In the last week of March 2022, 3GPP Release 17 reached stage 3 functional freeze. Now the ASN work is ongoing and it will be frozen in June 2022. After that point, any changes will need to be submitted to 3GPP as CR (change request) and would have to be agreed by everyone (or unopposed).
Juan Montojo, Vice President, Technical Standards, Qualcomm Technoloigies, in his blog post reminds us:
Release 17 has been completed with its scope largely intact, despite the fact that the entire release was developed in the midst of a pandemic that hit the world, including 3GPP, right after the scope of the Release was approved in December 2019. 3GPP has been operating through electronic means from the latter part of January 2020 and has yet to get back to face-to-face meetings and interactions. The return to face-to-face meetings is not expected before June 2022. Release 17 completion not only marks the conclusion of the first phase of the 5G technology evolution, but it is a testament to the mobile ecosystem’s resiliency and commitment to drive 5G forward. I couldn’t be more proud of 3GPP, and our team, in particular, as Qualcomm Technologies led the efforts across a wide range of projects. Release 17 delivers another performance boost to the 5G system and continues expanding 5G into new devices, applications, and deployments.
The blog post briefly explains the 'New and enhanced 5G system capabilities' as well as features related to 'Expansion to new 5G devices and applications' as shown in the image on the top.
In addition, 3GPP Rel-17 has many other projects as can be seen in the image above. 3GPP TR 21.917: Release 17 Description; Summary of Rel-17 Work Items has a summary of all the items above but it is still undergoing revision.
Juan also did a webinar on this topic with Fierce Wireless, the video is embedded below:
Over the last couple of years, I keep on coming across Zero-Trust Architecture (ZTA). A simple way to explain is that the standard model of security is known as perimeter security model, where everything within the perimeter can be trusted. In zero-trust (ZT) model, no assumptions is made about trustworthiness and hence it is also sometimes known as perimeterless security model.
This short video from IBM clearly explains what ZT means:
This blog post from Palo Alto Networks also clearly explains ZT:
By definition, Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction. Zero Trust for 5G removes implicit trust regardless of what the situation is, who the user is, where the user is or what application they are trying to access.
The impact of Zero Trust on network security specifically protects the security of sensitive data and critical applications by leveraging network segmentation, preventing lateral movement, providing Layer 7 threat prevention and simplifying granular user-access controls. Where traditional security models operate under the assumption that everything inside an organization’s perimeter can be trusted, the Zero Trust model recognizes that trust is a vulnerability.
In short, Zero Trust for 5G presents an opportunity for service providers, enterprises and organizations to re-think how users, applications and infrastructure are secured in a way that is scalable and sustainable for modern cloud, SDN-based environments and open-sourced 5G networks. Delivering the Zero Trust Enterprise means taking Zero Trust principles, making them actionable and effectively rebuilding security to keep pace with digital transformation.
A research paper looking at Intelligent ZTA (i-ZTA) provides an interesting approach to security in 5G and beyond. The paper can be downloaded from here. The abstract states:
While network virtualization, software-defined networking (SDN), and service-based architectures (SBA) are key enablers of 5G networks, operating in an untrusted environment has also become a key feature of the networks. Further, seamless connectivity to a high volume of devices in multi-radio access technology (RAT) has broadened the attack surface on information infrastructure. Network assurance in a dynamic untrusted environment calls for revolutionary architectures beyond existing static security frameworks. This paper presents the architectural design of an i-ZTA upon which modern artificial intelligence (AI) algorithms can be developed to provide information security in untrusted networks. We introduce key ZT principles as real-time Monitoring of the security state of network assets, Evaluating the risk of individual access requests, and Deciding on access authorization using a dynamic trust algorithm, called MED components. The envisioned architecture adopts an SBA-based design, similar to the 3GPP specification of 5G networks, by leveraging the open radio access network (O-RAN) architecture with appropriate real-time engines and network interfaces for collecting necessary machine learning data. The i-ZTA is also expected to exploit the multi-access edge computing (MEC) technology of 5G as a key enabler of intelligent MED components for resource-constraint devices.
Ericsson Technology Review covered Zero Trust in 5G Networks in one of their issues. Quoting from the article:
The 3GPP 5G standards define relevant network security features supporting a zero trust approach in the three domains: network access security, network domain security and service-based architecture (SBA) domain security.
