Book Image

Mastering 5G Network Design, Implementation, and Operations

By : Shyam Varan Nath, Ananya Simlai, Oğuzhan Kara
5 (1)
Book Image

Mastering 5G Network Design, Implementation, and Operations

5 (1)
By: Shyam Varan Nath, Ananya Simlai, Oğuzhan Kara

Overview of this book

We are living in an era where ultra-fast internet speed is not a want, but a necessity. As applications continue to evolve, they demand a reliable network with low latency and high speed. With the widespread commercial adoption of driverless cars, robotic factory floors, and AR/VR-based immersive sporting events, speed and reliability are becoming more crucial than ever before. Fortunately, the power of 5G technology enables all this and much more. This book helps you understand the fundamental building blocks that enable 5G technology. You’ll explore the unique aspects that make 5G capable of meeting high-quality demands, including technologies that back 5G, enhancements in the air interface, and packet core, which come together to create a network with unparalleled performance. As you advance, you’ll discover how to design and implement both 5G macro and private networks, while also learning about the various design and deployment options available and which option is best suited for specific use cases. After that, you’ll check out the operational and maintenance aspects of such networks and how 5G works together with fixed wireline and satellite technologies. By the end of this book, you’ll understand the theoretical and practical aspects of 5G, enabling you to use it as a handbook to establish a 5G network.
Table of Contents (23 chapters)
1
Part 1:Introduction to 5G
Free Chapter
2
Chapter 1: Introduction to 5G
10
Part 2:5G Network Design, Deployment Models, and Advanced Use Cases

VoNR call flow

In the previous section, we saw how an IMS PDU session is established. In this section, we will go over the VoNR call flow, which is used when a user places a voice call.

Figure 7.25 – VoNR call flow – part 1

Figure 7.25 – VoNR call flow – part 1

Step 1: The UE initiates SIP registration toward the called party via UPF, and P-CSCF through the IMS core network in the backend.

Step 2: P-CSCF sends Npcf_PolicyAuthorization_Update to the PCF to enforce policies, modify service information, apply gate control for traffic shaping and policing, modify subscription to SDF notification/deactivation, and so on.

Step 3: The PCF sends an HTTP POST request (/callbacks/v1/smPoliciesUpdate
Notification/imsi-123xxxxxx:1:1591309591702656285/update) to the SMF to update PCC rules (SIP VoNR audio), policy control request triggers, SDF, and charging-related information.

Step 4: The SMF processes the received PCC rules and sends a 204 No Content (200 OK) message for...