5G Wireless Training (A Comprehensive Technical Overview)

Commitment 3 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Delivery Options Instructor-Led Onsite, Online, and Classroom Live


This 5G Wireless Training (A Comprehensive Technical Overview) Workshop focuses on the key aspects of the 5G System (5GS), which includes both the 5G Core (5GC) and the 5G Radio Access Network (5G RAN), known as New Radio (5G NR). An emphasis is placed on security throughout this 5G Wireless Training (A Technical Overview) Workshop course, concluding with the final section dedicated to the topic of 5G security. Being that this course is three days, it does not delve into the details at the physical (radio link) layer. However, it provides a complete section of the 5G RAN, along with a separate section that follows, which describes the Centralized RAN (C-RAN) architecture. Below are descriptions of what is covered in each section.

5G Wireless Training (A Comprehensive Technical Overview) Workshop:

Section 1 delves into the meaning of a Service Based Architecture (SBA), and why this is a big departure from all previous generations of mobile cellular technologies and standards.

Section 2 provides an overview of Software Defined Networks (SDN) and Network Function Virtualization (NFV). It describes how SDN and NFV are fundamental to the 5G Core (5GC) network architecture. Section 3 provides a detailed description of 5G Core Network functions. This section also provides an example of the Vehicle to Anything (V2X) deployment model. It concludes with an overview of the Security Edge Protection Proxy (SEPP), which provides security between mobile operator roaming partner networks.

Section 3 provides extensive coverage of the 5G Radio Access Network (RAN), referred to as New Radio (NR). Some of the topics include the frequency bands defined for use with 5G NR, how Massive MIMO is being deployed in 5G NR, and duplexing modes & supplementary frequency bands.

Section 4 expands on the previous section’s topic by defining the Centralized-RAN, or C-RAN, for 5G. Since the 5G RAN includes macrocells and small cells, RAN architectures can vary significantly, allowing for many different deployment options. This section provides key examples, using ladder diagrams to show the protocol flows used in 5G C-RANs.

Section 5, the final section, introduces the details of 5G security, which was previously introduced as a high-level topic earlier in the course. This section begins with the topic of Private/Public key pairs to demonstrate one of the most significant security procedures for 5G, the protection of the mobile’s IMSI while attaching to the network. This is followed by a demonstration of the Subscription Concealed Identifier (SUCI) procedure, step-by-step. security algorithms, which many are brought forward from the LTE security architecture. A 5G Security overview is then provided, along with the Authentication and Key Agreement (AKA) procedure. Next, the 5G key hierarchy is shown in detail. The course wraps up with a summary of the security procedures and securing the communication between the access and core networks.

  • 3 days of 5G Wireless Training (A Technical Overview) Workshop with an expert instructor
  • 5G Wireless Training (A Technical Overview) Workshop Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee



Upon completing this 5G Wireless Training (A Comprehensive Technical Overview) course, learners will be able to meet these objectives:

  • Describe what 5G is
  • List the 5G wireless features and their benefits (5G wireless communication networks)
  • Describe key 5G technology drivers and enablers of 5G
  • List 5G technology candidates in RAN/radio, transport, core networks, interoperability, and services
  • List 5G Wireless Use Cases
  • List User-Driven 5G Requirements
  • Describe ITU  5G standards (IMT2020) along with the NGMN alliance and 3GPP
  • Describe 3GPP LTE/LTE-A evolution towards 5G
  • Walk through the current and future deployment of 5G scenarios
  • Co-Existence of LTE End-to-End Ecosystem with 5G
  • List similarities and differences between 5G Radio Access and LTE
  • Learn how 5G wireless networks could support up to 1,000-fold gains in capacity
  • List requirements to connect 100 billion humans and devices with a 10 Gb/s speed with zero-distance connectivity
  • Describe new 5G Radio Access Technology Interworking with LTE
  • List 3GPP Licensed-Assisted Access (LAA), Narrowband- Internet of Things (NB-IoT), and Enhanced Device to Device (DD) requirements
  • Explain LTE-Advanced Pro and 3GPP roadmap to 5G
  • New Radio (NR), Cloud RAN: Cloud- Radio Access Network (C-RAN) and Next Generation (NexGen) architecture
  • Illustrate 5G wireless communication networks’ cellular architecture and key technologies
  • Illustrate 5G network architecture and components
  • Describe the operation scenarios of 5G
  • Explain the key RF, PHY, MAC, and air interface changes required to support 5G
  • Describe features supporting 5G wireless deployments
  • Discuss the rationale for 5G wireless and key deployment typologies
  • Outline changes required to implement 5G
  • Learn about the features of Massive MIMO
  • We can adapt this 5G Wireless Training (A Comprehensive Technical Overview) course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this 5G Wireless Training (A Comprehensive Technical Overview) course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the 5G Wireless Training (A Comprehensive Technical Overview) around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the 5G Wireless Training (A Comprehensive Technical Overview) course in a manner understandable to lay audiences.

