Pub Date : 2020-09-01DOI: 10.1109/5GWF49715.2020.9221197
A. Ntanos, D. Zavitsanos, G. Giannoulis, H. Avramopoulos
A quantum-secured packetized optical fronthaul segment is thoroughly discussed. We present an extensive study on the integration of a Discrete Variable-Quantum Key Distribution (DV-QKD) link supporting the Advanced Encryption Standard-256 (AES-256) encryption of packetized fronthaul operating at 10Gbps. Secure key rates exceeding the 1Kbps and short rotation times down to 1.4s are reported for Point-to-Point (P2P) topologies by considering the latency budget of 5G fronthaul connectivity. For the multi-user environment, the Bob stations implementation of quantum layer is adapted to satisfy the connectivity needs of Point-to-Multipoint (P2MP) scenario, allowing for successful distribution of AES-256 keys to N=16 5G terminal nodes with ultra-low attack success probabilities of less than 2-60.
{"title":"QKD in Support of Secured P2P and P2MP Key Exchange for Low-Latency 5G Connectivity","authors":"A. Ntanos, D. Zavitsanos, G. Giannoulis, H. Avramopoulos","doi":"10.1109/5GWF49715.2020.9221197","DOIUrl":"https://doi.org/10.1109/5GWF49715.2020.9221197","url":null,"abstract":"A quantum-secured packetized optical fronthaul segment is thoroughly discussed. We present an extensive study on the integration of a Discrete Variable-Quantum Key Distribution (DV-QKD) link supporting the Advanced Encryption Standard-256 (AES-256) encryption of packetized fronthaul operating at 10Gbps. Secure key rates exceeding the 1Kbps and short rotation times down to 1.4s are reported for Point-to-Point (P2P) topologies by considering the latency budget of 5G fronthaul connectivity. For the multi-user environment, the Bob stations implementation of quantum layer is adapted to satisfy the connectivity needs of Point-to-Multipoint (P2MP) scenario, allowing for successful distribution of AES-256 keys to N=16 5G terminal nodes with ultra-low attack success probabilities of less than 2-60.","PeriodicalId":232687,"journal":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133177030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-01DOI: 10.1109/5GWF49715.2020.9221060
Winnie Nakimuli, G. Landi, Ramon Perez, M. Pergolesi, Marc Mollà Roselló, Christos Ntogkas, Gines Garcia-Aviles, Jaime García-Reinoso, M. Femminella, Pablo Serrano, Francesco Lombardo, Juan Rodríguez, G. Reali, S. Salsano
The 5G EVE is a 5G PPP phase 3 Infrastructure project aimed at building a European 5G validation platform for extensive trials. One of the main objectives of 5G EVE is to offer an accessible and fully operational 5G end-to-end infrastructure, flexible enough to support a plethora of tests for different vertical industries, distributed among several sites. When executing the declared tests, vertical industries with expertise deploying such services may state the operational key performance indicators, and the platform will provide an analysis of the results. This paper presents the design and results of the first 5G end to end experiment deployed on the 5G EVE infrastructure. In particular, we present the 5G EVE architecture, all the steps required to design and execute a simple experiment. Finally, this paper also provides an analysis and discussion of the results provided by our platform.
