
"The objective is to build an unified platform, where open-source projects related to 5G can be evangelized through research & development and education & advocacy."
Magma India
latest post
MAGMA HN MILENAGE
BY – Shubham Kumar Source: https://www.etsi.org/deliver/etsi_ts/133100_133199/133102/11.05.01_60/ts_133102v110501p.pdf Section 3.2 Generating 5G Authentication Vectors Source: https://github.com/magma/magma/blob/6122b3a667ba8e0c29dda827261904c1efc963ed/lte/gateway/python/magma/subscriberdb/crypto/milenage.py#L56 Generating SQN Source: https://www.etsi.org/deliver/etsi_ts/133100_133199/133102/11.05.01_60/ts_133102v110501p.pdf Section: C.3.2, C.1.1.2 C.1.1.1 Source: https://github.com/magma/magma/blob/master/lte/gateway/python/magma/subscriberdb/processor.py#L323 Generating RAND Source: https://github.com/magma/magma/blob/6122b3a667ba8e0c29dda827261904c1efc963ed/lte/gateway/python/magma/subscriberdb/crypto/milenage.py#L292 Generating OPc OPc(Derived operator code unique for each SIM) is derived from OP(Operator Code) and K(Secret Key). OP and K are first encrypted using AES-128 Encryption Algorithm …
ECIES in 5G Core: SUPI to SUCI Conversion
BY – Aditya Koranga SUPI stands for Subscription Permanent Identifier, a permanent unique identifier assigned to each sim card for the identity of a subscriber. In 4G it was called IMSI(International Mobile Subscriber Identity). SUPI is a 15 or 16 digits string that contains MCC(Mobile Country Code), MNC(Mobile Network Code), and MSIN(Mobile Subscriber Identification Number). …
AKA Procedure
BY SHUBHAM KUMAR If the UE(User Equipment) is previously registered with the network, it will have a temporary identifier, 5G-GUTI(5G- Global Unique Temporary Identifier) stored in it. The UE will use this identifier for the Identification procedure. The 5G-GUTI is sent to the SEAF(Security Anchor Function) in the logical N1 interface where SUPI(Subscription Permanent Identifier) …
OAI, FREE5GC, OPEN 5GS 5G CORE STANDARDS FOR UPF
BY- SHUBHAM KUMAR The table shows different Technical Specifications used in OAI, OPEN5GS, and FREE5GC for the 5G Core UPF Function. Basis OAI FREE5GC OPEN5GS PFCP Node Management ETSI TS 129 244 – V16.5.0 – 7.4ETSI TS 129 244 – V15.5.0– 6.2 ETSI TS 129 244 – V15.5.0– 6.2 ETSI TS 123 502 – V15.2.0– 4.4.33GPP …
OAI, FREE5GC, OPEN 5GS 5G CORE STANDARDS FOR UPF Read More »
OAI, Free5gc, open5gs and Magma 5G Core STANDARDS FOR SMF
BY ADITYA KORANGA The table shows different Technical Specifications used in OAI, OPEN5GS, FREE5GC and Magma for 5G Core SMF Function. Basis OAI 5G Core FREE5GC 5G Core OPEN5GS 5G Core MAGMA 5G CORE Language C++ Golang C C++ SM Context Management ETSI TS 123 502 V16.7.0– 5.2.8.2 3GPP TS 23.502 5.2.8.2 ETSI TS 123 …
OAI, Free5gc, open5gs and Magma 5G Core STANDARDS FOR SMF Read More »
OAI, Free5gc, open5gs, MAgma 5G Core STANDARDS FOR AMF
BY SHUBHAM KUMAR The table shows different Technical Specifications used in OAI, OPEN5GS, FREE5GC, and MAGMA for the 5G Core AMF Function. Basis OAI 5G Core AMF FREE5GC 5G Core AMF OPEN5GS 5G Core AMF Magma 5G Core Accessd Language C++ Golang C C++ Registration Management ETSI TS 123 501 V16.6.0 – 5.3.23GPP TS 23.501 5.3.2 …
OAI, Free5gc, open5gs, MAgma 5G Core STANDARDS FOR AMF Read More »
NR Reference signals
by Shubham Kumar Reference signals are unique signals only present in Physical channels and are used to deliver a reference point for resource scheduling during Uplink and downlink transmission. It occupies specific resource elements within the grid. NR constitutes of 4 reference signals i.e. NR RF VS LTE RF: Types of Reference Signals: DMRS Apart …
NR Frame Structure
By Shubham Kumar Data(UL/DL) is transmitted in the form of radio frames in the air. Radio Frames are of a duration of 10ms which consists of 10 subframes each having a duration of 1ms. Subframes inside a radio frame are serialized as SF0, SF1, SF2, SF3, …., and SF9. A subframe is made up of a …
