UDM 21.1 Product Description
UDM 21.1 Product Description
21.1.RC1
Product Description
UDM
Product Description Contents
Contents
1 Background .................................................................................................................................... 1
1.1 Trend ............................................................................................................................................................................. 1
1.2 Challenges .................................................................................................................................................................... 2
1.3 5G Core Solution ..................................................................................................................................................... 2
9 Reliability ..................................................................................................................................... 60
10 Security........................................................................................Error! Bookmark not defined.
11 Technical Specifications ..........................................................Error! Bookmark not defined.
12 Traffic Model .............................................................................Error! Bookmark not defined.
UDM
Product Description Contents
1.1 Trend
Mobile communication has greatly changed people's lives, but the pursuit of high-
performance mobile communication has never stopped. The fifth-generation mobile
communication system (aka 5G) is introduced to cope with the explosive growth of mobile
data traffic, massive device connections, and various new services and application scenarios.
5G supports the enhanced mobile broadband (eMBB), ultra-reliable and low-latency
communications (URLLC), and massive machine-type communications (mMTC) use cases to
fit service requirements of network capability extremism and differentiation as well as
network convergence diversity, enabling a fully connected world.
⚫ eMBB
The technological breakthrough in spectrum utilization and bandwidth on the RAN side
enables 5G to provide a transmission rate faster than 4G. For example, only the 5G
ultra-high bandwidth can meet the requirements of the popular AR/VR and HD video
live streaming. When you use VR to watch HD videos or play interactive games, data is
obtained through wired network cables. However, in the future you will be able to
connect to the 5G network without using network cables, and still experience fast
VR/AR services.
⚫ mMTC
5G can connect to 1 million devices per square kilometer, which may be more of
connection density on 4G. With the rapid development of smart cities, public facilities
such as street lamps, well covers, and water meters have network connection capabilities
and can be remotely managed. However, 5G will be more innovative. Based on the
powerful connection capabilities of 5G networks, public devices in all industries can
be connected to an intelligent management platform, these public facilities collaborate
with each other through the 5G network, and centrally managed by a small number of
maintenance personnel, greatly improving the operations efficiency of cities.
⚫ URLLC
The most typical application of 5G is autonomous driving. Large amounts of data need
to be processed instantaneously for multi-channel communication in common scenarios
of autonomous driving, such as sudden braking, vehicle-to-vehicle (V2V), vehicle-to-
person (V2P), and vehicle-to-infrastructure (V2I). Therefore, the 5G network must
provide ultra-low latency and ultra-high reliability to apply to these scenarios.
1.2 Challenges
During the evolution towards 5G, the core network still faces many challenges:
⚫ Long time to market (TTM) for new services
Traditional core network products are delivered based on the software package of a
single product. The development and testing periods are long, the delivery is slow, and
the impact of the upgrade on the live network is great. These products cannot cater for
diversified, flexible, and changeable 5G services. 5G services require a network that
supports fast service rollout and on-demand service provisioning.
⚫ Complex operations management and high costs
− The increasing service flexibility and complexity bring great challenges to the core
network service operations and network governance. The traditional network
operations management cannot cope with the development of 5G services. 5G
services require a network with full autonomy.
− Coexistence of 2G/3G/4G/5G networks and network evolution increases O&M
difficulties and operating expense (OPEX).
⚫ Bandwidth insufficiency and long latency
Rapid growth of service traffic and new services place higher demands on the core
network in terms of bandwidth and latency.
Evolution towards 5G requires a user-centered, application-driven, and highly autonomous
5G core network for agility, resilience, and robustness.
Cloud Native:
It provides microservice-centric architecture, distributed data storage, stateless design,
and agile deployment that fit the development trends of 5G services. our 5G core network
software architecture inherits Cloud Native design concept to implement microservice-centric
architecture for software, support intelligent and on-demand network deployment, simplify
operations management, and help customers achieve business agility.
Service-based architecture (SBA):
⚫ 3GPP defines a brand-new core network using SBA, in which control plane NFs are fully
decoupled. Without using the point-to-point communication, SBA implements service-
oriented networking and plug-and-play NFs, making networks more agile and
accelerating deployments of required functions.
⚫ Service-based interfaces (SBIs) comply with the serial bus interface protocol, the
transport layer complies with the HTTP/2 protocol, and the application layer transmits
different service messages.
⚫ NFS Discovery
For refined management, 3GPP defines NFSs that each NF provides for the control
plane. These NFSs are used sequentially to complete mobile network signaling processes
from end to end, including registration, session management, mobility management,
authentication, and key negotiation. Take the AMF as an example. The AMF has four
NFSs responsible for communication services, mobile terminated (MT) services, event
exposure services, and location services (LCS), implementing mobility management,
access control, and other functions. For details about NFSs, see WSFD-011138 SBI
interface.
Network slicing:
To meet different industry requirements on network resources, 5G Core solution provides
advanced slicing technologies to virtualize a physical network into multiple end-to-end
networks, each of which provides different network functions to meet different service
requirements. This solution flexibly allocates network resources based on service
requirements, provides differentiated connection services for different user groups, and
enables a diverse range of industries.
Various applications in vertical industries have various requirements for network functions,
such as network bandwidth, number of connections, delay, and reliability. These can all be
solved by 5G. The 5G standard classifies network function requirements of different services
into three use cases. The corresponding network slice types are eMBB slices, mMTC slices,
and URLLC slices.
To fit eMBB and fixed wireless access (FWA) in early commercial scenarios defined by 3GPP
specification, 5GC provides two types of slices: UeMBB and FWA. These eMBB slices
defined by protocols. UeMBB slices are used to provide AR, VR, and HD video services.