{"title":"Automatic deployment, execution and analysis of 5G experiments using the 5G EVE platform","authors":"Winnie Nakimuli, G. Landi, Ramon Perez, M. Pergolesi, Marc Mollà Roselló, Christos Ntogkas, Gines Garcia-Aviles, Jaime García-Reinoso, M. Femminella, Pablo Serrano, Francesco Lombardo, Juan Rodríguez, G. Reali, S. Salsano","doi":"10.1109/5GWF49715.2020.9221060","DOIUrl":"https://doi.org/10.1109/5GWF49715.2020.9221060","url":null,"abstract":"The 5G EVE is a 5G PPP phase 3 Infrastructure project aimed at building a European 5G validation platform for extensive trials. One of the main objectives of 5G EVE is to offer an accessible and fully operational 5G end-to-end infrastructure, flexible enough to support a plethora of tests for different vertical industries, distributed among several sites. When executing the declared tests, vertical industries with expertise deploying such services may state the operational key performance indicators, and the platform will provide an analysis of the results. This paper presents the design and results of the first 5G end to end experiment deployed on the 5G EVE infrastructure. In particular, we present the 5G EVE architecture, all the steps required to design and execute a simple experiment. Finally, this paper also provides an analysis and discussion of the results provided by our platform.","PeriodicalId":232687,"journal":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115820954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-01DOI: 10.1109/5GWF49715.2020.9221272
Alok Kumar Jangid, Nishant, K. Jha, D. Das
5G cellular system (also referred to as New Radio (NR)) is being deployed around the world in a non-standalone (NSA) mode with 4G, also known as EUTRA-New Radio Dual Connectivity (EN-DC) mode in which 4G and 5G work together. As most of 5G is getting deployed in higher frequency spectrums (especially 3.5GHz and mmWave), the coverage of a 5G cell will be lesser in comparison to a 4G Cell. So, to provide the same coverage as LTE, more NR cells need to be deployed, and this is a complex challenge that operators are facing globally. The coverage limitation will lead to unnecessary scanning of the 5G network, even where there is no coverage. The 5G radio frequencies scanning for the 5G network is a power-consuming procedure, and unnecessary scanning leads to power drainage. Hence optimizing power consumption is an open research problem area for connecting to the 5G network. To solve the above problem, to the best of our knowledge, this paper for the first time proposes a new protocol and call flow with the use of big data server as well as a clustering algorithm, where 5G cell coverage areas are determined for 5G thus reducing the redundant scanning of 5G frequencies. With the above proposed novel idea, the system can reduce power consumption by 38% than the conventional method.
{"title":"Efficient Protocol for EUTRA New Radio Dual Connectivity Handling based on Location","authors":"Alok Kumar Jangid, Nishant, K. Jha, D. Das","doi":"10.1109/5GWF49715.2020.9221272","DOIUrl":"https://doi.org/10.1109/5GWF49715.2020.9221272","url":null,"abstract":"5G cellular system (also referred to as New Radio (NR)) is being deployed around the world in a non-standalone (NSA) mode with 4G, also known as EUTRA-New Radio Dual Connectivity (EN-DC) mode in which 4G and 5G work together. As most of 5G is getting deployed in higher frequency spectrums (especially 3.5GHz and mmWave), the coverage of a 5G cell will be lesser in comparison to a 4G Cell. So, to provide the same coverage as LTE, more NR cells need to be deployed, and this is a complex challenge that operators are facing globally. The coverage limitation will lead to unnecessary scanning of the 5G network, even where there is no coverage. The 5G radio frequencies scanning for the 5G network is a power-consuming procedure, and unnecessary scanning leads to power drainage. Hence optimizing power consumption is an open research problem area for connecting to the 5G network. To solve the above problem, to the best of our knowledge, this paper for the first time proposes a new protocol and call flow with the use of big data server as well as a clustering algorithm, where 5G cell coverage areas are determined for 5G thus reducing the redundant scanning of 5G frequencies. With the above proposed novel idea, the system can reduce power consumption by 38% than the conventional method.","PeriodicalId":232687,"journal":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130788261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-01DOI: 10.1109/5GWF49715.2020.9221397
K. C. Behera
5G New Radio (NR) is primarily characterized by multi-Gbps throughput and up to 10X lower latency than LTE. 5G adopts Low-Density Parity Check (LDPC) code as the channel coding candidate for data channels. Rate-Matching and BitInterleaving functions are performed after LDPC encoding in the transmit signal chain. The purpose of Rate Matching is to select a specific set of encoded bits for transmission by the process of puncturing and/or repetition to support HARQ operation. The output of the Rate-Matching butter goes through row-column permutation function in Bit-Interleaving process. The rate-matched bits from the circular butter are written in row-first order into another butter and read in column-first order. While copying the bits from the rate-matching circular butter, the filler bits are skipped and does not enter the row-column butter. The ratematching butter to row-column butter copy operation accounts for the overall latency in the transmit chain. This paper addresses the latency aspects while processing the large Transport Blocks corresponding to the maximum downlink (DL) throughput. An efficient M-parallel look-ahead pointers generation algorithm is proposed to read M-interleaved bits directly from rate-matching butter, avoiding row-column permutation operation, and thus the need of a separate butter, where M is programmed for a target latency.
