100% found this document useful (1 vote)
236 views2 pages

5G Core Deep Dive

This 40-hour course provides an in-depth overview of 5G core network functions including the Access and Mobility Management Function (AMF), Authentication Server Function (AUSF), NF Repository Function (NRF), and more. The course agenda covers topics such as service-based architecture, 5G QoS and policy, network slicing, network orchestration, multi-access edge computing (MEC), and 5G security. The target audiences are 4G and 5G core network engineers with prerequisites in wireless fundamentals and 4G network architecture.

Uploaded by

sanjaynolkha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
236 views2 pages

5G Core Deep Dive

This 40-hour course provides an in-depth overview of 5G core network functions including the Access and Mobility Management Function (AMF), Authentication Server Function (AUSF), NF Repository Function (NRF), and more. The course agenda covers topics such as service-based architecture, 5G QoS and policy, network slicing, network orchestration, multi-access edge computing (MEC), and 5G security. The target audiences are 4G and 5G core network engineers with prerequisites in wireless fundamentals and 4G network architecture.

Uploaded by

sanjaynolkha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

5G CORE DEEP DIVE

DURATION : 40 HOURS
DELIVERY MODE: ILT/VILT – Instructor Led Delivery, Virtual Instructor Led
Delivery
PRE-REQUISITE: Wireless Fundamentals, 4G Network Architecture
TARGET AUDIENCES: 4G Core Engineers, 5G Core Engineers

Agenda:

5G Network Functions
• Access and Mobility Management Function (AMF),
• Authentication Server Function (AUSF),
• NF Repository Function (NRF),
• Network Slice Selection Function (NSSF),
• Policy Control Function (PCF),
• Session Management Function (SMF),
• User Plane Function (UPF),
• CHF (Charging Function),
• Unified Data Management (UDM)
• Unified Data Repository (UDR)
• Network Exposure Function (NEF)
Service Based Architecture
• SBA Overview,
• REST Principles,
• NR Services Authorization,
• NF Discovery and Selection,
• Network Slicing and Slice Allocation
5G QoS, Policy and Billing
• 5G QOS to QFI to DRB mapping
• AM and SM Policies,
• UE Policies (URSP for Slicing),
• PDR (Packet Detection Rule),
• URR (Usage Reporting Rule),
• How Billing in 5G is different from 4G,
• Billing call flow

© www.TelcoLearn.com | +91-8810549800
5G Network Slicing
• What is Network Slicing and why do we need it?
• Network Slicing use cases
• What is Network Slicing?
• Network Slicing in 5G Networks
• Support of Slicing in Core Network, Radio Network and Transport Networks
• How do we manage Network Slicing?
• How a UE selects Network Slice?
• Slicing during Registration
• Slicing during Session establishment
• Network Slicing Life Cycle
• Network Slice Management
• Deployment of Network Slices

Network Orchestration
• Need of Orchestration in 5G Networks
• Distributed cloud is an essential element for low-latency services and
applications
• Benefits of distributed clouds
• Deployment options in distributed cloud for 5G
• Need of Network Orchestrator
• Role of Network Orchestrator in Management of Resources.
• Open Source Initiatives for Network Orchestration -ONAP, ETSI
• Role of AI/ML in network orchestration
MEC- Multi Access Edge Computing
• Multi-Access Edge Computing (MEC)
• What is MEC?
• Need for MEC
• Benefits of MEC
• MEC in 5G network Deployment
• MEC Architecture
• The architecture of LTE and 5G for MEC
• MEC Enablers
• Enablers for MEC-Edge cloud, NFC, SDN
• MEC in 5G RAN and Core Networks
• MEC Orchestration
5G Security
• Security Framework in 5G
• UE Security Framework (SUPI, SUCI, AAA)
• Networks Security
• Transport layer Security
• Application (NF) level Security
• Inter-PLMN security

You might also like