MAGMA HN MILENAGE

BY – Shubham Kumar Source: https://www.etsi.org/deliver/etsi_ts/133100_133199/133102/11.05.01_60/ts_133102v110501p.pdf Section 3.2 Generating 5G Authentication Vectors Source: https://github.com/magma/magma/blob/6122b3a667ba8e0c29dda827261904c1efc963ed/lte/gateway/python/magma/subscriberdb/crypto/milenage.py#L56 Generating SQN Source: https://www.etsi.org/deliver/etsi_ts/133100_133199/133102/11.05.01_60/ts_133102v110501p.pdf Section: C.3.2, C.1.1.2 C.1.1.1 Source: https://github.com/magma/magma/blob/master/lte/gateway/python/magma/subscriberdb/processor.py#L323 Generating RAND Source: https://github.com/magma/magma/blob/6122b3a667ba8e0c29dda827261904c1efc963ed/lte/gateway/python/magma/subscriberdb/crypto/milenage.py#L292 Generating OPc OPc(​Derived operator code unique for each SIM) is derived from OP(Operator Code) and K(Secret Key). OP and K are first encrypted using AES-128 Encryption Algorithm …

MAGMA HN MILENAGE Read More »

ECIES in 5G Core: SUPI to SUCI Conversion

BY – Aditya Koranga SUPI stands for Subscription Permanent Identifier, a permanent unique identifier assigned to each sim card for the identity of a subscriber. In 4G it was called IMSI(International Mobile Subscriber Identity). SUPI is a 15 or 16 digits string that contains MCC(Mobile Country Code), MNC(Mobile Network Code), and MSIN(Mobile Subscriber Identification Number). …

ECIES in 5G Core: SUPI to SUCI Conversion Read More »

AKA Procedure

BY SHUBHAM KUMAR If the UE(User Equipment) is previously registered with the network, it will have a temporary identifier, 5G-GUTI(5G- Global Unique Temporary Identifier) stored in it. The UE will use this identifier for the Identification procedure. The 5G-GUTI is sent to the SEAF(Security Anchor Function) in the logical N1 interface where SUPI(Subscription Permanent Identifier) …

AKA Procedure Read More »

OAI, Free5gc, open5gs and Magma 5G Core STANDARDS FOR SMF

BY ADITYA KORANGA The table shows different Technical Specifications used in OAI, OPEN5GS, FREE5GC and Magma for 5G Core SMF Function. Basis OAI 5G Core FREE5GC 5G Core OPEN5GS 5G Core MAGMA 5G CORE Language  C++ Golang  C C++ SM Context Management ETSI TS 123 502 V16.7.0– 5.2.8.2 3GPP TS 23.502 5.2.8.2 ETSI TS 123 …

OAI, Free5gc, open5gs and Magma 5G Core STANDARDS FOR SMF Read More »

OAI, Free5gc, open5gs, MAgma 5G Core STANDARDS FOR AMF

BY SHUBHAM KUMAR The table shows different Technical Specifications used in OAI, OPEN5GS, FREE5GC, and MAGMA for the 5G Core AMF Function. Basis OAI 5G Core AMF FREE5GC 5G Core AMF OPEN5GS 5G Core AMF Magma 5G Core Accessd Language  C++ Golang  C C++ Registration Management ETSI TS 123 501 V16.6.0  – 5.3.23GPP TS 23.501 5.3.2 …

OAI, Free5gc, open5gs, MAgma 5G Core STANDARDS FOR AMF Read More »

NR Reference signals

by Shubham Kumar Reference signals are unique signals only present in Physical channels and are used to deliver a reference point for resource scheduling during Uplink and downlink transmission. It occupies specific resource elements within the grid. NR constitutes of 4 reference signals i.e. NR RF VS LTE RF: Types of Reference Signals: DMRS Apart …

NR Reference signals Read More »

5G UE STATE MANAGEMENT

In 5G, it provides different services to the devices. For providing that service is the 5G system, it needs to track the availability and also the reachability of the device. 5G system tracks these states of the device such as:- RRC (radio resource control), Connection Management (CM), and Registration management (RM). RRC determines the RRC …

5G UE STATE MANAGEMENT Read More »