The network access security features provide users with secure access to services through the device (mobile phone or connected IoT device) and protect against attacks on the air interface between the device and the radio node. Network domain security includes features that enable nodes to securely exchange signaling data and user data, for example, between radio and core network functions (NFs).
The 5G SBA is built on web technology and web protocols to enable flexible and scalable deployments using virtualization and container technologies and cloud-based processing platforms. SBA domain security specifies the mechanism for secure communication between NFs within the serving network domain and with other network domains.
While the new requirements and functionality introduced in the 5G specifications are already aligned with many of the zero trust tenets. It is already evident, however, that further technology development, standardization and implementation are needed in areas such as policy frameworks, security monitoring and trust evaluation to support the adoption of zero trust architecture in new telecom environments that are distributed, open, multi-vendor and/or virtualized.
While various technologies can support organizations in adhering to the guiding principles of zero trust as part of their total active defense strategy, it is important to remember that technology alone will never be sufficient to realize the full potential of zero trust. Successful implementation of a network based on zero trust principles requires the concurrent implementation of information security processes, policies and best practices, as well as the presence of knowledgeable security staff. Regardless of where a CSP is in its transition toward a zero trust architecture, the three pillars of people, processes and technology will continue to be the foundation of a robust security architecture.
Network Slicing is a hot topic on our blogs and it looks like people can't get enough of it. So here is a short introductory tutorial from Wray Castle.
The video embedded below explores what Network Slicing is, how it is used, and how it is deployed in the 5G network, as well as (briefly) the role of MEC (Multi Access Edge Computing) in support of specific use cases and potential slice deployments.
The GSMA Mobile Economy report series provides the latest insights on the state of the mobile industry worldwide. Produced by GSMA's in-house research team, GSMA Intelligence, these reports contain a range of technology, socio-economic and financial datasets, including forecasts out to 2025. The global version of the report is published annually at MWC Barcelona, while regional editions are published throughout the year.
The Infographic above (PDF) shows the latest update from 2022. The PDF of report is available here.
Selective extract from the executive summary as follows:
The mobile industry has been instrumental in extending connectivity to people around the world. In 2021, the number of mobile internet subscribers reached 4.2 billion people globally. Operators’ investments in network infrastructure over the last decade have helped to shrink the coverage gap for mobile broadband networks from a third of the global population to just 6%. But although the industry continues to invest in innovative solutions and partnerships to extend connectivity to still underserved and far-flung communities, the adoption of mobile internet services has not kept pace with the expansion of network coverage. This has resulted in a significant usage gap. In 2021, the usage gap stood at 3.2 billion people, or 41% of the global population.
The reasons for the usage gap are multifaceted and vary by region, but they generally relate to a lack of affordability, relevance, knowledge and skills, in addition to safety and security concerns. Furthermore, the barriers to mobile internet adoption are particularly acute among certain segments of the population, including women, the elderly, those in rural areas and persons with disabilities – or a combination thereof. Addressing the usage gap for these key groups will extend the benefits of the internet and digital technology to more people in society, and will require concerted efforts by a broad range of stakeholders working together with mobile operators and other ecosystem players, such as device manufacturers and digital content creators.
5G adoption continues to grow rapidly in pioneer markets, with the total number of connections set to reach 1 billion in 2022. Momentum has been boosted by a number of factors, including the economic recovery from the pandemic, rising 5G handset sales, network coverage expansions and overall marketing efforts by mobile operators. Meanwhile, a new wave of 5G rollouts in large markets with modest income levels (such as Brazil, Indonesia and India) could further incentivise the mass production of more affordable 5G devices, which in turn could further bolster subscriber growth. By the end of 2025, 5G will account for around a quarter of total mobile connections and more than two in five people around the world will live within reach of a 5G network.
4G still has room to grow in most developing markets, particularly in SubSaharan Africa, where 4G adoption is still below a fifth of total connections and operators are stepping up efforts to migrate existing 2G and 3G customers to 4G networks. However, rising 5G adoption in leading markets, such as China, South Korea and the US, means that 4G adoption on a global level is beginning to decline. Globally, 4G adoption will account for 55% of total connections by 2025, down from a peak of 58% in 2021.
