5G Workshop for DoD
5G Workshop for DoD is a 3-day training course features a mixture of lecture and practical hands-on training. Participants will learn 5G Services, 5G Slicing, Software and Hardware Architecture, NFV and SDN, Containers and Kubernettes, RAN, 5G New Radio (NE) Cloud-RAN, O-RAN, 5G NSA, 5G SA, SBA, MEC, VoNR, Massive MIMO, Beamforming, 5G Call Flows, Security and more.
WHO SHOULD ATTEND?
- Technical and Project Managers planning to use 5G Services
- Hardware and Software Engineers and testers looking for more in-depth 5G Details
- Analysts
- Anyone else new to 5G Mobile Network
WHAT YOU’LL LEARN
- 5G Services
- 5G Use Cases: Enhanced Mobile broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC) and Massive IoT
- 5G NSA and SA Architecture
- Network Slicing
- 5G Access Technology, Cloud RAN, O-RAN, and v-RAN
- 5G Service Based Architecture (SBA)
- 5G REST APIs
- 5G New Radio (NR)
- Voice over NR (VoNR)
- 5G Interfaces and Protocols
- 5G Signaling and Data Flow
Course Outline
Introduction to 5G
- 5G Features
- 5G Use Cases and Services
- Enhanced Mobile broadband (eMBB)
- Ultra-Reliable Low Latency Communications (URLLC)
- Massive IoT
- 5G Network Architecture
- Migration from 4G to 5G to
- 5G NSA and SA
- 5G New Radio (NR)
- 5G Frequency Bands
- 1 GHz to 6 GHz:
- mmWave and Extreme Bandwidths
- 5G Cloud RAN, O-RAN, and v-RAN
- 5G Network Slicing
- 5G Protocol Stacks
- Multi-access Edge Computing (MEC)
Overview of 5G Architecture
- 5G System Survey
- 5G Access Network (5G-AN)
- 5G Core Network (5GC)
- 5G RAN Architecture
- 5G Cloud RAN: CU/DU
- 5G RAN Components
- gNB-CU and gNB-DU
- VRAN and Open RAN Overview
5G Deployment Scenarios
- 5G NR Non-Standalone (NSA)
- 5G NR Standalone (SA)
- 5G DL CA
- 5G DL MIMO
- 5G UL MIMO
- 5G Sub-6 GHz
- 5G Carrier Aggregation
- 5G Identifiers
- 5G Mobility Essentials
- 5G Security
- 5G Integration with LTE FDD and LTE-TDD
- LTE-LAA
- 5G Integration with WiFi
- Beamforming
- Massive MIMO
5G NR: The New Radio Interface for 5G
- 5G physical layer specifications
- Massive MIMO
- Cloud RAN and eCPRI fronthaul in 5G networks
- Mobility with mm-waves
- VRAN and Open RAN Overview
Overview of 5G Call Flows and Signaling
- 5G non-standalone access
- 5G Service-Based Architecture (SBA)
- 5G Standalone Access Registration
- 5G NR RLC Acknowledged Mode
- 5G-NR Standalone Access Registration
- 5G-NR Standalone Registration Message Details
- UE Interactions
- gNB Interactions
5G NSA vs. SA Operations
- 5G Non-Standalone (NSA) Network acquisition
- 5G Non-Standalone (NSA) Attach
- 5G Non-Standalone (NSA) Data transfer
- 5G Standalone (SA) Registration
- 5G Standalone (SA) PDU session setup
- Data transfer and signaling flows
- Access and Mobility Function (AMF) Interactions
- Authentication Server Function (AUSF) Interactions
- Unified Data Management (UDM) Interactions
- Policy Control Function (PCF) Interactions
- Session Management Function (SMF) Interactions
- User Plane Function (UPF) Interactions
Introduction to 5G
- 5G Features
- 5G Use Cases and Services
- Enhanced Mobile broadband (eMBB)
- Ultra-Reliable Low Latency Communications (URLLC)
- Massive IoT
- 5G Network Architecture
- Migration from 4G to 5G to
- 5G NSA and SA
- 5G New Radio (NR)
- 5G Frequency Bands
- 1 GHz to 6 GHz:
- mmWave and Extreme Bandwidths
- 5G Cloud RAN, O-RAN, and v-RAN
- 5G Network Slicing
- 5G Protocol Stacks
- Multi-access Edge Computing (MEC)
Overview of 5G Architecture
- 5G System Survey
- 5G Access Network (5G-AN)
- 5G Core Network (5GC)
- 5G Network Function (NF)
- 5G RAN Architecture
- Role of NFV and SDN
- Edge Computing in 5G
- 5G Cloud RAN: CU/DU
- 5G RAN Components
- gNB-CU and gNB-DU
- VRAN and Open RAN Overview
5G Deployment Scenarios
- 5G NR Non-Standalone (NSA)
- 5G NR Standalone (SA)
- 5G DL CA
- 5G DL MIMO
- 5G UL MIMO
- 5G Sub-6 GHz
- 5G Carrier Aggregation
- 5G Identifiers
- 5G Mobility Essentials
- 5G Security
- 5G Integration with LTE FDD and LTE-TDD
- LTE-LAA
- 5G Integration with WiFi
- Beamforming
- Massive MIMO
5G NR: The New Radio Interface for 5G
- 5G physical layer specifications
- Massive MIMO
- Cloud RAN and eCPRI fronthaul in 5G networks
- Mobility with mm-waves
- VRAN and Open RAN Overview
Overview of 5G Call Flows and Signaling
- 5G non-standalone access
- 5G Service-Based Architecture (SBA)
- 5G Standalone Access Registration
- 5G NR RLC Acknowledged Mode
- 5G-NR Standalone Access Registration
- 5G-NR Standalone Registration Message Details
- UE Interactions
- gNB Interactions
5G NSA vs. SA Operations
- 5G Non-Standalone (NSA) Network acquisition
- 5G Non-Standalone (NSA) Attach
- 5G Non-Standalone (NSA) Data transfer
- 5G Standalone (SA) Registration
- 5G Standalone (SA) PDU session setup
- Data transfer and signaling flows