SSB AND PBCH

PBCH It carries the broadcast information known to be as MIS (minimum system information). It carries information like SSB index, half-frame number and system frame number. It is also used for frame and slot synchronization. Now, the modulation used for PBCH is QPSK modulation and it also has the DMRS signals used to know the …

SSB AND PBCH Read More »

SERVICE BASED ARCHITECTURE

Microservices When the large applications are broken down into the different small services it’s known to be microservices. Each service is performing the desired task and they can communicate with each other through an interface which is known as the SBI (service-based interface). By using the microservices architecture, they provide flexibility like different services performing …

SERVICE BASED ARCHITECTURE Read More »

MAC SCHEDULER ( UPLINK AND DOWNLINK SCHEDULING )

There is a finite set of time and frequency resources. These resources are dynamically allocated to the different connected devices (UE) that are accessing the 5G network, in such a manner that they will efficiently serve the network. This is known as shared channel transmission. The main function of scheduling is to decide which devices …

MAC SCHEDULER ( UPLINK AND DOWNLINK SCHEDULING ) Read More »

NETWORK SLICING

Network slicing overlays multiple virtual networks on top of a shared network. There are some limits imposed by the physical networks. The idea of living is to use an underlying physical network and takes its capabilities and divide it into the logical section where each section can have different performance characteristics. Now for different performance …

NETWORK SLICING Read More »

5G CALL FLOW PART-3: PDU SESSION ESTABLISHMENT PROCEDURE

Whenever a new PDU Session is created, then this procedure is employed. Alternatively, when a PDU Session is handed over from non-3GPP access like Wi-Fi, at that time the PDU Session establishment procedure is used. Typically this procedure is always initiated by the device. But if the network would like to trigger it, then it …

5G CALL FLOW PART-3: PDU SESSION ESTABLISHMENT PROCEDURE Read More »

5G CALL FLOWS PART-1: REGISTRATION PROCEDURE

When a 5G device is first turned ON, it needs to register itself with the network before accessing the 5G services. This process is known as registration. But power on is not only the situation when this registration happens. It can be defined in four categories as i) Initial Procedureii) Periodic Procedureiii) Mobility Procedureiv) Emergency …

5G CALL FLOWS PART-1: REGISTRATION PROCEDURE Read More »

5G IDENTIFIER

IDENTIFIERS IN 5G Identifiers are used who uniquely recognize the entity. Send all the connection characteristics are tied to this identity. For example, if the device identity can be used it will be fine if it is a blacklisted device or not. Subscription identity is used to define if the subscription allows a certain 5G …

5G IDENTIFIER Read More »

RAN PROTOCOL STACK PART-3: PHY (Functions), NAs, rrc

Read the first part here: https://blog.magmaindia.org/ran-protocol-stack-sdap-pdcp-rlc/ Read the second part here: https://blog.magmaindia.org/ran-protocol-stack-mac-phy-part-2/ 5. PHY-Layer (functions) CRCFirst we need a mechanism to detect error on the level of transport block. For this purpose CRC(Cyclic Redundancy Check) is calculated and added to the transport block. On the receiver side, CRC can be used to detect error in …

RAN PROTOCOL STACK PART-3: PHY (Functions), NAs, rrc Read More »

Ran Protocol Stack Part-2: MAC , PHY

Read the first part here: https://blog.magmaindia.org/category/5g-ran-protocol/ 4. MAC (Medium Access Control) These are the functions of Mac :- 1. Logical-channel multiplexing 2. Hybrid-ARQ retransmission 3. Scheduling 4. Multiplexing/Demultiplexing for carrier aggregation Multiplexing Logical Channel MAC layer provides the services to the RLC in the form of logical channels. MAC layer uses services from PHY layer …

Ran Protocol Stack Part-2: MAC , PHY Read More »

Ran Protocol Stack ( SDAP, PDCP, RLC) Part-1

There are two different types of Ran Protocol Stack as follow 1) User-Plane Protocol Stack 2) Control-Plane Protocol Stack Lets us discuss with the help of diagram USER-PLANE PROTOCOL STACK It supports in carrying the user data network between different applications of user equipment and in the network. Each layers shown in above diagram provides …

Ran Protocol Stack ( SDAP, PDCP, RLC) Part-1 Read More »