{"title":"An Efficient Low-Latency Algorithm and Implementation for Rate-Matching and Bit-Interleaving in 5G NR","authors":"K. C. Behera","doi":"10.1109/5GWF49715.2020.9221397","DOIUrl":"https://doi.org/10.1109/5GWF49715.2020.9221397","url":null,"abstract":"5G New Radio (NR) is primarily characterized by multi-Gbps throughput and up to 10X lower latency than LTE. 5G adopts Low-Density Parity Check (LDPC) code as the channel coding candidate for data channels. Rate-Matching and BitInterleaving functions are performed after LDPC encoding in the transmit signal chain. The purpose of Rate Matching is to select a specific set of encoded bits for transmission by the process of puncturing and/or repetition to support HARQ operation. The output of the Rate-Matching butter goes through row-column permutation function in Bit-Interleaving process. The rate-matched bits from the circular butter are written in row-first order into another butter and read in column-first order. While copying the bits from the rate-matching circular butter, the filler bits are skipped and does not enter the row-column butter. The ratematching butter to row-column butter copy operation accounts for the overall latency in the transmit chain. This paper addresses the latency aspects while processing the large Transport Blocks corresponding to the maximum downlink (DL) throughput. An efficient M-parallel look-ahead pointers generation algorithm is proposed to read M-interleaved bits directly from rate-matching butter, avoiding row-column permutation operation, and thus the need of a separate butter, where M is programmed for a target latency.","PeriodicalId":232687,"journal":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","volume":"19 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114106814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-01DOI: 10.1109/5GWF49715.2020.9221363
Charalampos Kalalas, J. Alonso-Zarate
While the emerging vehicle-to-everything (V2X) connectivity paradigm is radically transforming the automotive sector, unprecedented security challenges arise, calling for innovative security enablers with minimum impact on the ongoing communication. In dense V2X scenarios, the 5G authentication and key agreement (5G-AKA) procedure may suffer from uncontrolled failures which result in unacceptable latency levels due to the excessive signalling overhead. In this paper, we introduce a lightweight vehicle authentication scheme, as an extension of the 5G-AKA, to adequately address a high number of authentication requests. The proposed mechanism leverages the space-efficient features of the cuckoo filter, a probabilistic data structure for approximate set membership tests, to achieve authentication of multiple vehicles at a time. Our performance analysis reveals the impact of various cuckoo filter parameter configurations on the authentication efficiency. In addition, our proposed authentication mechanism is able to outperform the standardized 5G-AKA procedure in terms of latency and protocol overhead even for high vehicle load.
{"title":"Lightweight and Space-efficient Vehicle Authentication based on Cuckoo Filter","authors":"Charalampos Kalalas, J. Alonso-Zarate","doi":"10.1109/5GWF49715.2020.9221363","DOIUrl":"https://doi.org/10.1109/5GWF49715.2020.9221363","url":null,"abstract":"While the emerging vehicle-to-everything (V2X) connectivity paradigm is radically transforming the automotive sector, unprecedented security challenges arise, calling for innovative security enablers with minimum impact on the ongoing communication. In dense V2X scenarios, the 5G authentication and key agreement (5G-AKA) procedure may suffer from uncontrolled failures which result in unacceptable latency levels due to the excessive signalling overhead. In this paper, we introduce a lightweight vehicle authentication scheme, as an extension of the 5G-AKA, to adequately address a high number of authentication requests. The proposed mechanism leverages the space-efficient features of the cuckoo filter, a probabilistic data structure for approximate set membership tests, to achieve authentication of multiple vehicles at a time. Our performance analysis reveals the impact of various cuckoo filter parameter configurations on the authentication efficiency. In addition, our proposed authentication mechanism is able to outperform the standardized 5G-AKA procedure in terms of latency and protocol overhead even for high vehicle load.","PeriodicalId":232687,"journal":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129711981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-01DOI: 10.1109/5GWF49715.2020.9221122
A. Dutta, Eman M. Hammad
The digital transformation brought by 5G is redefining current models of end-to-end connectivity and service reliability to include security-by-design principles necessary to enable 5G to achieve its promise. 5G trustworthiness highlights the importance of embedding security capabilities from the very beginning while the 5G architecture is being defined and standardized. Security requirements need to overlay and permeate through the different layers of the 5G systems (physical, network, and application) as well as different parts of an E2E5G architecture within a risk management framework that takes into account the evolving security threats landscape. 5G presents a typical use-case of wireless communication and computer networking convergence, where 5G fundamental building blocks include components such as Software Defined Networks (SDN), Network Functions Virtualization (NFV) and the edge cloud. This convergence extends many of the security challenges and opportunities applicable to SDN/NFV and cloud to 5G networks. Thus, 5G security needs to consider additional security requirements (compared to previous generations) such as SDN controller security, hypervisor security, orchestrator security, cloud security, edge security, etc. At the same time, 5G networks offer security improvement opportunities that should be considered. Here, 5G architectural flexibility, programmability and complexity can be harnessed to improve resilience and reliability.
