Mobile radio access networks and 5G evolution
5G networks are part of the national critical infrastructure and are designed to be flexible, to accommodate diverse use cases. Managing network intelligence and security across the network further adds complexity.
Traditionally, mobile telecommunications networks consist of five major domains
1
The device, also known as the User Equipment, which includes smartphones, tablets, and routers.
2
The radio access network (RAN), which uses radio frequencies to provide wireless connectivity to the devices.
3
The core network (CN), which coordinates various components of the access network and facilitates internet connectivity.
4
The transport network (TN), which provides connectivity between the RAN and the CN.
5
The orchestration and management (O&M), which coordinates and manages the mobile network infrastructure for efficient operation.
The RAN consists of three major components
The baseband offers high computational power, utilizing custom electronics and advanced software that includes nearly four times as many lines of code as the Mars Curiosity rover. It performs signal processing for multiple antennas, error detection and correction, secure transmission, and efficient management of wireless resources across devices in the network.
The radio, which converts digital information into wireless signals and ensures they are transmitted at the right frequency bands and power levels.
The antennas, which transmit electrical signals into radio waves.
Transformation of mobile networks with the emergence of 5G
New functional splits
In 5G networks, antennas are integrated with radios and baseband hardware and software to enable advanced technologies like massive MIMO, beamforming, and beam tracking. This integration is not possible with traditional passive antennas and allows for highly capable and efficient use of high 5G frequencies. Additionally, virtualization of baseband functions allows for deployment at CN sites, which is beneficial for industrial and enterprise 5G applications. The increasing software dependency in the radio access network means that base stations have millions of lines of code and require consistent upgrades to support new use cases and network growth.
The software complexity of RAN in a baseband exceeds that of a Boeing 787 aircraft.
Introduction of AI and modernized operating models
In addition to new functional splits, the number of radio base stations is increasing, and the software is becoming more complex. As a result, AI is increasingly being used across the network to secure optimal performance. AI and machine learning are used with central network management and orchestration as well as in individual base stations to optimize traffic and load balancing. Also, 5G network slicing allows multiple virtual networks with distinct characteristics to operate on the same physical 5G infrastructure. Like lanes on a road accommodating different types of traffic, network slicing offers improved granularity, high isolation, and enhanced security for diverse purposes such as manufacturing, online gaming, and public utilities.
5G RAN is slice-aware and capable of monitoring and controlling traffic per network slice.
Radio Access Network functional splits
Flexible 5G RAN deployments
5G is designed to be highly flexible, catering to diverse applications, and thus requires flexible placement of network functions. This results in geographically co-located RAN and CN functions, with distributed intelligence. As a result, deployment options are plentiful, making all RAN and CN components crucial for network performance.
Security, privacy, and availability are key performance dimensions
In 5G, the RAN plays a crucial role in detecting and mitigating potential threats and anomalies, as well as implementing preventive and corrective measures to ensure robust security and privacy. It achieves this by protecting the confidentiality and integrity of radio transmissions, encrypting, and decrypting sensitive data, maintaining the confidentiality of positioning data, and ensuring availability through advanced spectrum management algorithms. These measures are essential for safeguarding various sectors such as industry, healthcare, mission-critical networks, and public sector applications, where security and privacy are of utmost importance.