The target audience for this 5G Wireless Training (A Comprehensive Technical Overview) course:

  • All

The knowledge and skills that a learner must have before attending this 5G Wireless Training (A Comprehensive Technical Overview) course are:

  • None


The 5G System (5GS) – Service-Based Architecture (SBA)
  • Submission of initial 5G description for IMT-2020
  • LTE-M & NB-IoT Introduced in 4G LTE-Advanced
  • 3GPP Release Timeline for Specifications
  • 5G Performance and Flexibility Enables New Use Cases
  • Technical Requirements for 5G
  • 5G-PPP KPI Evaluation of Use Cases
  • Attack Surfaces Open with Interconnections Between CS Domain and Internet
  • Overview of 5G Access and Core Networks
  • EPC migration to Control & User Plane Separation (CUPS)
  • Mapping EPC Functions to 5G CN Functions
  • LTE Network Security Issues with the Diameter Protocol
  • LTE Network Security Issues with the Diameter Protocol
  • Reference Point Representation of the 5G Core
  • 5G System (5GS) Service-Based Architecture (SBA)
  • Introduction to Multi-Access Edge Computing (MEC)
  • Multi-Access Edge Computing (MEC) in 5G
  • Expected Edge Evolution
  • Service-Based Architecture (SBA) Service Framework
  • Non-Stand Alone (NSA) Architecture
  • 5G Standalone Architecture (SA)
  • 5G NR Architecture Deployment Options
  • LTE-NR Dual Connectivity with Carrier Aggregation
  • Next-Generation Satellites and 5G: SaT5G
SDN and NFV Fundamental to the 5G Core Architecture
    • Major Trends in Mobile Networking
    • 5G Mobile Network Architecture
    • SDN in NFV Architectural Framework
    • Part A: Development of Software-Defined Networks:
      • Evolution of Networked Computing: Server Form Factors
      • The emergence of Virtual Machines

Intro to Software Defined Networks (SDNs)

  • Northbound and Southbound Interfaces Defined for SDN
  • Application Program Interface (API) Defined
  • Transport API Architecture
  • SDN Control and User Planes
  • SDN Provides Scale and Resiliency

Part B: Intro to Network Functions Virtualization (NFV) Traditional Switches & Routers

    • Switch Virtualization with Open vSwitch
    • Network Functions Virtualization (NFV) Framework

NFV Infrastructure – NFVI Layers: Hardware Resources, Virtualization Layer & Virtualized Resources

