5G fifth Wireless

Course overview

5G Wireless Training is a 5-day course covering all aspects of 5G networks based on  architecture spawning an entirely new ecosystem of technological and enterprise innovations.As 5G wireless networks slowly begin their U.S. rollouts, consumers and businesses are starting to get a taste of what 5G can do. But there’s much more to come.The flexible and programmable nature of 5G networks represent a radical mobile network evolution in terms of capacity, performance, and spectrum access in both radio and non-radio network segments, including back haul capabilities.

Course Duration

5 Days

Cost

Audience

Executives, managers, officials, engineers, employees from policy makers, regulators, government organisation, telecom operators, vertical industries, telecom investment companies, academia who are dealing with the planning, developing, and implementing 5G networks. Other institutions and individuals that are dedicated in building their capacity related to 5G Technology are also welcome to participate

Course Content

Overview of the 5G Mobile Network

  • Overview of 5G
  • Overview of 3GPP Release 16
  • 5G Network/transport
  • 5G Node/platform
  • 5G Application and Services
  • 5G Vs. 5GE Vs. 4G LTE
  • 5G Use Cases
  • Enhanced Mobile Broadband
  • Connected Vehicles
  • Enhanced Multi-Media
  • Massive Internet of Things
  • Ultra-Reliable Low Latency Applications
  • Fixed Wireless Access

The 5G System Survey

  • Principles of 5G Core (5GC)
  • Principles of 5G New Radio (5G NR)
  • NR, gNB, NG-RAN and 5GC
  • NG RAN
  • Dual Connectivity options 

5G RAN and Core Architecture Overview

  • Changes and Improvements Compared to 4G
  • CP/UP Split
  • NW Slicing
  • Key Network Functions
  • Network Connectivity
  • Service-Based Architecture (SBA)
  • Network interfaces and services
  • Network Exposure Function
  • Protocols
  • Control and User Plane separation
  • Modularization
  • Virtualization
  • Service-based Architecture (SBA)
  • Network Slicing
  • NFV and SDN
  • Multi-Access Edge Computing (MEC)
  • Network Slicing
  • Benefits of network slicing
  • Network Slice Selection Function
  • Interworking with 4G EPC
  • 5G Protocol Stack (OSI-based)
  • Quick Compare: Verizon, AT&T, T-Mobile, Sprint, others in Europe, Asia and Latin/South America, Africa and Australia/New Zeeland
  • Virtualizing the 5G Network Core and use Mobile Edge Computing (MEC)

5G Evolution of RAN and Core Network

  • 5G Core Architecture
  • 5G Service Based Architecture SBA
  • Network Functions (NFs)
  • Access and Mobility Management function (AMF)
  • Control Plane Model Layer (CPML)
  • Hardware Abstraction Layer (HAL)
  • Composable Network Application Processor (CNAP)
  • Session Management function (SMF)
  • 5G User Plane Function (UPF)
  • Policy Control Function (PCF)
  • Authentication Server Function (AUSF)
  • Unified Data Management (UDM)
  • Application Function (AF)
  • Network Exposure function (NEF)
  • NF Repository function (NRF)
  • Network Slice Selection Function (NSSF)
  • NETCONF and YANG for control of all Integrated Control Plane
  • Evolution of Mobile Base Stations
  • Multi-access Edge Computing (MEC)

5G Operational Procedures

  • Network Operation: Registration of UE
  • Authentication
  • Security framework
  • UE states
  • Procedure for using subscription temporary identifier
  • Subscriber privacy
  • Secure steering of roaming
  • UE-assisted network-based detection of false base station
  • Network redundancy in 5G core and network slicing
  • PDU Session Establishment
  • Components of PDU session
  • IP and Ethernet addressing
  • 5G-NR Call Flows
  • 4G-5G dual connectivity
  • 5G-NR Non Standalone Access Flow (EN-DC)
  • 5G-NR Standalone Access Registration Flow
  • Non-Standalone NR Security
  • Device to Device Communication (D2D)

Overview of Security Architecture in 3GPP

  • 3GPP security standards
  • Security Functions for 5G
  • Increased home control
  • Unified authentication framework
  • Security Anchor Function (SEAF)
  • Subscriber identifier privacy
  • Overview of 5G Security Architecture
  • Security Requirements and Features
  • Security Procedures between UE and 5G Network Functions
  • Evolution of the Trust Model
  • 5G Threat Attacks and Surface
  • 5G Security Key Hierarchy
  • Ciphering Algorithms
  • Integrity Algorithms
  • Test Data for the Security Algorithms

Enroll now

error: Content is protected !!