{"title":"5G Security Challenges and Opportunities: A System Approach","authors":"A. Dutta, Eman M. Hammad","doi":"10.1109/5GWF49715.2020.9221122","DOIUrl":"https://doi.org/10.1109/5GWF49715.2020.9221122","url":null,"abstract":"The digital transformation brought by 5G is redefining current models of end-to-end connectivity and service reliability to include security-by-design principles necessary to enable 5G to achieve its promise. 5G trustworthiness highlights the importance of embedding security capabilities from the very beginning while the 5G architecture is being defined and standardized. Security requirements need to overlay and permeate through the different layers of the 5G systems (physical, network, and application) as well as different parts of an E2E5G architecture within a risk management framework that takes into account the evolving security threats landscape. 5G presents a typical use-case of wireless communication and computer networking convergence, where 5G fundamental building blocks include components such as Software Defined Networks (SDN), Network Functions Virtualization (NFV) and the edge cloud. This convergence extends many of the security challenges and opportunities applicable to SDN/NFV and cloud to 5G networks. Thus, 5G security needs to consider additional security requirements (compared to previous generations) such as SDN controller security, hypervisor security, orchestrator security, cloud security, edge security, etc. At the same time, 5G networks offer security improvement opportunities that should be considered. Here, 5G architectural flexibility, programmability and complexity can be harnessed to improve resilience and reliability.","PeriodicalId":232687,"journal":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","volume":"158 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128867378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-01DOI: 10.1109/5GWF49715.2020.9221453
Nishant Kumar, K. Rawat, F. Ghannouchi
This paper explores multi-band all-digital transmitter architecture suitable for 5G next-generation radio access network (NG-RAN). In NG-RAN, most of the radio frequency (RF) layer functions are moved to a distributed unit (DU) in the digital domain so that a low cost and small size remote radio unit (RRU) can be developed. This paper presents a delta-sigma modulation (DSM) technique implemented in the field-programmable gate array (FPGA) for DU which is further interfaced with a power amplifier in RRU through feeder cable. A single bit 1st and $2^{mathrm{n}mathrm{d}}$ order low-pass DSM is implemented in FPGA of DU. An IQ sequencing block and high-speed serializer multiplexer are used to digitally up-convert the baseband signals to the different carrier frequencies in DU. The proposed scheme is validated with transmission of long-term evolution (LTE) signal of 5 MHz bandwidth for single as well as multi-band operation. The performance of the transmitter is measured in terms of signal to noise distortion ratio (SNDR) and error vector magnitude (EVM).