5G UE STATE MANAGEMENT
In 5G, it provides different services to the devices. For providing that service is the 5G system, it needs to track the availability and also the reachability of the device. 5G system tracks these states of the device such as:- RRC (radio resource control), Connection Management (CM), and Registration management (RM). RRC determines the RRC …
SSB AND PBCH
PBCH It carries the broadcast information known to be as MIS (minimum system information). It carries information like SSB index, half-frame number and system frame number. It is also used for frame and slot synchronization. Now, the modulation used for PBCH is QPSK modulation and it also has the DMRS signals used to know the …
SERVICE BASED ARCHITECTURE
Microservices When the large applications are broken down into the different small services it’s known to be microservices. Each service is performing the desired task and they can communicate with each other through an interface which is known as the SBI (service-based interface). By using the microservices architecture, they provide flexibility like different services performing …
MAC SCHEDULER ( UPLINK AND DOWNLINK SCHEDULING )
There is a finite set of time and frequency resources. These resources are dynamically allocated to the different connected devices (UE) that are accessing the 5G network, in such a manner that they will efficiently serve the network. This is known as shared channel transmission. The main function of scheduling is to decide which devices …
MAC SCHEDULER ( UPLINK AND DOWNLINK SCHEDULING ) Read More »
RAN PROCEDURE PART-2: RANDOM ACCESS
Through initial access, the device was able to find out the cell. Now with the random access procedure, the device will be able to access the cell. It was triggered in some different scenarios such as i) whenever the UE goes from RRC idle to RRC connected mode (maybe due to the device getting switched …
RAN PROCEDURE PART-1: INITIAL ACCESS
There was a 5G mobile and it was turned on. The first procedure to happen is cell search and cell selection when the phone is turned on. This allows the phone to find a cell. Cell search is the procedure by which the UE requires the time and frequency synchronization with the cell and detects …
NETWORK SLICING
Network slicing overlays multiple virtual networks on top of a shared network. There are some limits imposed by the physical networks. The idea of living is to use an underlying physical network and takes its capabilities and divide it into the logical section where each section can have different performance characteristics. Now for different performance …
5G CALL FLOW PART-4: SERVICE REQUEST PROCEDURE
This is the procedure which is used when the device wants to establish a connection to the AMF. There are two possible scenarios in which this can happen i) this can be used when the device does not have a connection to the AMF and hence uses this procedure to establish a new connection. In …
5G CALL FLOW PART-3: PDU SESSION ESTABLISHMENT PROCEDURE
Whenever a new PDU Session is created, then this procedure is employed. Alternatively, when a PDU Session is handed over from non-3GPP access like Wi-Fi, at that time the PDU Session establishment procedure is used. Typically this procedure is always initiated by the device. But if the network would like to trigger it, then it …
5G CALL FLOW PART-3: PDU SESSION ESTABLISHMENT PROCEDURE Read More »
5G CALL FLOWS PART-2: DEREGISTRATION PROCEDURE
When a device wants to access the services of the 5G system. It has to register itself with the network. When it is no longer wants to access the services, it has to deregistered from the 5G network. This is known as the deregistration procedure. The network can also initiate the deregistration procedure when it …
5G CALL FLOWS PART-1: REGISTRATION PROCEDURE
