Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | Korea Communication Market Data | List of Contributors | Become a Contributor |    
 
 
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
 
Real World Private 5G Cases   4 Deployment Models On-Premise Cases 5G Core Control Plane Sharing Cases

5G Core Sharing Cases

   
 
Private 5G Deployment   • Private 5G Frequency Allocation Status in Korea  South Korean government's regulations on private 5G and KT's strategy for entering the market
Cases in Korea   Private 5G Operators |   SK Networks Service (SI) Sejong Telecom (Wire-line Carrier) KT MOS (Affiliate of KT) • Newgens (SI) • NAVER Cloud more >>  
    Enterprise DIY |   Korea Hydro & Nuclear Power (Power Plant) Korea Electric Power Corporation (Energy) • Republic of Korea Navy more >>
 
CHANNELS     HFR Private 5G Solution (my5G)       my5G Solution Components       my5G Key Features        my5G Resources        my5G News          
 
banner
banner
SEARCH
Table of Contents 1. Introduction 2. Initial Attach Procedure 2.1 IMSI Acquisition 2.2 Authentication 2.3 NAS Security Setup 2.4 Location Update 2.5 EPS Session Establishment 3. EPS Entity Information 3.1 Before Initial Attach 3.2 After Initial Attach 4. Closing 1. Introduction N...
01/16/2014
443,141
Table of Contents 1. Introduction 2. SIMPLE IM Architecture 3. CPM Architecture 4. RCS Architecture 5. Summary 1. Introduction GSMA Rich Communication Suite (RCS) was originally based on OMA SIMPLE IM architecture in the beginning, but adopted OMA Converged IP Messaging (CPM) architecture from RCS r4.0. While the RCS r4.0 was updated to RCS r5.0 and onwa...
01/15/2014
38,358
Table of Contents 1. Introduction 2. Cases of Initial Attach 2.1 Unknown UE 2.2 Known UE 3. Simplified Call Flow in Each Case 4. Closing 1. Introduction This document discusses initial attach, as defined as EMM Case 1 in our previous document, “Eleven EMM Cases in an EMM Scenario” [1]. During this phase, a user turns on hi...
12/26/2013
202,289
Table of Contents 1. Introduction 2. EPS Mobility Management (EMM) Scenario 3. Closing 1. Introduction This document and its subsequent documents will provide descriptions of specific EMM procedures based on our understanding of EMM and ECM/RRC states covered in our LTE technical document, “LTE EMM and ECM States” [1]. EMM features are explained in...
10/22/2013
88,158
SK Telecom, the Korean No. 1 telecom operator, launched Btv Mobile service (in SD/HD) offering a variety of live broadcasting and VoD contents for mobile devices in around July 2012. And a year later in July 2013, boosted by the commercialization of LTE-A, it began a "Full HD" streaming service with drastically enhanced video quality. The following is the press release by SK Telecom about its n...
09/24/2013
72,822
Table of Contents 1. Introduction 2. EMM, ECM and RRC States 3. EMM State Transition 4. EMM Features 5. EMM User Information 6. Closing 1. Introduction Through the previous technical documents, we have studied the LTE network architecture and LTE identifications, the fundamentals of LTE technology, and LTE security operation required for a user to...
09/20/2013
266,094
Table of Contents 1. Introduction 2. SDF and EPS Bearer 3. QoS Parameters of SDF and EPS Bearer 4. QoS Provisioning and Enforcement 5. An Example for SDF and EPS Bearer QoS 6. Closing 1. Introduction An LTE service provider should be able to make services with different QoS requirements available to its users with different subscription levels. So,...
09/11/2013
329,769
Table of Contents 1. Introduction 2. EPS Session and EPS Bearer: Overview 3. Identifiers for EPS Session/Bearer (Session/Bearer IDs) 4. Summary: Table of LTE Identifiers 5. Closing and References 1. Introduction We have learned about the LTE ID groups such as UE and ME IDs, and Network Equipment (NE) and UE location identifier (location) IDs in LTE Iden...
08/26/2013
228,676
