blog posts

magma In

ALL BLOGS

To build opensource community around 5G ecosystem

MAGMA HN MILENAGE

BY – Shubham Kumar Source: https://www.etsi.org/deliver/etsi_ts/133100_133199/133102/11.05.01_60/ts_133102v110501p.pdf Section 3.2 Generating 5G Authentication Vectors Source: https://github.com/magma/magma/blob/6122b3a667ba8e0c29dda827261904c1efc963ed/lte/gateway/python/magma/subscriberdb/crypto/milenage.py#L56 Generating SQN Source: https://www.etsi.org/deliver/etsi_ts/133100_133199/133102/11.05.01_60/ts_133102v110501p.pdf Section: C.3.2, C.1.1.2 C.1.1.1 Source: https://github.com/magma/magma/blob/master/lte/gateway/python/magma/subscriberdb/processor.py#L323 Generating RAND Source: https://github.com/magma/magma/blob/6122b3a667ba8e0c29dda827261904c1efc963ed/lte/gateway/python/magma/subscriberdb/crypto/milenage.py#L292 Generating OPc OPc(​Derived operator code unique for each SIM) is derived from OP(Operator Code) and K(Secret Key). OP and K are first encrypted using AES-128 Encryption Algorithm …

MAGMA HN MILENAGE Read More »

ECIES in 5G Core: SUPI to SUCI Conversion

BY – Aditya Koranga SUPI stands for Subscription Permanent Identifier, a permanent unique identifier assigned to each sim card for the identity of a subscriber. In 4G it was called IMSI(International Mobile Subscriber Identity). SUPI is a 15 or 16 digits string that contains MCC(Mobile Country Code), MNC(Mobile Network Code), and MSIN(Mobile Subscriber Identification Number). …

ECIES in 5G Core: SUPI to SUCI Conversion Read More »

AKA Procedure

BY SHUBHAM KUMAR If the UE(User Equipment) is previously registered with the network, it will have a temporary identifier, 5G-GUTI(5G- Global Unique Temporary Identifier) stored in it. The UE will use this identifier for the Identification procedure. The 5G-GUTI is sent to the SEAF(Security Anchor Function) in the logical N1 interface where SUPI(Subscription Permanent Identifier) …

AKA Procedure Read More »

OAI, Free5gc, open5gs, MAgma 5G Core STANDARDS FOR AMF

BY SHUBHAM KUMAR The table shows different Technical Specifications used in OAI, OPEN5GS, FREE5GC, and MAGMA for the 5G Core AMF Function. Basis OAI 5G Core AMF FREE5GC 5G Core AMF OPEN5GS 5G Core AMF Magma 5G Core Accessd Language  C++ Golang  C C++ Registration Management ETSI TS 123 501 V16.6.0  – 5.3.23GPP TS 23.501 5.3.2 …

OAI, Free5gc, open5gs, MAgma 5G Core STANDARDS FOR AMF Read More »

NR Reference signals

by Shubham Kumar Reference signals are unique signals only present in Physical channels and are used to deliver a reference point for resource scheduling during Uplink and downlink transmission. It occupies specific resource elements within the grid. NR constitutes of 4 reference signals i.e. NR RF VS LTE RF: Types of Reference Signals: DMRS Apart …

NR Reference signals Read More »

NR Frame Structure

By Shubham Kumar Data(UL/DL) is transmitted in the form of radio frames in the air. Radio Frames are of a duration of 10ms which consists of 10 subframes each having a duration of 1ms. Subframes inside a radio frame are serialized as SF0, SF1, SF2, SF3, …., and SF9. A subframe is made up of a …

NR Frame Structure Read More »

SSB AND PBCH

PBCH It carries the broadcast information known to be as MIS (minimum system information). It carries information like SSB index, half-frame number and system frame number. It is also used for frame and slot synchronization. Now, the modulation used for PBCH is QPSK modulation and it also has the DMRS signals used to know the …

SSB AND PBCH Read More »

SERVICE BASED ARCHITECTURE

Microservices When the large applications are broken down into the different small services it’s known to be microservices. Each service is performing the desired task and they can communicate with each other through an interface which is known as the SBI (service-based interface). By using the microservices architecture, they provide flexibility like different services performing …

SERVICE BASED ARCHITECTURE Read More »

NETWORK SLICING

Network slicing overlays multiple virtual networks on top of a shared network. There are some limits imposed by the physical networks. The idea of living is to use an underlying physical network and takes its capabilities and divide it into the logical section where each section can have different performance characteristics. Now for different performance …

NETWORK SLICING Read More »

5G IDENTIFIER

IDENTIFIERS IN 5G Identifiers are used who uniquely recognize the entity. Send all the connection characteristics are tied to this identity. For example, if the device identity can be used it will be fine if it is a blacklisted device or not. Subscription identity is used to define if the subscription allows a certain 5G …

5G IDENTIFIER Read More »

RAN PROTOCOL STACK PART-3: PHY (Functions), NAs, rrc

Read the first part here: https://blog.magmaindia.org/ran-protocol-stack-sdap-pdcp-rlc/ Read the second part here: https://blog.magmaindia.org/ran-protocol-stack-mac-phy-part-2/ 5. PHY-Layer (functions) CRCFirst we need a mechanism to detect error on the level of transport block. For this purpose CRC(Cyclic Redundancy Check) is calculated and added to the transport block. On the receiver side, CRC can be used to detect error in …

RAN PROTOCOL STACK PART-3: PHY (Functions), NAs, rrc Read More »

Ran Protocol Stack Part-2: MAC , PHY

Read the first part here: https://blog.magmaindia.org/category/5g-ran-protocol/ 4. MAC (Medium Access Control) These are the functions of Mac :- 1. Logical-channel multiplexing 2. Hybrid-ARQ retransmission 3. Scheduling 4. Multiplexing/Demultiplexing for carrier aggregation Multiplexing Logical Channel MAC layer provides the services to the RLC in the form of logical channels. MAC layer uses services from PHY layer …

Ran Protocol Stack Part-2: MAC , PHY Read More »