{"title":"Multi-Band All-Digital Transmission for 5G NG-RAN Communication","authors":"Nishant Kumar, K. Rawat, F. Ghannouchi","doi":"10.1109/5GWF49715.2020.9221453","DOIUrl":"https://doi.org/10.1109/5GWF49715.2020.9221453","url":null,"abstract":"This paper explores multi-band all-digital transmitter architecture suitable for 5G next-generation radio access network (NG-RAN). In NG-RAN, most of the radio frequency (RF) layer functions are moved to a distributed unit (DU) in the digital domain so that a low cost and small size remote radio unit (RRU) can be developed. This paper presents a delta-sigma modulation (DSM) technique implemented in the field-programmable gate array (FPGA) for DU which is further interfaced with a power amplifier in RRU through feeder cable. A single bit 1st and $2^{mathrm{n}mathrm{d}}$ order low-pass DSM is implemented in FPGA of DU. An IQ sequencing block and high-speed serializer multiplexer are used to digitally up-convert the baseband signals to the different carrier frequencies in DU. The proposed scheme is validated with transmission of long-term evolution (LTE) signal of 5 MHz bandwidth for single as well as multi-band operation. The performance of the transmitter is measured in terms of signal to noise distortion ratio (SNDR) and error vector magnitude (EVM).","PeriodicalId":232687,"journal":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-01DOI: 10.1109/5GWF49715.2020.9221116
Ignacio Sanchez-Navarro, Pablo Salva-Garcia, Qi Wang, J. A. Calero
Network management have posed ever-increasing complexity with the evolution of virtualized and softwarized mobile networking paradigm, demanding advanced network visualization and automation technologies to address this significant paradigm shift. This paper provides a novel holographic immersive network management interface that extends the standardized ETSI Zero-Touch Network and Service Management (ZSM) reference architecture to allow network administrators to understand real-time automated tasks in a 5G network without human intervention. This augmented reality based system has been validated and prototyped using Microsoft Hololens 2 in a realistic 5G infrastructure.
{"title":"New Immersive Interface for Zero-Touch Management in 5G Networks","authors":"Ignacio Sanchez-Navarro, Pablo Salva-Garcia, Qi Wang, J. A. Calero","doi":"10.1109/5GWF49715.2020.9221116","DOIUrl":"https://doi.org/10.1109/5GWF49715.2020.9221116","url":null,"abstract":"Network management have posed ever-increasing complexity with the evolution of virtualized and softwarized mobile networking paradigm, demanding advanced network visualization and automation technologies to address this significant paradigm shift. This paper provides a novel holographic immersive network management interface that extends the standardized ETSI Zero-Touch Network and Service Management (ZSM) reference architecture to allow network administrators to understand real-time automated tasks in a 5G network without human intervention. This augmented reality based system has been validated and prototyped using Microsoft Hololens 2 in a realistic 5G infrastructure.","PeriodicalId":232687,"journal":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132442646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-01DOI: 10.1109/5GWF49715.2020.9221422
F. Latheef, M. A. Ingale
Standardization efforts for 5G New Radio (NR) technology are completed and initial deployments based on both Non Standalone (NSA) mode and Standalone (SA) mode have gained momentum in several countries. The 5G rollouts i.e. NSA and SA mode lead to an interim situation where mobile operators need to maintain both Evolved Packet Core (EPC) and 5G Core (5GC). Mobile operators, in future may prefer to migrate to 5GC, albeit maintaining the LTE and NR Radio Access Technology (RAT) to preserve investments. UE inter-RAT (IRAT) mobility between LTE and NR RAT mobility within 5GC, or between EPC and 5GC will be a crucial Key Performance Indicator (KPI) for mobile operators. IRAT mobility for CONNECTED state is already supported in 3GPP specifications but very less attention is paid to mobility when the UE is in INACTIVE state or when the UE performs recovery from Radio Link Failure (RLF). INACTIVE state is supported in both LTE and NR RAT when connected to 5GC, whereas suspend mode in IDLE state is supported when LTE RAT connects to EPC. In this paper we propose UE context retrieval procedure enhancements to support: a) efficient UE mobility between LTE and NR when the UE is in INACTIVE state or suspend mode in IDLE state in LTE and b) enhancements for RLF recovery by allowing reestablishment procedure to be performed if cell selection results in suitable IRAT cell detection. Further, we studied the control plane latency performance and signaling overhead reduction during the IRAT mobility scenarios by applying proposed enhancements. We believe that the UE context retrieval enhancements during IRAT mobility in above mentioned scenarios will improve robustness and minimize service interruption thereby improving the mobility experience.
