Skip to content

Telecom Protocols

GuyPhy edited this page Sep 17, 2023 · 4 revisions

Telecom Protocols in 5G

The telecom protocols that are being used in a 5G network setup for communication between two users, categorized by layer:

Physical Layer (PHY)

  • OFDM (Orthogonal Frequency Division Multiplexing) is a method of transmitting data over a wireless channel by dividing the available bandwidth into a number of orthogonal subcarriers. This allows multiple users to share the same channel without interfering with each other.
  • SC-FDMA (Single Carrier Frequency Division Multiple Access) is a similar technique that uses a single carrier to transmit data. This can be more efficient than OFDM in some cases, but it is not as widely used.
  • NR (New Radio) is the name of the radio technology used in 5G networks. It is based on OFDM, but it also includes a number of new features that improve performance and efficiency.

Data Link Layer (L2)

  • MAC (Medium Access Control) is responsible for managing the access to the shared wireless channel. It ensures that data is transmitted and received in a fair and orderly manner.
  • RLC (Radio Link Control) is responsible for ensuring the reliable delivery of data over the airwaves. It provides error correction and retransmission mechanisms to ensure that data is not lost or corrupted.
  • PDCP (Packet Data Convergence Protocol) is responsible for encapsulating data for transmission over the airwaves. It also provides security features to protect data from unauthorized access.

Control Plane

  • RRC (Radio Resource Control) is responsible for managing the radio resources in the 5G network. It allocates radio channels to UEs and controls the power levels of UEs.
  • SCTP (Stream Control Transmission Protocol) is a reliable protocol that is used to transmit control messages between 5G network elements. It provides features such as congestion control and flow control to ensure that control messages are delivered reliably.
  • GTP (GPRS Tunnelling Protocol) is a tunneling protocol that is used to transport data between the 5G network and the core network. It provides a way to encapsulate data from different UEs and transport it over the same network.
  • IP (Internet Protocol) is the standard protocol for routing data over the internet. It is used to encapsulate data from the L2 layer and transport it over the internet.
  • UDP (User Datagram Protocol) is a connectionless protocol that is used to transmit data between UEs. It is a simpler and more efficient protocol than TCP, but it does not provide any guarantees of delivery.

Application Layer

  • HTTP (Hypertext Transfer Protocol) is the protocol used to transfer web pages over the internet. It is a request-response protocol, where a client sends a request to a server and the server sends a response back.
  • TCP (Transmission Control Protocol) is a reliable protocol that is used to transmit data between two hosts. It provides features such as congestion control and flow control to ensure that data is delivered reliably.
  • RTP (Real-Time Transport Protocol) is a protocol that is used to transmit real-time data, such as audio and video. It provides features such as timestamping and packet loss concealment to ensure that real-time data is delivered in a timely manner.
  • SIP (Session Initiation Protocol) is a protocol that is used to establish and control sessions between two hosts. It is used for a variety of applications, such as VoIP and video conferencing.

Telecom Protocols in 4G

4G cellular communication is currently the most common and widely adopted statndard for mobile comminications.

Protocols

The GSM Association (GSMA) defines various protocols and standards for 4G communication using eSIM technology. These protocols ensure interoperability, security, and seamless connectivity in mobile networks. Following is a non-exhaustive list of some key protocols defined by GSMA for 4G communications using eSIM. These protocols and standards defined by GSMA play a crucial role in enabling the widespread adoption of eSIM technology in 4G and beyond, promoting flexibility, security, and convenience.

Remote SIM Provisioning (RSP)

  • RSP is a protocol that allows the remote provisioning of SIM profiles on eSIM-equipped devices.
  • It enables mobile network operators (MNOs) to securely and remotely manage SIM profiles on devices, simplifying the activation and management process for users.

Subscription Management (SM)

  • The Subscription Management protocol is used for the lifecycle management of subscriptions on eSIMs.
  • It allows for the secure download, update, and deletion of subscription profiles on eSIMs, ensuring that devices can switch between networks and operators seamlessly.

eUICC (Embedded Universal Integrated Circuit Card)

  • GSMA defines specifications for eUICCs, which are hardware components embedded in devices to securely store multiple SIM profiles.
  • These eUICCs are responsible for managing the different profiles and securely switching between them.

GSMA Security Accreditation

  • GSMA sets security standards and requirements for eSIM and eUICC implementations to ensure the protection of user data and the integrity of the network.
  • Security accreditation ensures that eSIM-enabled devices and networks adhere to robust security practices.

Bootstrapping and Secure Key Exchange

  • Protocols for secure bootstrapping and key exchange are defined to establish a secure channel between the eSIM and the network during the initial provisioning and activation process.
  • This ensures that sensitive information, such as encryption keys, is securely exchanged.

OTA (Over-The-Air) Updates

  • GSMA specifies OTA update protocols to enable network operators to remotely update eSIM profiles with the latest configurations, security patches, and network settings.
  • This keeps eSIM devices up-to-date without requiring physical SIM card swaps.

Network Authentication and Encryption

  • GSMA defines security protocols to authenticate eSIM-enabled devices on the network and establish encrypted communication channels to protect user data during transmission.

Profile Interoperability

  • GSMA standards ensure that eSIM profiles are interoperable across different device types and network operators, allowing users to switch between devices and carriers seamlessly.