted in Figure 3.7 than in Figure 3.6. Within the control plane, the interconnections in Figure 3.6 indicate which NFs can access the services of which other NFs. The interconnections of Figure 3.7 indicate which NFs communicate with each other directly, without going through an intermediate NF. The term directly does not mean that there is a physical point-to-point link between NFs connected on the diagram. Rather, it means that there is a protocol for the exchange of messages between the connected entities that is not relayed through another NF. Each such link is labeled with a reference point expressed as an uppercase N followed by a number. For example, the logical connection between the session management function and the policy control function is labeled reference point N7.

In Figure 3.7, two reference points loop back to the same function: N9 and N14. The N9 reference point is an interface between two distinct UPFs used for forwarding packets. The N14 reference point is between two AMFs, one acting as a source AMF for a data transfer and the other acting as a destination AMF.

User Plane Function

User plane functions handle the user plane path of PDU sessions. 3GPP specifications support deployments with a single UPF or multiple UPFs for a given PDU session. UPF selection is performed by SMF. UPF functions include:

  • Packet routing and forwarding.

  • Anchor point for intra-/inter-RAT mobility (when applicable). Anchor points are transit nodes in the network used for forwarding PDUs along a session from a UE to the destination.

  • External PDU session point of interconnect to data network.

  • Packet inspection (e.g., application detection based on a service data flow [SDF] template). An SDF provides end-to-end packet flow between an end user and an application; this is discussed in Chapter 9, “Core Network Functionality, QoS, and Network Slicing.”

  • User plane part of policy rule enforcement (e.g., gating, redirection, traffic steering).

  • Traffic usage reporting.

  • QoS handling for the user plane, such as uplink/downlink rate enforcement.

  • Uplink traffic verification (SDFs to QoS flow mapping). A QoS flow is the lowest level of granularity for defining end-to-end QoS policies. A QoS flow may contain multiple SDFs; this is discussed in Chapter 9.

  • Transport-level packet marking in the uplink and downlink.

  • Downlink packet buffering and downlink data notification triggering.

  • Sending and forwarding of one or more end markers to the source NG-RAN node.

Radio Access Network Architecture

Figure 3.8, from TS 38.300, depicts the overall RAN architecture.

FIGURE 3.8

FIGURE 3.8 Overall Radio Access Network Architecture

There are two types of base stations, called NG-RAN nodes:

  • gNB: Provides 5G user plane and control plane protocol terminations toward the UE.

  • ng-eNB: Provides 4G (E-UTRA) user plane and control plane protocol terminations toward the UE and connects via the NG interface to the 5G core. This enables 5G networks to support UE that use the 4G air interface. However, the UE must still implement the 5G protocols to interact with the 5G core network.

The gNBs and ng-eNBs are interconnected with each other by means of the Xn interface. The gNBs and ng-eNBs are also connected by means of the NG interfaces to the core network (5GC)—specifically, to the AMF (access and mobility management function) by means of the NG-C interface and to the UPF (user plane function) by means of the NG-U interface.

Figure 3.9, from TS 38.300, shows the major functional elements performed by the RAN, together with functions within the core network that specifically relate to the RAN. The outer shaded boxes depict the logical nodes, and the inner white boxes depict the main functions at each node. TS 38.300 also includes a more comprehensive list of functions for the four logical nodes, and these are discussed in Part Four, “5G NR Air Interface and Radio Access Network.”

FIGURE 3.9

FIGURE 3.9 Functional Split Between NG-RAN and 5G Core Network

RAN Functional Areas

Figure 3.9 illustrates the following key functional areas in the NG-RAN:

  • Inter-cell radio resource management: Allows the UE to detect neighbor cells, query about the best serving cell, and support the network during handover decisions by providing measurement feedback.

  • Radio bearer control (RBC): Consists of the procedure for configuration (such as security), establishment, and maintenance of the radio bearer (RB) on both the uplink and downlink with different quality of service (QoS). The term radio bearer refers to an information transmission path of defined capacity, delay, bit error rate, and other parameters.

  • Connection mobility control (CMC): Functions both in UE idle mode and connected mode. In idle mode, UE is switched on but does not have an established connection. In connected mode, UE is switched on and has an established connection. In idle mode, CMC performs cell selection and reselection. The connected mode involves handover procedures triggered on the basis of the outcome of CMC algorithms.

  • Radio admission control (RAC): Decides whether a new radio bearer admission request is admitted or rejected. The objective is to optimize radio resource usage while maintaining the QoS of existing user connections. Note that RAC decides on admission or rejection for a new radio bearer, while RBC takes care of bearer maintenance and bearer release operations.

  • Measurement configuration and provision: Consists of provisioning the configuration of the UE for radio resource management procedures such as cell selection and reselection and for requesting measurement reports to improve scheduling.

  • Dynamic resource allocation (scheduler): Consists of scheduling RF resources according to their availability on the uplink and downlink for multiple pieces of UE, according to the QoS profiles of a radio bearer.

Access and Mobility Management

On the core network side, the NG-RAN nodes interact with three functions: the access and mobility management, session management, and user plane functions.

The AMF provides UE authentication, authorization, and mobility management services. The two main functions shown in Figure 3.9 for AMF are NAS security and idle state mobility handling.

The non-access stratum (NAS) is the highest protocol layer of the control plane between UE and the access and mobility management function (AMF) in the core network. The main functions of the protocols that are part of the NAS are the support of mobility of the UE and the support of session management procedures to establish and maintain IP connectivity between the UE and user plane function (UPF). It is used to maintain continuous communications with the UE as it moves. In contrast, the access stratum is responsible for carrying information just over the wireless portion of a connection. NAS security involves IP header compression, encryption, and integrity protection of data based on the NAS security keys derived during the registration and authentication procedure.

Idle state mobility handling deals with cell selection and reselection while the UE is in idle mode, as well as reachability determination.

Session Management Function

The two main functions depicted in Figure 3.9 for SMF are UE IP address allocation and PDU session control.

UE IP address allocation assigns an IP address to the UE at the time of session establishment. This ensures the ability to route data packets within the 5G system and also supports data reception and forwarding to outside networks and provides interconnectivity to external packet data networks (PDNs).

In cooperation with the UPF, the SMF establishes, maintains, and releases a PDU session for user data transfer, which is defined as an association between the UE and a data network that provides PDU connectivity.

User Plane Function

The two main functions depicted in Figure 3.9 for UPF are UE IP mobility anchoring and PDU handling.

UE mobility handling deals with ensuring that there is no data loss when there is a connection transfer due to handover that involves changing anchor points.

Once a session is established, the UPF has a responsibility for PDU handling. This includes the basic functions of packet routing, forwarding, and QoS handling.

Session Establishment

TS 23.502 (Technical Specification Group Services and System Aspects; Procedures for the 5G System (5GS); Stage 2 (Release 16), December 2020) defines the session establishment process. Figure 3.10 provides a much simplified view of the interaction between the various network components during session establishment. This section does not examine this process in detail. More detail is provided in Chapter 9.

FIGURE 3.10

FIGURE 3.10 UE-Requested PDU Session Establishment

Session establishment begins with a request from the UE over the RAN, which is directed to the AMF. An SMF is selected to manage the PDU session. SMF utilizes UDM in the process of creating a session and performing authentication and authorization. SMF selects a PCF for the session. SMF selects a UPF to handle data plane PDU forwarding in both directions. SMF establishes a session with the DN. After a few more exchanges, the UE is able to communicate over a session with the DN.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020