{"title":"On the UE Context Retrieval Enhancements for Improved Inter-RAT Mobility","authors":"F. Latheef, M. A. Ingale","doi":"10.1109/5GWF49715.2020.9221422","DOIUrl":"https://doi.org/10.1109/5GWF49715.2020.9221422","url":null,"abstract":"Standardization efforts for 5G New Radio (NR) technology are completed and initial deployments based on both Non Standalone (NSA) mode and Standalone (SA) mode have gained momentum in several countries. The 5G rollouts i.e. NSA and SA mode lead to an interim situation where mobile operators need to maintain both Evolved Packet Core (EPC) and 5G Core (5GC). Mobile operators, in future may prefer to migrate to 5GC, albeit maintaining the LTE and NR Radio Access Technology (RAT) to preserve investments. UE inter-RAT (IRAT) mobility between LTE and NR RAT mobility within 5GC, or between EPC and 5GC will be a crucial Key Performance Indicator (KPI) for mobile operators. IRAT mobility for CONNECTED state is already supported in 3GPP specifications but very less attention is paid to mobility when the UE is in INACTIVE state or when the UE performs recovery from Radio Link Failure (RLF). INACTIVE state is supported in both LTE and NR RAT when connected to 5GC, whereas suspend mode in IDLE state is supported when LTE RAT connects to EPC. In this paper we propose UE context retrieval procedure enhancements to support: a) efficient UE mobility between LTE and NR when the UE is in INACTIVE state or suspend mode in IDLE state in LTE and b) enhancements for RLF recovery by allowing reestablishment procedure to be performed if cell selection results in suitable IRAT cell detection. Further, we studied the control plane latency performance and signaling overhead reduction during the IRAT mobility scenarios by applying proposed enhancements. We believe that the UE context retrieval enhancements during IRAT mobility in above mentioned scenarios will improve robustness and minimize service interruption thereby improving the mobility experience.","PeriodicalId":232687,"journal":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129345948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-01DOI: 10.1109/5GWF49715.2020.9221231
Dinakar Reddy Yammanuru, D. Das
3GPP has defined networks, which provide data services to the user equipment (UE) via wireless mediums. A service provider invests money to install and maintain a network, which provides services to the user. The service provider in turn charges the user based on usage of the network. Usage of the network is calculated in terms of the amount of data, transferred in the network for that user. Specific nodes in the network are assigned the responsibility of tracking the usage of data per user. Such node (referred, data accounting node) sits at the edge of the core network (CN) from where a packet from internet enters the service provider’s core network and later radio access network (RAN) to reach final destination UE. Usage information is tracked in the data accounting node at edge of CN and provided to charging servers to charge the user’s UE for network usage. Once a packet leaves the data accounting node, it has multiple intermediate nodes to travel before it reaches the UE, like multiple routers, switches etc. There is a possibility of packet drop at any intermediate node due to network congestion etc. When a packet is dropped in intermediate nodes, the entry node which calculates the network usage, does not come to know that the packet is dropped, but the UE is charged for the dropped packets. Our novel idea addresses the above issue and provides a feedback mechanism, which aids in calculating the packet drops in the CN and RAN and provide accurate charging to the user.
{"title":"Novel Data Accounting Procedure in 4G and 5G Networks","authors":"Dinakar Reddy Yammanuru, D. Das","doi":"10.1109/5GWF49715.2020.9221231","DOIUrl":"https://doi.org/10.1109/5GWF49715.2020.9221231","url":null,"abstract":"3GPP has defined networks, which provide data services to the user equipment (UE) via wireless mediums. A service provider invests money to install and maintain a network, which provides services to the user. The service provider in turn charges the user based on usage of the network. Usage of the network is calculated in terms of the amount of data, transferred in the network for that user. Specific nodes in the network are assigned the responsibility of tracking the usage of data per user. Such node (referred, data accounting node) sits at the edge of the core network (CN) from where a packet from internet enters the service provider’s core network and later radio access network (RAN) to reach final destination UE. Usage information is tracked in the data accounting node at edge of CN and provided to charging servers to charge the user’s UE for network usage. Once a packet leaves the data accounting node, it has multiple intermediate nodes to travel before it reaches the UE, like multiple routers, switches etc. There is a possibility of packet drop at any intermediate node due to network congestion etc. When a packet is dropped in intermediate nodes, the entry node which calculates the network usage, does not come to know that the packet is dropped, but the UE is charged for the dropped packets. Our novel idea addresses the above issue and provides a feedback mechanism, which aids in calculating the packet drops in the CN and RAN and provide accurate charging to the user.","PeriodicalId":232687,"journal":{"name":"2020 IEEE 3rd 5G World Forum (5GWF)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132059755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}