  • Virtual Network Function (VNF)
  • Management and Network Orchestration (MANO)
  • Operational & Business Support Systems
  • 5G NFV Main Components
  • SDN/NFV used in 5G Network Architecture
  • Edge Computing uses AI/ML with Training and Orchestration Across the Network
5G Core Functions
    • 5G System (5GS)
    • User Plane Function (UPF)
    • Access and Mobility Management Function (AMF)
    • Session Management Function (SMF)
    • Policy Control Function (PCF)
    • Unified Data Management (UDM)
    • Unified Data Repository (UDR)
    • Application Function (AF)
    • Authentication Server Function (AUSF)
    • Network Slicing Explained
    • Network Slice Selection Function (NSSF)
    • Introduction to the Service Capability Exposure Function (SCEF)
    • Network Exposure Function (NEF)
    • Network Repository Function (NRF)
    • Simplified Example of 5G API Calls
    • NFS Offer Services to other NFs in a Structured Way
    • V2X Deployment Model
    • Security Edge Protection Proxy (SEPP): End-to-End HTTP/2 Roaming Architecture
    • 5GS Roaming Architecture – Local Break Out (LBO)
      1. Service-Based Interface Representation
      2. Reference Point Representation
    • 5GS Roaming Architecture – Home Routed (HR)
      1. Service-Based Interface Representation
      2. Reference Point Representation
5G Radio Access Network (5G RAN)
    • 5G Control/User Plane Split and New Radio (NR) Interface
    • 5G User Plane (UP) Protocol Stack
    • 5G Control Plane (CP) Protocol Stacks
    • New Multiple Access Schemes for NR
    • Higher Order Modulation Rates Supported with 5G NR
    • 5G NR Frame and Bandwidth Numerologies
    • Frame Slots for Different Numerology Configurations
    • Massive Multiple-Input Multiple-Output (MIMO)
    • Frequency Ranges for 5G New Radio (NR)
      1. FR1 Frequency Division Duplex (FDD) Frequency Bands
      2. FR1 Time Division Duplex (TDD) Frequency Bands

FR2 Time Division Duplex (TDD) Frequency Bands

  • Supplementary Uplink (SUL) Frequency Bands
  • Supplementary Downlink (SDL) Frequency Bands
  • CBRS Tiered User Classes and Frequency Spectrum
  • Using Unlicensed Spectrum for 5G NR (NR-U)
  • 5G Distributed & Centralized RAN Elements
  • 5G Xn – Control and User Plane Protocol Stacks
  • XnAP within the Xn-C (Control) Protocol Stacks
  • F1 Application Protocol (F1AP)
  • F1 Protocol Stack Split Between CU and DU
  • F1 Functional Split Options
  • Bandwidth Considerations for C-RAN
  • Quality of Service (QoS) Flows Across the Xn-User Plane (Xn-U)
Centralized-RAN (C-RAN) for 5G
  • Alternative Splitting Options for Centralized RAN Architecture
  • Alternative C-RAN Solutions: enhanced Common Public Radio Interface (eCPRI)
  • Multiple Splits Can Be Adopted by Service Providers: Combining 3GPP (Option 2) and eCPRI (Option 6 or 7)
  • IEEE 1914: Next Generation Fronthaul Interface (NGFI)
  • Other Alternatives for C-RAN Architectural Splits
  • NG-RAN Transport Network: Midhaul Connections
  • NG-RAN Transport Network: Fronthaul Connections
  • Centralized Radio Access Network (C-RAN) Transport
  • 5G C-RAN Procedures: UE Initial Access
  • Intra-gNB-CU Handover Illustrated
  • 5G C-RAN Procedures: Intra gNB-CU Handover
  • 5G C-RAN Procedures: Dual Connectivity (EN-DC)
Introduction to 5G Security
  • Generating and Using Private/Public Key Pairs
  • Public Key Infrastructure (PKI)
  • 5G Identity Exchange Between UE and Network
  • 5G Security Overview
  • UE Must Identify which Authentication and Key Agreement (AKA) Mechanism to Utilize
  • Generating the Key Access Security Function (KAUSF)
  • Generating the 5G Home Environment Authentication Vector (HE AV)
  • 5G Key Hierarchy
  • Key Distribution in 5G
  • Non-3GPP Access to 5G Core Networks
  • 5G Authentication and Key Agreement (AKA) Procedure
  • Generation of 5G Authentication Vector (AV)
  • Device (UE) Authentication Procedure
  • Authentication Confirmation and UDM Validity Monitoring
  • IPX Allowed to Modify HTTP/2 Messages
5G Wireless Training (A Comprehensive Technical Overview)5G Wireless Training (A Comprehensive Technical Overview) Course Wrap-Up