Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views4 pages

Unit 3 Part A

The document provides an overview of network slicing, its benefits, and requirements, as well as the management and orchestration processes involved. It also discusses Multi-access Edge Computing (MEC), its architecture, modes of operation, and the importance of service continuity in telecom technologies. Additionally, it covers 5G network deployment advantages, protocols, mobility management, and security services.

Uploaded by

jubairahmedcbe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

Unit 3 Part A

The document provides an overview of network slicing, its benefits, and requirements, as well as the management and orchestration processes involved. It also discusses Multi-access Edge Computing (MEC), its architecture, modes of operation, and the importance of service continuity in telecom technologies. Additionally, it covers 5G network deployment advantages, protocols, mobility management, and security services.

Uploaded by

jubairahmedcbe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Part – A Two marks

1. What is network slicing?


A Network Slice is realizing a complete network for any type of access and is an enabler for providing
services. The used physical or virtual infrastructure resources may be dedicated to the Network Slice
or shared with other Network Slices.
2. List the benefits of network slicing.
✓ Better customer experience by per customer adaptations and optimizations
✓ Shorter time-to-market and time-to-customer
✓ Simpler resource management
✓ Increased automation
✓ Flexibility and agility
✓ Reduced risks by separation of concerns.
3. What are the different requirements to be addressed by a Network Slice?
✓ Traffic capacity requirements per geographical area
✓ Charging requirement
✓ Coverage area requirement
✓ Degree of isolation requirement
✓ End-to-end latency requirement
✓ Mobility requirement
✓ Overall user density requirement
✓ Priority requirement and etc.
4. What is Management and orchestration?
During the preparation and whole Lifecycle management process, the customer is able to
provide its requirements using APIs from which the customer gets information of how the
Network Slices perform, and is able to modify its requirements as to adapt to the needs of the
customer. It provides a high-level view of the process in the preparation and the Lifecycle
management of a network Slice Instance (NSI).
5. What is network slice preparation?
Network Slice “blueprints” or “templates” are used to simplify the process. If a Network Slice
template exists that meets the customer requirements, then the preparation process can be
shortened, as either the customer may be able to use an existing NSI.
6. What is network slice commissioning?
NSI provisioning in the commissioning phase includes creation of the NSI. During NSI creation all
needed resources are allocated and configured to satisfy the Network Slice requirements.
7. What is network slice decommissioning?
NSI provisioning in the decommissioning phase includes decommissioning of non-shared resources
if required and removing the NSI specific configuration from the shared resources. After the
decommissioning phase, the NSI is terminated and does not exist anymore.
8. What is Multi-access Edge Computing (MEC)?
Multi-Access Edge Computing (MEC) is an integral part of the 5G ecosystem. MEC helps
service providers to bring application oriented capabilities closer to the users and support
several latency sensitive use cases from the edge.

41
9. What are the needs for MEC?
✓ Growth in the number of mobile devices connecting to the network (with IOT, it is
expected to explode even further)
✓ Growth in the volume of data generated by the Over the Top (OTT) applications such as
social media, video streaming and online gaming.
✓ Need for distributing the infrastructure where the application services are hosted in a
service provider network, to improve the application performance and the user experience
etc.
10. What are the MEC architecture functions?
❖ MEC Orchestrator
❖ MEC Platform
❖ MEC Platform Manager
❖ Virtualization Infrastructure
❖ MEC Application Services
11. What is the use of Virtualization Infrastructure?
Virtualized infrastructure provides shared compute, storage and networking resources for
hosting MEC related applications or Virtual Network Functions (VNFs).
12. What MEC Breakout mode?
The session connection is redirected to a MEC application which is either hosted locally on
the MEC platform or on a remote server. Some examples of breakout applications are local
Content Deliver Network (CDN) caches (for ex., Akamai caches), gaming services and media
delivery services (for ex., Netflix streaming). Normally, you achieve this by defining forwarding
policies
13. What is MEC In-line mode ?
MEC is deployed transparently, in an in-line mode. The session connection is maintained with the
original server, while all the traffic traverses and goes through the application running in the
MEC. Examples of in-line MEC applications are transparent content caching and security
applications.
14. What is MEC Tap mode?
In Tap mode, data exchanged in a session is selectively duplicated and forwarded to the tap
MEC application. Some examples of tap mode applications are virtual network probes, monitoring
and security applications.
15. What is MEC Independent mode - MEC application and services run independently, but still
the MEC application is registered in the MEC platform and will receive other MEC services, such
as DNS and radio network information (for ex., radio bearer statistics). Steering the traffic to
the MEC is achieved by configuring local DNS or MEC host’s data plane.
16. What is meant by service continuity?
In any telecom technology one of the key feature requirement is data session and service continuity
to ensure the uninterrupted service experience to the users irrespective of any change of UE IP
address or change in Core network anchor point.
17. Give the types of SSC modes?
SSC mode 1
SSC mode 2
SSC mode 3
42
18. List the advantages of 5G SA network deployment.
To make better use of the competence of 5G, we just need to upgrade the existing EPC to complete
the interconnection between EPC and 5GC with this solution.
19. List the advantages of 5G NSA network deployment.
There is no need to deploy 5GC in early period of 5G deployment. By implementing this network
architecture, the control interface of S1 is only provided to LTE eNodeB, while the user plane
interface of S1 can be provided to eNodeB and NR gNodeB at the same time.
20. List the advantages of 5G NR network deployment.
With the requirement of 5G NR providing continuous coverage, the control plane always set in 5G
NR to fully achieve massive and strong function for users.
The rapid rising of 5GC has become an irresistible tendency.
21. What edge computing?
Edge computing is about bringing the services closer to the location where they are to be delivered.
Services here includes computing power and memory needed for e.g. running a requested application.
22. Mention the 5G protocols.
• 5G NAS
• NGAP
• GTP-U
• IPSec
• GRE
23. What is 5G mobility management?
5GMM procedures are used to keep track of the whereabouts of the UE, to authenticate the UE and
control integrity protection and ciphering. The 5GMM procedures also allow the network to assign
new temporary identities to the UE (5G-GUTI) and also request identity information (SUCI and PEI)
from the UE.
24. What are the basic 5GMM procedures?
• Registration
• Deregistration
• Authentication
• Security mode control
• Service request
• Notification
25. What are the set of security services provided by IPsec?
• Access control
• Data origin authentication
• Connection-less integrity
• Detection and rejection of replays
• Confidentiality
• Limited traffic flow confidentiality.

43
26. Give an overview of GRE Protocol aspects. (Nov/Dec 23)

The GRE is a protocol designed for performing tunnelling of a network layer protocol over another
network layer protocol.
It is generic in the sense that it provides encapsulation of one arbitrary network layer protocol (e.g.,
IP or MPLS) over another arbitrary network layer protocol.

27. Write the main functions of the 5G non-access stratum (NAS)? (Nov/Dec 23)
Handling of UE registration and mobility, including generic functionality for access control such as
connection management, authentication, NAS security handling, UE identification and UE
configuration

44

You might also like