Call Us on +49 32 121 237 207

TK946

Course Modules

1. 5G Introduction

2. 5G Network deployment options

2.1. Stand-Alone Versus Non-StandAlone
2.2. 5G Network architecture options in 3GPP Release 15
2.2.1. Option 1
2.2.2. Option 2
2.2.3. Option 3
2.2.4. Option 4
2.2.5. Option 5
2.2.6. Option 6
2.2.7. Option 7
2.2.8. Option 8
2.3. Option 3 variants
2.4. 5G Architecture main migration strategy

3. 5G system architecture

3.1. Baseline end to end architecture
3.2. 5G Core architecture
3.3. Service Based Architecture
3.4. Common Core Network
3.5. Cloud native Core Network
3.6. Network Slicing

4. 5G System Procedures

4.1. Protocol Stacks between the UE and the 5GC
4.2. 5GS mobility management procedures
4.3. 5GS session management procedures
4.4. Interworking between 5GS and EPC
4.5. Procedures for non-3GPP access

5. 5G Core Network Functions

5.1. 5G Core Network Function Functional Description
5.2. Access and Mobility Management function
5.3. Session Management function
5.4. User Plane Function
5.5. Network Repository Function
5.6. Unstructured Data Storage Function
5.7. Unified Data Repository
5.8. Unified Data Management
5.9. Network Exposure Function
5.10. Network Slice Selection Function
5.11. Authentication Server Function
5.12. 5G Equipment Identity Register
5.13. SMS Function
5.14. Policy Control Function
5.15. Non-3GPP InterWorking Function
5.16. Cell Broadcast Function
5.17. Charging Function
5.18. Location Management Function
5.19. Security Edge Protection Proxy

6. 5G System Procedures

6.1. Protocol Stacks between the UE and the 5GC
6.2. 5GS mobility management procedures
6.3. 5GS session management procedures
6.4. Interworking between 5GS and EPC
6.5. Procedures for non-3GPP access

7. 5G Network Slicing

7.1. Network slicing overview
7.2. Network slicing benefits
7.3. 5G Network architecture for Network Slicing
7.4. UE assisted Network Slice selection
7.5. E2E Network Slicing procedures

8. 5G Services

8.1. Verticals and specific services support
8.2. IMS Support
8.3. SMS over NAS
8.4. Public Warning System
8.5. Emergency Services
8.6. Mission Critical Services

9. 5G System QoS

9.1. 5GS QoS model principles
9.2. 5GS QoS Flow handling
9.3. 5GS QoS Parameters

10. 5G Security

10.1. Security architecture
10.2. 5G System Security procedures
10.3. 5G Authentication
10.3.1. AKA
10.3.2. AKA’

Open Session

Subcribe weekly newsletter