By the end of 2021, 5.3 billion people subscribed to mobile services, representing 67% of the global population. In a growing number of markets, most adults now own a mobile phone, meaning that future growth will come from younger populations taking out a mobile subscription for the first time. Over the period to 2025, there will be an additional 400 million new mobile subscribers, most of them from Asia Pacific and Sub-Saharan Africa, taking the total number of subscribers to 5.7 billion (70% of the global population).
In 2021, mobile technologies and services generated $4.5 trillion of economic value added, or 5% of GDP, globally. This figure will grow by more than $400 billion by 2025 to nearly $5 trillion as countries increasingly benefit from the improvements in productivity and efficiency brought about by the increased take-up of mobile services. 5G is expected to benefit all economic sectors of the global economy during this period, with services and manufacturing experiencing the most impact.
For anyone interested in keeping a track of which 2G/3G networks are undergoing sunset, you can follow my Twitter thread that lists all the networks I become aware of
Orange is shutting down some 2G/3G networks in Europe, African opcos won't be affected. In summary: * France: 2G shutdown 2025, 3G sunset 2028 * Rest of Europe: 3G switch off by 2025 & 2G latest by 2030#2G#3G#3G4G5G#2G3Gshutdownhttps://t.co/3iYF93MWej
I looked at IMS briefly in my LTE voice tutorial here. The Nokia Lectures covered IMS in-depth in part 5 of the video. I recently came across a short overview of IMS for SBA. You can see our old tutorial on Service Based Architecture (SBA) for 5G Core (5GC) here.
I came across this short video from Mpirical that nicely explains the IMS support for SBA. It's embedded below. The related posts at the bottom may also be worth checking out.
Artificial Intelligence and Machine Learning have moved on from just being buzzwords to bringing much needed optimization and intelligence in devices, networks and infrastructure; whether on site, on the edge or in the cloud.
Qualcomm has been very active in talking about AI/ML in webinars and on their site. A detailed blog post looking at 'What’s the role of artificial intelligence in the future of 5G and beyond?' is available here. It was posted in time for a Light Reading webinar where Gabriel Brown, Principal Analyst – Mobile Networks and 5G, Heavy Reading and Tingfang Ji, Senior Director, Engineering - Wireless R&D, Qualcomm discuss the topic. The video is embedded below and slide deck is available here.
Louis Scialabba, Senior Director of Marketing at Mavenir, looking at AI and Analytics spoke at Layer 123 conference on the topic, 'AI/ML for Next Gen 5G Mobile Networks'. His talk is embedded below and a blog post by him on the topic, 'The RIC Opens a New World of Opportunities for CSPs' is available here.
A new 3GPP Technical report, TR 38.858 (draft not available yet) will look at Study on evolution of NR duplex operation (FS_NR_duplex_evo) in Rel-18. RP-213591 provides a justification on why this new duplex evolution needs to be studied:
TDD is widely used in commercial NR deployments. In TDD, the time domain resource is split between downlink and uplink. Allocation of a limited time duration for the uplink in TDD would result in reduced coverage, increased latency and reduced capacity. As a possible enhancement on this limitation of the conventional TDD operation, it would be worth studying the feasibility of allowing the simultaneous existence of downlink and uplink, a.k.a. full duplex, or more specifically, subband non-overlapping full duplex at the gNB side within a conventional TDD band.
The NR TDD specifications allow the dynamic/flexible allocation of downlink and uplink in time and CLI handling and RIM for NR were introduced in Rel-16. Nevertheless, further study may be required for CLI handling between the gNBs of the same or different operators to enable the dynamic/flexible TDD in commercial networks. The inter-gNB CLI may be due to either adjacent-channel CLI or co-channel-CLI, or both, depending on the deployment scenario. One of the problems not addressed in the previous releases is gNB-to-gNB CLI.
This study aims to identify the feasibility and solutions of duplex evolution in the areas outlined above to provide enhanced UL coverage, reduced latency, improved system capacity, and improved configuration flexibility for NR TDD operations in unpaired spectrum. In addition, the regulatory aspects need to be examined for deploying identified duplex enhancements in TDD unpaired spectrum considering potential constraints.
Samsung has a technical white paper on this topic which they refer to as XDD (Cross Division Duplex), available here. The abstract says:
XDD (Cross Division Duplex) is one of the key technologies that Samsung is proposing as part of Rel-18 NR (5G-Advanced) to address the coverage issue observed during the initial phase of 5G deployment. XDD provides improved coverage, capacity, and latency compared to conventional TDD. Instead of relying solely on orthogonal time resources for DL-UL separation as in TDD, XDD allows simultaneous DL-UL operation by using non-overlapping frequency resources within a carrier bandwidth.