When a 5G device is first turned ON, it needs to register itself with the network before accessing the 5G services. This process is known as registration. But power on is not only the situation when this registration happens. It can be defined in four categories as i) Initial Procedureii) Periodic Procedureiii) Mobility Procedureiv) Emergency …
5G IDENTIFIER
IDENTIFIERS IN 5G Identifiers are used who uniquely recognize the entity. Send all the connection characteristics are tied to this identity. For example, if the device identity can be used it will be fine if it is a blacklisted device or not. Subscription identity is used to define if the subscription allows a certain 5G …
5g core network function part 5: PCF
Policy Control Function The policy is simply a rule for how the 5G system can manage the different users, data sessions or different data flows. The policy themselves can be specified as different levels of granularity such asi) some policies affect all the users in the same mannerii) some policies are user-specific, but it affects …
5G CORE NETWORK FUNCTION PART-4: UPF
User Plane Function The primary role of UPF in a 5G system is to provide interconnections toward the external data network. Data networks can be the Internet, IMS, enterprise system etc. In any case, we need UPF to provide connectivity between the 5G network and the data network. 5G technology is itself a mobile technology …
5G CORE NETWORK FUNCTION PART-3: UDm, UDR
Stateless Design If an application and designed in a way that the application logic is handled by the application entirely and that data lies entirely outside of the application function. Then it is called a stateless design. So we need to keep data, entirely decouples from the application logic. Unified Data Repository It is the …
5G CORE NETWORK FUNCTION PART-2: SMF
Session Management Function It is a control plane function in a 5G core network. SMF’s main function is PDU Session Management. PDU Session Management It is simply a logical connection between the device and the end of the user plane function (UPF) which in turn connects to the data network (DN) through the N6 interface. …
5g core network function part-1 : amf
Access and Mobility Management Function It is a control plane function in a 5G core network. AMF’s main function is as follows 1. Registration Management When the device is turned on, the device has to try to connect to the network, and then due-process it has to verify and validate that it is connecting to …
RAN PROTOCOL STACK PART-3: PHY (Functions), NAs, rrc
Read the first part here: https://blog.magmaindia.org/ran-protocol-stack-sdap-pdcp-rlc/ Read the second part here: https://blog.magmaindia.org/ran-protocol-stack-mac-phy-part-2/ 5. PHY-Layer (functions) CRCFirst we need a mechanism to detect error on the level of transport block. For this purpose CRC(Cyclic Redundancy Check) is calculated and added to the transport block. On the receiver side, CRC can be used to detect error in …
RAN PROTOCOL STACK PART-3: PHY (Functions), NAs, rrc Read More »
Ran Protocol Stack Part-2: MAC , PHY
Read the first part here: https://blog.magmaindia.org/category/5g-ran-protocol/ 4. MAC (Medium Access Control) These are the functions of Mac :- 1. Logical-channel multiplexing 2. Hybrid-ARQ retransmission 3. Scheduling 4. Multiplexing/Demultiplexing for carrier aggregation Multiplexing Logical Channel MAC layer provides the services to the RLC in the form of logical channels. MAC layer uses services from PHY layer …
Ran Protocol Stack ( SDAP, PDCP, RLC) Part-1
There are two different types of Ran Protocol Stack as follow 1) User-Plane Protocol Stack 2) Control-Plane Protocol Stack Lets us discuss with the help of diagram USER-PLANE PROTOCOL STACK It supports in carrying the user data network between different applications of user equipment and in the network. Each layers shown in above diagram provides …
Explore The World of 5g
Allowing operators to offer cellular service without vendor lock-in with a modern, open-source core network.