Table of Contents 1. Introduction 2. Identifiers for Network Equipment (NE IDs) 3. Identifiers for User Location (Location IDs) 4. Closing and References 1. Introduction In the previous document, “Part I, LTE Identification I” [1], identifications of UE and ME have been described. This document (Part II, LTE Identification II), as the second...
08/26/2013
113,408
Table of Contents 1. Introduction 2. Classification of LTE Identification 3. Identifiers for User Equipment (UEI IDs) 4. Identifiers for Mobile Equipement (ME IDs) 5. Closing and References 1. Introduction In LTE network, different IDs are used to identify each entity depending on their relationship with other IDs just like different names and titles ar...
08/20/2013
159,780
Table of Contents 1. Introduction 2. NAS Security 3. AS Security 4. Security Context 5. Closing and References 1. Introduction In LTE Security I[1], Part I of the LTE Security technical document, we have discussed LTE authentication based on EPS AKA procedure and learned a UE and an MME get to share the KASME when authenticated. In this document, w...
08/05/2013
221,692
Table of Contents 1. Introduction 2. LTE Security Concept 3. LTE Authentication Procedure 4. Closing and References 1. Introduction Wireless communication, in its nature, is always at a risk of eavesdropping or manipulation because data originally sent from/to a user may be received and unlawfully used by an unintended user. Locations or traveling routes...
07/31/2013
222,708
Table of Contents 1. Introduction 2. LTE Network Architecture Reference Model 3. LTE Protocol Stacks 4. Closing References 1. Introduction This document presents the LTE network architecture as the first technical document of “LTE” area. The LTE network called EPS (Evolved Packet System) is an end-to-end (E2E) all IP network; EPS is...
07/10/2013
372,769
4.5G (3) 4G (2) 4G LTE (4) 5G (479) 5G-SIG (2) 6G (4) AI (31) AR (4) ARP (3) ARPU (3) AT&T (2) Akamai (3) Alcatel (1) Authentication (5) Autonomous Driving (9) BMW (2) BSS (1) Backbone (2) Backhaul (6) Big Data (3) Billing (1) Blockchain (4) C-RAN (1) C-RAN/Fronthaul (70) CDN (14) CES (2) CORD (2) CPRI (6) Carrier Aggregation (11) Carrier Ethernet (6) Charging (2) China (3) China Mobile (5) Cisco (4) Cloud (6) Cloud Native (1) CoMP (7) Connected Car (16) Core (1) D-RAN (1) DASAN Networks (5) DHCP (10) Data Center (1) Deutsche Telekom (4) ECM (2) EDGE (4) EMM (16) EPS (2) Edge Computing (1) Ericsson (18) FTTH (16) Femto Gateway (3) Frequency (7) Fronthaul (2) GCSE (1) GSLB (1) GiGA LTE (1) GiGA WiFi (1) GiGAtopia (6) Gigabit Internet (82) Google (11) Google Global Cache (3) HDR (1) HDS (1) HFR (2) HLS (9) HSDPA (2) HTTP Adaptive Streaming (12) Handover (7) Harman (1) HeNB-GW (3) Huawei (1) IEEE 802.1 (1) IP Routing (7) IPTV (101) Immersive Service (1) Initial Attach (2) Intel (1) IoST (5) IoT (205) Jio (2) KDDI (6) KT (253) Korea (88) Korea ICT Market (50) Korea ICT Service (33) Korea ICT Vendor (9) LAA (5) LG U+ (103) LPWA (7) LSC (1) LTE (302) LTE Identification (2) LTE-A (37) LTE-A Pro (1) LTE-B (3) LTE-H (3) LTE-M (5) LTE-R (5) LTE-U (8) LWA (1) LoRa (14) MEC (19) MPLS (5) MPLS-TP (1) MPTCP (7) MSIP (4) MWC (1) MWC 2015 (26) MWC 2016 (4) MWC 2017 (8) MWC 2018 (3) Massive MIMO (1) Media Platform (1) Microsoft (1) Mobility (2) NAT (8) NB-IoT (15) NTT (1) NTT Docomo (1) Netflix (5) Network Architecture (12) Network Protocol (44) Network Slice (1) Network Slicing (6) New Radio (11) Nokia (17) O-RAN (1) OCP (3) OSPF (2) OTT (8) On-Net CDN (3) Openflow (2) Orange (1) PCRF (4) PS-LTE (7) Pay TV (1) Platform (5) Private 5G (81) Private LTE (1) Public Safety (10) QoS (6) Qualcomm (10) RCS (9) Roaming (3) SD-WAN (21) SDF (2) SDN/NFV (142) SIM (1) SK Broadband (12) SK Telecom (347) SK telecom (1) Samsung (178) Security (25) Self-Driving (3) Sk Telecom (1) Small Cell (6) Spectrum Sharing (2) Sprint (1) Switching (6) T-Mobile (1) TAU (2) Transparent Cache (3) UHD (24) URLLC (1) V2X (2) VR (13) Verizon (8) Video Streaming (43) VoLTE (14) VoWiFi (2) Wi-Fi (72) WiGig (1) Wideband LTE (2) YTL (1) YouTube (9) blockchain (1) eICIC (1) eMBMS (9) ePDG (1) iBeacon (1) mmWave (2) security (1) telecoin (1) uCPE (2) vCPE (1) vRAN (1)