This white paper provides a high level description of XDD concept, benefits, and implementation challenges. First, an overview of XDD including a comparison with conventional TDD and FDD is provided. Next, the implementation challenges of XDD especially at the base station to handle self-interference mitigation is provided. Furthermore, several features that we consider critical in realizing XDD in actual deployment scenarios are provided along with some performance results. Finally, Samsung’s view on XDD for the next phase of 5G (5G-Advanced) is provided.
An open access IEEE Access paper, 'Extending 5G TDD Coverage With XDD', written by Samsung researchers provides a much more detailed insight into this topic. The abstract says:
In this paper, an advanced duplex scheme called cross-division duplex (XDD) is proposed to enhance uplink (UL) coverage in time division duplex (TDD) carriers by utilizing self-interference cancellation (SIC) capability at a base station. With XDD, it is possible to combine TDD’s ability to efficiently handle asymmetric UL and downlink (DL) traffic with frequency division duplex’s coverage advantage. To do so, XDD simultaneously operates UL and DL on the same TDD carrier but on different frequency resources. Such operation leads to severe interference on the received UL signal at the base station which requires two levels of SIC implementation; antenna and digital SIC. More than 50 dB of interference is removed through the antenna SIC using electromagnetic barriers between the transmitting and receiving antennas. The remaining interference is removed by the digital SIC based on estimating the non-linear channel of the circuit at the receiver baseband. It is verified by simulation and analysis that with the proposed XDD, the UL coverage can be improved by up to 2.37 times that of TDD. To check the feasibility of XDD, a Proof-of-Concept was developed where it was observed that the benefits of XDD can indeed be realized using the proposed SIC techniques
In the segment of the video embedded below, Dr. Hyoung Ju Ji, Principal Engineer, Samsung Electronics, Korea explains how XDD is a Realistic Option for Full Duplex Realization.
Pentests or Penetration testing is ethical hacking that is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system. They are performed to identify weaknesses or vulnerabilities, including the potential for unauthorized parties to gain access to the system's features and data, as well as strengths, enabling a full risk assessment to be completed.
Expected to be released in 2021, we only see the early stage of 5G-NR connectivity in rare places around the world and we cannot talk yet about "real 5G" as current installations are put on the Non-Standalone mode (NSA) using 4G infrastructures. But in the meantime, it is important to get prepared for this upcoming technology and ways we can practically simulate real-world attacks in the future, with Standalone (SA) mode-capable devices and networks. In this presentation, we will see how to conduct practical security assignments on future 5G SA devices and networks, and how to investigate the protocol stack. To begin the presentation, we briefly present the differences with 2G-5G in terms of security applied to security assessment contexts, i.e. the limit we are left with, and how to circumvent them. Then we see how a 5G-NR security testbed looks like, and discuss what type of bugs are interesting to spot. Third, we make more sense about some attacks on devices by showing attacks that could be performed on the core side from the outside. Finally, we briefly introduce how we could move forward by looking at the 5G protocol stack and the state of the current mean.
Slides are available here and the video is embedded below:
A post on their website also looks at penetration of standalone 5G core. The post contains a video as well which can also be directly accessed here.
A new white paper from 5G Americas provides nearly annual updates around the topic of security in wireless cellular networks. The current edition addresses emerging challenges and opportunities, making recommendations for securing 5G networks in the context of the evolution to cloud-based and distributed networks.
Additionally, the white paper provides insight into securing 5G in private, public, and hybrid cloud deployment models. Topics such as orchestration, automation, cloud-native security, and application programming interface (API) security are addressed. The transition from perimeter-based security to a zero-trust architecture to protect assets and data from external and internal threats is also discussed.
In early December 2021, 3GPP reached a consensus on the scope of 5G NR Release-18. With the 3GPP Rel-17 functional freeze set for March 2022, Release-18 work is moving into focus. This is being billed as a significant milestone marking the beginning of 5G Advanced — the second wave of wireless innovations that will fulfil the 5G vision. Release 18 is expected to build on the solid foundation set by 3GPP Releases 15, 16, and 17, and it sets the longer-term evolution direction of 5G and beyond.