- Access and Mobility Function (AMF) Interactions
- Authentication Server Function (AUSF) Interactions
- Unified Data Management (UDM) Interactions
- Policy Control Function (PCF) Interactions
- Session Management Function (SMF) Interactions
- User Plane Function (UPF) Interactions
Overview of 5G Network Functions (NF)
- Authentication Server Function (AUSF)
- Access and Mobility Management Function (AMF)
- Data Network (DN), e.g. operator services, Internet access or 3rd party services
- Unstructured Data Storage Function (UDSF)
- Network Exposure Function (NEF)
- Network Repository Function (NRF)
- Network Slice Selection Function (NSSF)
- Policy Control Function (PCF)
- Session Management Function (SMF)
- Unified Data Management (UDM)
- Unified Data Repository (UDR)
- User Plane Function (UPF)
- Application Function (AF)
- User Equipment (UE)
- (Radio) Access Network ((R)AN)
- 5G-Equipment Identity Register (5G-EIR)
- Security Edge Protection Proxy (SEPP)
- Network Data Analytics Function (NWDAF)
- CHarging Function (CHF)
Implementation Example of Service-Based Architecture (SBA)
- The 5G System Architecture Service-based Interfaces
- 5G REST APIs
- HTTP2 and JSON
- RESTful APIs for the 5G Service Based Architecture (SBA)
- RESTful APIs for the Service Based Interfaces and Northbound Communication
- SBA Procedure
- Simplified API calls
- Service Registration
- Service Discovery
- Session Establishment (AMF Creates Session Context at SMF)
- 5G System Architecture: Security Issues
- Overview of SDN and NFV Technologies in 5G
- Containers and Microservices in 5G Implementation
- Kubernetes and 5G Implementation
Overview of 5G Network Functions (NF)
- Authentication Server Function (AUSF)
- Access and Mobility Management Function (AMF)
- Data Network (DN), e.g. operator services, Internet access or 3rd party services
- Unstructured Data Storage Function (UDSF)
- Network Exposure Function (NEF)
- Network Repository Function (NRF)
- Network Slice Selection Function (NSSF)
- Policy Control Function (PCF)
- Session Management Function (SMF)
- Unified Data Management (UDM)
- Unified Data Repository (UDR)
- User Plane Function (UPF)
- Application Function (AF)
- User Equipment (UE)
- (Radio) Access Network ((R)AN)
- 5G-Equipment Identity Register (5G-EIR)
- Security Edge Protection Proxy (SEPP)
- Network Data Analytics Function (NWDAF)
- CHarging Function (CHF)
Implementation Example of Service-Based Architecture (SBA)
- The 5G System Architecture Service-based Interfaces
- 5G REST APIs
- HTTP2 and JSON
- RESTful APIs for the 5G Service Based Architecture (SBA)
- RESTful APIs for the Service Based Interfaces and Northbound Communication
- SBA Procedure
- Simplified API calls
- Service Registration
- Service Discovery
- Session Establishment (AMF Creates Session Context at SMF)
- 5G System Architecture: Security Issues
- Overview of SDN and NFV Technologies in 5G
- Containers and Microservices in 5G Implementation
- Kubernettes and 5G Implementation
Quality of Service (QoS) in 5G Networks
- How will QoS improve with 5G?
- Speed/throughput
- End-to-end Latency
- Network Availability
- Reliability parameters
- QoS Flow Identifier (QFI)
- 4G Vs. 5G QoS
- 5QI to QoS Mapping
- 5G QoS Flow Descriptions
- 5G QoS Identifier (5QI)
Introduction to 5G Security
- RAN and core network security
- Trust boundaries
- Visibility and configurability
- Requirements for algorithms, and algorithm selection
- 5G systems attacks
- 5G system vulnerabilities
- 5G System Vulnerability Analysis
- 5G system and network attacks
- Exploiting 5G systems and devices
- Evaluate 5G system security vulnerabilities
- Key Issues
- Embedded SIM Security
- 5G Autonomous Driving Security Solutions
- Critical 5G Security Controls Planning, Implementing and Auditing
- Top 5G Mitigation Strategies Implementing and Auditing
Introduction to 5G Security
- RAN and core network security
- Trust boundaries
- Visibility and configurability
- Requirements for algorithms, and algorithm selection
- 5G systems attacks
- 5G system vulnerabilities
- 5G System Vulnerability Analysis
- 5G system and network attacks
- Exploiting 5G systems and devices
- Evaluate 5G system security vulnerabilities
- Key Issues
- Embedded SIM Security
- 5G Autonomous Driving Security Solutions
- Critical 5G Security Controls Planning, Implementing and Auditing
- Top 5G Mitigation Strategies Implementing and Auditing
Workshops and Practical Cases
- Applying Risk Management and RMF to securing 5G networks for DoD
- Analysis of 5G RAN and Core Attack Scenarios:
- 5G Attack Vectors
- 5G Security Weaknesses
- 5G Security Controls
- Technical Impacts
- Operational Impacts
- Working with HackRF and Spectrum Analyzer
- Simulate Jamming Attacks on 5G Radios