In 5G, there is a need to push the envelope of performance to provide, where needed, for example, much greater throughput, much lower latency, ultra-high reliability, much higher connectivity density, and higher mobility range. This enhanced performance is expected to be provided along with the capability to control a highly heterogeneous environment, and capability to, among others, ensure security and trust, identity, and privacy.
5G will operate in a highly heterogeneous environment characterized by the existence of multiple types of access technologies, multi-layer networks, multiple types of devices, multiple types of user interactions, etc. In such an environment, there is a fundamental need for 5G to achieve seamless and consistent user experience across time and space.
TECHNOLOGY AND ARCHITECTURE
ONGOING TECHNOLOGY TRENDS
5G DESIGN PRINCIPLES
RADIO:
Leverage spectrum
- Exploit higher frequencies and unlicensed spectrum
- C/U-path split, UL/DL split, multiple connectivity
Enable cost-effective dense deployments
- Integrate third-party/user deployments
- Automate configuration, optimization and healing
- Enhance multi-RAT coordination
- Support multi-operator/shared use of infrastructure
Coordinate and cancel interference
- Build-in massive MIMO and CoMP
- Exploit controlled non-orthogonal interference
Support dynamic radio topology
- Moving cells, relays, hubs, C-RAN, D-RAN
- D2D (e.g., for latency, disaster relief)
|
|
CORE NETWORK:
Create common compos-able core
- Minimize number of entities and functionalities
- C/U-function split, lean protocol stack
- No mandatory U-plane functions
- Minimize legacy inter-working
- RAT-agnostic core
- Fixed and mobile convergence
|
OPERATIONS AND MANAGEMENT:
Simplify operations and management
- Automation and self-healing
- Probe-less monitoring
- Collaborative management
- Integrated OAM functionality
- Carrier-grade network cloud orchestration
|
Management Embrace flexible functions and capabilities
- Network slicing
- Function variance
- Flexible function/service/application allocation
- Leverage NFV/SDN
- State-disintegrated functions
- Graceful degradation
|
Support new value creation
- Exploit big data and context awareness
- Expose radio and network APIs
- Facilitate XaaS
Build in security and privacy
- Extend C-plane security (e.g., HetNets)
- Ensure location
|
FIND FULL CONTEXT OF DOCUMENT HERE: