- Mar 2024
-
www.clingendael.org www.clingendael.org
-
European governments have thus been pushingfor reduced reliance on China’s Huawei forcritical parts of telecommunication networks inthe shift from 4G to 5G networks.
The article calls 'a 5g moment' the moment of realisation that dependencies in a tech may erode strategic position, by letting critical infrastructure to be controlled by tech firms that can be influenced by other governments. In the case of 5g it's Huawei and Chinese gov, in the case of cloud it's GAM and US gov. This is not a new notion, it is why the EU digital and data legal framework was created the past 4 yrs, so why this paper now?
-
- Nov 2023
-
www.tech-invite.com www.tech-invite.com
-
for the whole set of UEs
Tags
Annotators
URL
-
- Sep 2023
-
www.microsoft.com www.microsoft.com
-
Looking for LTE?
No, it's 2023. Nobody is looking for LTE. They want 5G.
-
- May 2023
-
www.tech-invite.com www.tech-invite.com
-
PSI
Policy Section ID
-
This procedure is used to update UE policy and/or UE policy triggers.
PCF triggers URSP
-
when a UE Policy Container is received from the UE
UE send policy container to AMF
-
-
-
the AKMA architecture becomes entirely different compared to GBA
AKMA
-
-
www.tech-invite.com www.tech-invite.com
-
each S-NSSAI may contain a Subscribed DNN
Subscription for one S-NSSAI: 1. a list of Subscribed DNN 1. one default DNN
-
PDU Session types are defined: IPv4, IPv6, IPv4v6, Ethernet, Unstructured.
-
The expectation is that the URSP in the UE is always up to date
Use URSP to sync DNN to UE.
-
-
www.tech-invite.com www.tech-invite.com
-
Network Slice Simultaneous Registration Group (NSSRG)
restrictions to the simultaneous registration of network slices
-
a Network Slice instance can be associated with one or more S-NSSAIs, and an S-NSSAI can be associated with one or more Network Slice instances
S-NSSAI and Network Slice instance doesn't have a one-to-one relationship.
-
eight S-NSSAIs
Max 8 S-NSSAIs in Allowed and Requested NSSAI.
-
such S-NSSAI is comprised of either both an SST and an SD or only an SST without a standardised SST value and no SD
non-standard values,
-
Network Slice Simultaneous Registration Group (NSSRG)
-
Network Slice Admission Control (NSAC)
-
Network Slice-Specific Authentication and Authorization (NSSAA)
-
Number of simultaneous connection of Network Slice instances per UE is limited
up to 8?
-
The AMF instance serving the UE logically belongs to each of the Network Slice instances serving the UE,
The AMF serving for the UE will also serve for all slices of the UE.
Tags
Annotators
URL
-
-
www.tech-invite.com www.tech-invite.com
-
UE Configuration Update procedure for transparent UE Policy delivery
PCF tiggered
-
trigger UE to perform
- Mobility Registration Update procedure while the UE is in CM-CONNECTED state
- Mobility Registration Update procedure while the UE is in CM-IDLE state
-
UE Configuration Update
UE Configuration Update -> UCU
Tags
Annotators
URL
-
-
www.techplayon.com www.techplayon.com
-
concealed SUPI is known as SUCI (Subscription Concealed Identifier )
SUCI -> concealed SUPI
-
Subscription Permanent Identifier
SUPI
Tags
Annotators
URL
-
-
www.techplayon.com www.techplayon.com
-
5G Global Unique Temporary Identifier
- temporary ID
- allocated by AMF
- 80 bits
- PLMN + AMF ID + TMSI
-
-
-
A UE in CM-CONNECTED state can be in RRC Inactive state
Possible case
Tags
Annotators
URL
-
-
www.techplayon.com www.techplayon.com
-
CM-Connected
has signaling connection
-
N1 logical interface and it is combination of following
N1 logical interface
UE <==RRC ==>gNB<==N2-AP==>AMF
-
5G System Connection Management
CM -> Connection Management
-
-
blog.3g4g.co.uk blog.3g4g.co.uk
-
User Equipment Route Selection Policy, or URSP
User Equipment Route Selection Policy
-
-
www.sharetechnote.com www.sharetechnote.com
-
Basically APN is controlling network parameters (or configurations) by switching the traffic to various different gateway on the core network.
APN
Tags
Annotators
URL
-
-
www.tech-invite.com www.tech-invite.com
-
If UE unaware indication is received by AMF, and the UE is in CM_IDLE state or in RRC_INACTIVE state (if known by AMF by requesting the NG-RAN to report RRC state information), the steps 5 - 9 are skipped.
如果AMF接收到UE unaware indication,并且UE处于CM_IDLE状态或RRC_INACTIVE状态(如果AMF通过请求NG-RAN报告RRC状态信息得知),则步骤5至步骤9将被跳过。
UE unaware indication是指在位置服务过程中,LCS客户端(Location Services Client)向AMF(Access and Mobility Management Function)发送的指示,用于表明该LCS客户端不需要知道UE(User Equipment)的具体状态或活动信息
-
Namf_Location_ProvidePositioningInfo
GMLC通过与目标UE所连接的AMF之间的接口进行通信,发起Namf_Location_ProvidePositioningInfo服务操作。该操作的目的是向AMF请求获取UE的当前位置信息。
在服务操作中,GMLC提供了目标UE的SUPI作为标识符,以便AMF能够识别和定位目标UE。此外,GMLC还可以提供关于所需的服务质量、UE未知指示和Supported GAD shapes的信息,以便AMF根据需求进行定位操作。
Namf_Location_ProvidePositioningInfo服务操作的结果将包含UE的当前位置信息。AMF将根据请求进行位置测量和计算,并将结果返回给GMLC,以便GMLC可以获取目标UE的位置数据。
需要注意的是,步骤4中的Namf_Location_ProvidePositioningInfo服务操作是用于向AMF请求获取UE的当前位置信息。该操作是整个位置服务流程的一部分,旨在从网络中获取目标UE的实时位置数据
-
The GMLC invokes a Nudm_UECM_Get service operation towards the home UDM of the target UE to be located with the GPSI or SUPI of this UE.
GMLC使用目标UE的GPSI或SUPI作为参数,通过与目标UE归属家庭UDM之间的接口进行通信,发起Nudm_UECM_Get服务操作。这个操作的目的是向家庭UDM请求获取与目标UE相关的用户订阅和配置信息
-
The external location services client sends a request to the GMLC for a location for the target UE identified by an GPSI or an SUPI. The request may include the required QoS, UE unaware indication and Supported GAD shapes. If location is required for more than one UE, the steps following below may be repeated and in that case the GMLC shall verify whether the number of Target UEs in the LCS request is equal to or less than the Maximum Target UE Number of the LCS client. If Maximum Target UE Number is exceeded, the GMLC shall reject the LCS request, the step 2-10 are skipped, and then GMLC respond to the client with proper error cause in the step 11.
外部位置服务客户端向GMLC(Gateway Mobile Location Centre)发送一个请求,以获取由GPSI或SUPI标识的目标UE的位置信息。该请求可以包括所需的位置服务质量(QoS)、UE无感知指示和支持的位置辅助数据(GAD)形状。
如果需要为多个目标UE获取位置信息,则可以重复以下步骤。在这种情况下,GMLC需要验证LCS请求中的目标UE数量是否等于或小于LCS客户端的最大目标UE数量。如果超过了最大目标UE数量,GMLC将拒绝LCS请求,并跳过步骤2-10,然后在步骤11中向客户端回复适当的错误原因。 简单来说,这段描述描述了以下过程:
1.外部位置服务客户端向GMLC发送位置请求,请求获取由GPSI或SUPI标识的目标UE的位置信息。
2.GMLC接收到位置请求后,验证LCS请求中的目标UE数量是否超过LCS客户端的最大目标UE数量。
3.如果目标UE数量符合要求,GMLC继续执行步骤2-10;如果目标UE数量超过最大限制,GMLC拒绝LCS请求并跳过步骤2-10。
4.在步骤2-10中,GMLC执行相应的操作,包括根据请求中的参数和配置获取目标UE的位置信息。
5.GMLC将获取的位置信息作为响应发送回外部位置服务客户端。
6如果LCS请求被拒绝(因为目标UE数量超过最大限制),GMLC将在步骤11中向客户端回复适当的错误原因,指示无法处理该请求。
这个过程描述了外部位置服务客户端向GMLC发送位置请求并获取目标UE位置信息的流程,同时对目标UE数量进行了验证和限制。
-
illustrates the general network positioning for the LCS clients external to the PLMN for the regulatory location service for non-roaming scenario. In this scenario, it is assumed that the target UE is identified using an SUPI or GPSI.
