blog posts
magma In
ALL BLOGS
To build opensource community around 5G ecosystem
Magma HN Milenage
Source: https://www.etsi.org/deliver/etsi_ts/133100_133199/133102/11.05.01_60/ts_133102v110501p.pdfSection: 3.2 Generating 5G Authentication Vectors This code generates magma 5g authentication vectors such as RAND, XRES*, AUTN, and Kseaf key using different parameters. Code SS: Source: https://github.com/magma/magma/blob/6122b3a667ba8e0c29dda827261904c1efc963ed/lte/gateway/python/magma/subscriberdb/crypto/milenage.py#L56 Generating SQN SQN is derived by adding some SEQ(Sequence Number) and IND(Index) Values. Source: https://www.etsi.org/deliver/etsi_ts/133100_133199/133102/11.05.01_60/ts_133102v110501p.pdfSection: C.1.1.1, C.1.1.2, C.1.2, C.3.2 Code SS: Source: https://github.com/magma/magma/blob/master/lte/gateway/python/magma/subscriberdb/processor.py#L323 Generating RAND Code …
ECIES Implementation in 5G Core: SUPI to SUCI conversioN
SUPI stands for Subscription Permanent Identifier, a permanent unique identifier assigned to each sim card for the identity of a subscriber. In 4G it was called IMSI(International Mobile Subscriber Identity). SUPI is a 15 or 16 digits string that contains MCC(Mobile Country Code), MNC(Mobile Network Code), and MSIN(Mobile Subscriber Identification Number). SUPI can also be …
ECIES Implementation in 5G Core: SUPI to SUCI conversioN Read More »
AKA Procedure
If the UE(User Equipment) is previously registered with the network, it will have a temporary identifier, 5G-GUTI(5G- Global Unique Temporary Identifier) stored in it. The UE will use this identifier for the Identification procedure. The 5G-GUTI is sent to the SEAF(Security Anchor Function) in the logical N1 interface where SUPI(Subscription Permanent Identifier) is derived from …
OAI, FREE5GC, OPEN 5GS 5G CORE STANDARDS FOR UPF
The table shows different Technical Specifications used in OAI, OPEN5GS, and FREE5GC for the 5G Core UPF Function. Basis OAI FREE5GC OPEN5GS PFCP Node Management ETSI TS 129 244 – V16.5.0 – 7.4ETSI TS 129 244 – V15.5.0– 6.2 ETSI TS 129 244 – V15.5.0– 6.2 ETSI TS 123 502 – V15.2.0– 4.4.33GPP TS 23.502 4.4.3 …
OAI, FREE5GC, OPEN 5GS 5G CORE STANDARDS FOR UPF Read More »
OAI, Free5gc, open5gs and Magma 5G Core STANDARDS FOR SMF
The table shows different Technical Specifications used in OAI, OPEN5GS, FREE5GC and Magma for 5G Core SMF Function. Basis OAI 5G Core FREE5GC 5G Core OPEN5GS 5G Core MAGMA 5G CORE Language C++ Golang C C++ SM Context Management ETSI TS 123 502 V16.7.0– 5.2.8.2 3GPP TS 23.502 5.2.8.2 ETSI TS 123 502 V15.2.0– 5.2.8.23GPP …
OAI, Free5gc, open5gs and Magma 5G Core STANDARDS FOR SMF Read More »
OAI, Free5gc, open5gs, MAgma 5G Core STANDARDS FOR AMF
The table shows different Technical Specifications used in OAI, OPEN5GS, FREE5GC, and MAGMA for the 5G Core AMF Function. Basis OAI 5G Core AMF FREE5GC 5G Core AMF OPEN5GS 5G Core AMF Magma 5G Core Accessd Language C++ Golang C C++ Registration Management ETSI TS 123 501 V16.6.0 – 5.3.23GPP TS 23.501 5.3.2 3GPP TS 23.501 …
OAI, Free5gc, open5gs, MAgma 5G Core STANDARDS FOR AMF Read More »
NR Reference signals
Reference signals are unique signals only present in Physical channels and are used to deliver a reference point for resource scheduling during Uplink and downlink transmission. It occupies specific resource elements within the grid. NR constitutes of 4 reference signals i.e. DMRS(Demodulation Reference Signal) PTRS(Phase Tracking Reference Signal) CSI-RS(Channel State Information Reference Signal) SRS(Sounding Reference …
NR Frame Structure
Data(UL/DL) is transmitted in the form of radio frames in the air. Radio Frames are of a duration of 10ms which consists of 10 subframes each having a duration of 1ms. Subframes inside a radio frame are serialized as SF0, SF1, SF2, SF3, …., and SF9. A subframe is made up of a Resource Grid which …
5G UE STATE MANAGEMENT
In 5G, it provides different services to the devices. For providing that service is the 5G system, it needs to track the availability and also the reachability of the device. 5G system tracks these states of the device such as:- RRC (radio resource control), Connection Management (CM), and Registration management (RM). RRC determines the RRC …
SSB AND PBCH
PBCH It carries the broadcast information known to be as MIS (minimum system information). It carries information like SSB index, half-frame number and system frame number. It is also used for frame and slot synchronization. Now, the modulation used for PBCH is QPSK modulation and it also has the DMRS signals used to know the …
SERVICE BASED ARCHITECTURE
Microservices When the large applications are broken down into the different small services it’s known to be microservices. Each service is performing the desired task and they can communicate with each other through an interface which is known as the SBI (service-based interface). By using the microservices architecture, they provide flexibility like different services performing …
MAC SCHEDULER ( UPLINK AND DOWNLINK SCHEDULING )
There is a finite set of time and frequency resources. These resources are dynamically allocated to the different connected devices (UE) that are accessing the 5G network, in such a manner that they will efficiently serve the network. This is known as shared channel transmission. The main function of scheduling is to decide which devices …
MAC SCHEDULER ( UPLINK AND DOWNLINK SCHEDULING ) Read More »
RAN PROCEDURE PART-2: RANDOM ACCESS
Through initial access, the device was able to find out the cell. Now with the random access procedure, the device will be able to access the cell. It was triggered in some different scenarios such as i) whenever the UE goes from RRC idle to RRC connected mode (maybe due to the device getting switched …