The 3GPP Release-18 page has a concise summary of all that you need to know, including the timeline. For anyone interested in going through features one-by-one, start navigating from here, select Rel-18 from the top.
For others who may be more interested in summary rather than a lot of details, here are some good links to navigate:
Nokia whitepaper - 5G-Advanced: Expanding 5G for the connected world (link)
Paper by Ericsson researcher, Xingqin Lin, 'An Overview of 5G Advanced Evolution in 3GPP Release 18' (link)
Marcin Dryjański, Rimedo Labs - 3GPP Rel-18: 5G-Advanced RAN Features (link)
Bevin Fletcher, FierceWireless: Next 3GPP standard tees up 5G Advanced (link)
As always, Qualcomm has a fantastic summary of 5G evolution and features in 3GPP Release-18 on their page here. The image above nicely shows the evolution of 5G from Release-15 all the way to Release-18. The image below shows a summary of 3GPP Release-18, 5G-Advanced features.
They also hosted a webinar with RCR wireless. The webinar is embedded below.
The slides can be downloaded from GSA website (account required, free to register) here.
We have looked at 5G Non Terrestrial Networks (NTN) in many different posts in our blogs. If you are new to this topic then this tutorial with a video is a good place to start or just follow this IEEE Comsoc article or this short update from R&S here.
Nicolas Chuberre is the rapporteur of the NR_NTN_solutions work item (TSG RAN) and of the FS-5GET study item (WG SA1) from Thales Alenia Space. In the October 2021 issue of 3GPP Highlights newsletter, he along with Munira Jaffar, Lead delegate representing EchoStar and Hughes Standards in ESOA (EMEA Satellite Operators Association) Standards Working Group, wrote a summary of 'Status of NTN & Satellite in 3GPP Releases 17 & 18'.
The approval of normative activities on Non-Terrestrial Networks (NTN) in Rel-17 has generated growing interest in the topic. The Rel-17 NTN work items are supported by a wide range of vendors (terminal, chipset, network), as well as service providers from both the mobile and space industries and vertical user groups including ESOA.
The Rel-17 NTN and satellite work items in Technical Specification Group (TSG) RAN and TSG SA have been progressing towards the goal of satellite inclusion in 3GPP technical specifications. The focus is on transparent payload architecture with FDD systems where all UEs are assumed to have GNSS capabilities. The normative phase includes adaptation to the physical & access layer aspects, radio access network and system architecture, radio resource management, and RF requirements for targeted satellite networks operating at LEO, MEO or GEO orbits.
With an expected completion date of March 2022, the 3GPP Rel-17 specifications will support New Radio (NR) based satellite access deployed in FR1 bands serving handheld devices for global service continuity. Equally exciting, the 3GPP Rel-17 specification will support NB-IoT and eMTC based satellite access to address massive Internet of Things (IoT) use cases in areas such as agriculture, transport, logistics and many more.
This joint effort between mobile and satellite industries will enable the full integration of satellite in the 3GPP ecosystem and define a global standard for future satellite networks. This will address the challenges of reachability and service continuity in unserved/underserved areas, enhance reliability through connectivity between various access technologies, and improve network resilience and dependability in responding to natural and manmade disasters.
Upon completion of Rel-17 the long-awaited standard for satellite networks serving handheld devices should be in place by 2022, with commercial product availability expected sometime in 2024. Including satellite as part of the 3GPP specifications will support the promise of worldwide access to 5G services and drive explosive growth in the satellite industry.
Looking ahead, ESOA members and other NTN stakeholders have started discussions during the 3GPP Rel-18 June workshop and are continuing to work on a further list of enhancements for both NR-NTN and IoT-NTN to be considered in Rel-18. Plans are also underway to further define the enablers for NR based satellite access in bands above 10 GHz to serve fixed and moving platforms (e.g., aircraft, vessels, UAVs) as well as building- mounted devices (e.g., businesses and premises). The goal of these efforts is to further optimize satellite access performance, address new bands with their specific regulatory requirements, and support new capabilities and services as the evolution of 5G continues.
At Mobile Korea 2021, Nicolas Chuberre gave a talk on '3GPP NTN standardization: past, current and future'. The talk nicely summarizes Release-17 progress and the features planned for 3GPP Release-18. His talk is embedded below: