Skip to main content

The 5G framework is intended to assist information availability and administration that would empower the organization, by the business, utilizing new procedures like Network Function Virtualization and Software Defined Networking. The requirement for these new strategies has arisen because of the different profiles of information benefits that should be upheld by the 5G organization.

It builds up dependable, secure availability to the organization for end clients and gives admittance to its administrations. The core domain manages a wide assortment of fundamental capacities in the versatile organization, like availability and portability of the executives, confirmation and approval, subscriber data management and policy management, among others. 5G Core network capacities are programming based and planned as cloud-local, implying that they’re agnostic to the underlying cloud infrastructure, permitting higher arrangement agility and adaptability.

Like the 4G Evolved Packet Core (EPC), the 5G Core totals information traffic from end gadgets. The 5G Core additionally confirms supporters and gadgets, applies customized approaches and deals with the versatility of the gadgets before directing the traffic to administrator administrations or the Internet.

5G Core involves virtualized, programming-based organization capacities and can in this manner be launched inside Multi-access Edge Computing (MEC) cloud frameworks.

5g core network Architecture

There are two kinds of 5G network organization architecture: Reference point portrayal and Service-based portrayal.

  • Reference point representation

This kind of 5G core network architecture focuses on the connections between sets of network functions characterized by point-to-point reference points between any two network functions. This sort of portrayal is utilized when some collaboration exists between any two network capacities.

Non-Roaming 5G system architecture in reference point representation
  • Service-based representation:

The Service-based representation likewise incorporates point-to-point reference focuses between the NFs where fundamental.

5G System services-based architecture

5G Core Network Functions

  • Access and Mobility Management Function (AMF) upholds the Termination of NAS signalling, registration management, connection management, mobility management, access confirmation and approval, and security setting the board. AMF gets all the association and session data from the end-user equipment or the RAN but only handles connection and mobility management tasks. Anything to do with session management is transmitted to the Session Management Function (SMF). 
  • The session management function (SMF): The SMF is answerable for collaborating with the decoupled information plane by making, refreshing and eliminating Protocol Data Unit (PDU) and overseeing session context within the UPF. Session management, UE IP address allocation & management, DHCP functions, termination of NAS signalling related to session management, DL data notification, traffic steering configuration for UPF for proper traffic routing.
  • User plane function (UPF): packet routing & sending, examination of packets, QoS handling, acts as an external PDU session point for interconnecting to Data Network (DN) and is an anchor point for intra- & inter-RAT portability. The 5G core UPF represents the development of the data plane function of the Packet Gateway (PGW). This partition permits information sending to be conveyed and scaled autonomously with the goal that packet processing and traffic aggregation can be distributed to the network edge.
  • Unified Data Management (UDM) upholds the evaluation of Authentication and Key Agreement (AKA) credentials, user identification handling, access authorization, and subscription management.
  • Application Function (AF) upholds application effects on traffic directing, getting to NEF, cooperation with an approach system for strategic control.
  • Policy Control Function (PCF) upholds a unified policy framework, giving policy rules to CP functions. 
  • The Authentication Server Function (AUSF) goes about as a verification server.
  • Unified Data Management (UDM) upholds the Authentication and Key Agreement (AKA) credentials, user identification handling, access authorization, and subscription management.
  • Application Function (AF) upholds application effects on traffic routing, connection with a strategy structure for strategy control.
  • The NF Repository function (NRF) assists the administration, keeping up with NF profiles and accessible NF examples.
  • The Network Slice Selection Function (NSSF) determines the permitted NSSAI, deciding the AMF set to be utilized to serve the UE.

Leave a Reply

Discover more from TELCOMA Training & Certifications

Subscribe now to keep reading and get access to the full archive.

Continue reading