展示了非漫游场景下,监管位置服务中位于PLMN外部的LCS客户端的一般网络定位情况。在这种情景中,假设目标UE是使用SUPI(Subscriber Permanent Identifier)或GPSI(Global Public Subscriber Identity)进行标识。
这种场景可以类比为派出所或其他执法机构发送请求来获取手机位置的情况。在监管位置服务中,监管机构(如执法机构、安全机构或紧急响应机构)可以向移动网络提供商发送位置请求,以获取目标手机的位置信息。
SUPI(Subscriber Permanent Identifier):SUPI是一个订阅者永久标识符,用于唯一标识一个移动网络用户。它是由移动网络运营商分配给用户的,通常与用户的SIM卡或eSIM关联。SUPI可以包含国家码、移动网络码和用户标识等信息,以便在移动网络中唯一识别用户。
GPSI(Global Public Subscriber Identity):GPSI是一个全球公共订阅者标识,用于在全球范围内唯一标识一个移动网络用户。GPSI是由国际移动设备身份(IMEI)与国际移动用户识别码(IMSI)的组合形成的。IMEI用于标识移动设备,而IMSI用于标识移动网络用户。通过将IMEI和IMSI组合在一起,可以生成一个全球唯一的GPSI,用于跨多个移动网络识别用户。
Tags
Annotators
URL
-
- Nov 2021
-
www.phonearena.com www.phonearena.com
-
5G bands cheat sheet: Verizon vs AT&T vs Sprint vs T-Mobile vs World
-
- Jun 2021
-
www.theguardian.com www.theguardian.com
-
Covid lies cost lives – we have a duty to clamp down on them | George Monbiot. (2021, January 27). The Guardian. http://www.theguardian.com/commentisfree/2021/jan/27/covid-lies-cost-lives-right-clamp-down-misinformation
-
- Sep 2020
-
www.youtube.com www.youtube.com
-
5G santé et environnement
Tags
Annotators
URL
-
-
www.nature.com www.nature.com
-
Leask, Julie. ‘Vaccines — Lessons from Three Centuries of Protest’. Nature 585, no. 7826 (21 September 2020): 499–501. https://doi.org/10.1038/d41586-020-02671-0.
-
- Aug 2020
-
www.facebook.com www.facebook.com
-
Salaamedia. (2020, June 23). The Special Focus with Zahid Jadwat—Understanding the dangers of misinformation. Facebook. https://www.facebook.com/salaamedia/videos/the-special-focus-with-zahid-jadwat-understanding-the-dangers-of-misinformation-/261866155076824/
Tags
- discussion
- psychology
- 5G
- social media
- conspiracy theory
- research
- is:webinar
- is:webpage
- misinformation
- expert
- COVID-19
- lang:en
- webinar
Annotators
URL
-
- Jun 2020
-
onlinelibrary.wiley.com onlinelibrary.wiley.com
-
Jolley, D., & Paterson, J. L. (n.d.). Pylons ablaze: Examining the role of 5G COVID-19 conspiracy beliefs and support for violence. British Journal of Social Psychology, n/a(n/a). https://doi.org/10.1111/bjso.12394
-
-
www.siliconrepublic.com www.siliconrepublic.com
-
Gorey, C. (2020, June 22). Researchers link anger and paranoia with 5G Covid-19 conspiracy beliefs. Silicon Republic. https://www.siliconrepublic.com/innovation/anger-paranoia-5g-covid-19-conspiracy-theories
-
- May 2020
-
www.washingtonpost.com www.washingtonpost.com
-
Bode, L., & Vraga, E. (2020 May 7). Analysis | Americans are fighting coronavirus misinformation on social media. Washington Post.https://www.washingtonpost.com/politics/2020/05/07/americans-are-fighting-coronavirus-misinformation-social-media/
-
-
standuprepublic.com standuprepublic.com
-
McKew, M. (2020, May 13) Disinformation Starts at Home. Stand Up Republic. https://standuprepublic.com/disinformation-starts-at-home/
-
- Apr 2020
-
psyarxiv.com psyarxiv.com
-
Frey, R. (2020, April 26). Psychological drivers of inter- and intraindividual differences in risk perception: A systematic case study on 5G. https://doi.org/10.31234/osf.io/7a3kg
-