RAN PROCEDURE PART-1: INITIAL ACCESS
There was a 5G mobile and it was turned on. The first procedure to happen is cell search and cell selection when the phone is turned on. This allows the phone to find a cell. Cell search is the procedure by which the UE requires the time and frequency synchronization with the cell and detects …
NETWORK SLICING
Network slicing overlays multiple virtual networks on top of a shared network. There are some limits imposed by the physical networks. The idea of living is to use an underlying physical network and takes its capabilities and divide it into the logical section where each section can have different performance characteristics. Now for different performance …
5G CALL FLOW PART-4: SERVICE REQUEST PROCEDURE
This is the procedure which is used when the device wants to establish a connection to the AMF. There are two possible scenarios in which this can happen i) this can be used when the device does not have a connection to the AMF and hence uses this procedure to establish a new connection. In …
5G CALL FLOW PART-3: PDU SESSION ESTABLISHMENT PROCEDURE
Whenever a new PDU Session is created, then this procedure is employed. Alternatively, when a PDU Session is handed over from non-3GPP access like Wi-Fi, at that time the PDU Session establishment procedure is used. Typically this procedure is always initiated by the device. But if the network would like to trigger it, then it …
5G CALL FLOW PART-3: PDU SESSION ESTABLISHMENT PROCEDURE Read More »
5G CALL FLOWS PART-2: DEREGISTRATION PROCEDURE
When a device wants to access the services of the 5G system. It has to register itself with the network. When it is no longer wants to access the services, it has to deregistered from the 5G network. This is known as the deregistration procedure. The network can also initiate the deregistration procedure when it …
5G CALL FLOWS PART-1: REGISTRATION PROCEDURE
When a 5G device is first turned ON, it needs to register itself with the network before accessing the 5G services. This process is known as registration. But power on is not only the situation when this registration happens. It can be defined in four categories as i) Initial Procedureii) Periodic Procedureiii) Mobility Procedureiv) Emergency …
5G IDENTIFIER
IDENTIFIERS IN 5G Identifiers are used who uniquely recognize the entity. Send all the connection characteristics are tied to this identity. For example, if the device identity can be used it will be fine if it is a blacklisted device or not. Subscription identity is used to define if the subscription allows a certain 5G …
5g core network function part 5: PCF
Policy Control Function The policy is simply a rule for how the 5G system can manage the different users, data sessions or different data flows. The policy themselves can be specified as different levels of granularity such asi) some policies affect all the users in the same mannerii) some policies are user-specific, but it affects …
5G CORE NETWORK FUNCTION PART-4: UPF
User Plane Function The primary role of UPF in a 5G system is to provide interconnections toward the external data network. Data networks can be the Internet, IMS, enterprise system etc. In any case, we need UPF to provide connectivity between the 5G network and the data network. 5G technology is itself a mobile technology …
5G CORE NETWORK FUNCTION PART-3: UDm, UDR
Stateless Design If an application and designed in a way that the application logic is handled by the application entirely and that data lies entirely outside of the application function. Then it is called a stateless design. So we need to keep data, entirely decouples from the application logic. Unified Data Repository It is the …
5G CORE NETWORK FUNCTION PART-2: SMF
Session Management Function It is a control plane function in a 5G core network. SMF’s main function is PDU Session Management. PDU Session Management It is simply a logical connection between the device and the end of the user plane function (UPF) which in turn connects to the data network (DN) through the N6 interface. …
5g core network function part-1 : amf
Access and Mobility Management Function It is a control plane function in a 5G core network. AMF’s main function is as follows 1. Registration Management When the device is turned on, the device has to try to connect to the network, and then due-process it has to verify and validate that it is connecting to …
RAN PROTOCOL STACK PART-3: PHY (Functions), NAs, rrc
Read the first part here: https://blog.magmaindia.org/ran-protocol-stack-sdap-pdcp-rlc/ Read the second part here: https://blog.magmaindia.org/ran-protocol-stack-mac-phy-part-2/ 5. PHY-Layer (functions) CRCFirst we need a mechanism to detect error on the level of transport block. For this purpose CRC(Cyclic Redundancy Check) is calculated and added to the transport block. On the receiver side, CRC can be used to detect error in …
RAN PROTOCOL STACK PART-3: PHY (Functions), NAs, rrc Read More »
Ran Protocol Stack Part-2: MAC , PHY
Read the first part here: https://blog.magmaindia.org/category/5g-ran-protocol/ 4. MAC (Medium Access Control) These are the functions of Mac :- 1. Logical-channel multiplexing 2. Hybrid-ARQ retransmission 3. Scheduling 4. Multiplexing/Demultiplexing for carrier aggregation Multiplexing Logical Channel MAC layer provides the services to the RLC in the form of logical channels. MAC layer uses services from PHY layer …
Ran Protocol Stack ( SDAP, PDCP, RLC) Part-1
There are two different types of Ran Protocol Stack as follow 1) User-Plane Protocol Stack 2) Control-Plane Protocol Stack Lets us discuss with the help of diagram USER-PLANE PROTOCOL STACK It supports in carrying the user data network between different applications of user equipment and in the network. Each layers shown in above diagram provides …