FWA slices are used as a supplement to fixed broadband in densely-populated urban areas or
are used to provide last-mile coverage. It provides services for HD IPTV and VoIP services.
Figure 1-4 shows the characteristics of the two types of slices. UeMBB slices are mandatory
network slices that must be deployed by carriers. FWA slices are optional network slices that
can be deployed by carriers if required.
Simplified convergence:
⚫ our 5G Core solution implements a simplified and convergent core network that supports
2G/3G/4G/5G network access. It simplifies network O&M and ensures smooth evolution
of existing networks, maximizing carriers' return on investment (ROI).
MEC:
⚫ Services can be distributed locally to help industry users implement local operations of
service data and provide differentiated services for subscribers at the network edge,
delivering an ultra-low latency experience to subscribers.
our 5G Core solution is based on the Cloud Native software architecture and supports key
cloud-based technologies, such as software decoupling, stateless design, cross-DC
deployment, microservice delivery, and A/B test, to provide optimal 5G experience for
customers. This solution involves multiple products, including the UNC, UDG, UPCF, and
UDM.
UDM
Product Description 2 Product Positioning
2 Product Positioning
3GPP has defined two types of network architecture: non-standalone (NSA) and standalone
(SA). Carriers can choose a suitable option to quickly launch their 5G services. UDM is
positioned as a unified user management product in the industry-leading Cloud Native
architecture for future 5G SA networks. It complies with 3GPP. The service-oriented
architecture design provides agile service development and service selection on demand,
enables flexible service orchestration and combination, and makes service innovation more
agile. In addition, to help carriers simplify the networking and facilitate smooth evolution to
the 5G SA network, the UDM integrates the functions of the UDM and AUSF in the emerging
5G network, manages the authentication data of 5G subscribers, and authenticates access for
5G subscribers. The UDM also provides basic network functions, such as mobility
management, access authentication, and service authorization, for traditional 2G/3G, EPS, and
IMS network subscribers. Table 2-1 describes the functions of UDM.
5GC UDM serves as the UDM providing service processing functions defined by
network the N8 and N10 interfaces in 3GPP specifications. It stores the subscription data
and registration data of subscribers, delivers subscription data to the AMF/SMF,
and stores the address of the AMF serving subscribers.
UDM serves as the AUSF providing the service processing functions defined
by the N12 interface in 3GPP specifications, and receives signaling messages to
authenticate subscribers and networks.
Traditio ⚫ HLR on GSM/UMTS networks
nal ⚫ SAE-HSS on EPS networks
network
⚫ IMS-HSS on IMS networks
The UDM stores all subscriber-relevant data, including identities, authentication
data, subscription data, and location data. In addition, the UDM verifies mobile
terminals when they attempt to access networks.
The 5G core network uses the Service Based Architecture (SBA) to implement NFs plug-and-
play. Figure 2-2 shows the position of UDM on the SBA of 5G networks.
UDM
Product Description 2 Product Positioning
3 Product Highlights
Figure 3-3 shows the service-based architecture. NFs serving as NRFs, such as UDM and
AUSF, can implement self-governance, self-discovery, and self-balancing to build a 5G core
network with full autonomy, helping carriers deploy simplified core networks and reduce
O&M costs. All NFs interact with each other over service-based interfaces. A service type can
be invoked by multiple NFs to reduce coupling defined for interfaces between NFs. This way,
all NFs can be customized on demand to flexibly meet requirements in different service
scenarios.
⚫ Self-governance: When an NF, for example, UDM or AUSF, becomes operative for the
first time, it automatically registers with the NRF and automatically updates its status.
UDM
Product Description 3 Product Highlights
The NRF provides complete and automatic lifecycle management for the NF to make it
plug and play.
⚫ Self-discovery: An NF, for example, UDM or AUSF, can use the NRF to search for a
proper service producer rather than a fixed peer obtained from local configurations.
⚫ Self-balancing: The NRF detects faulty NFs, such as UDM and AUSF, in real time and
isolates them to prevent the faulty NFs from affecting overall system availability.
4 Typical Networking
AMF: access and mobility SMF: session management NEF: network exposure
management function function function
NRF: network repository NSSF: network slice AF: application function
function selection function
PCF: policy control function UDM: unified data AUSF: authentication
management server function
SAE-HSS: System IMS-HSS: IP multimedia PCRF: policy and
Architecture Evolution-home subsystem-home subscriber charging rules function
subscriber server server
MME: mobility management SGW-C: serving gateway for PGW-C: PDN gateway
entity control plane for control plane
SGW-U: serving gateway for PGW-U: PDN gateway for UPF: user plane function
user plane user plane
AS: application server I-CSCF: interrogating-call S-CSCF: serving-call
session control function session control function
P-CSCF: proxy-call session eNodeB: E-UTRAN NodeB gNodeB: next generation
control function NodeB
UDM
Product Description 4 Typical Networking
5 Service Functions
Basic Description
Function
UDM
Product Description 5 Service Functions
Mobility Provides the access and mobility capabilities for UEs on a network and the
managemen service continuity capabilities for UEs during movement. On the network,
t the UDM stores the subscription data and dynamic data of subscribers,
delivers subscription data to the MME and MSC, and stores the addresses of
the MME and MSC serving subscribers. The UDM can flexibly manage
subscribers' access information. ARD and barring services are used to
flexibly manage subscriber access to networks.
UDM
Product Description 5 Service Functions
Basic Description
Function
UDM
Product Description 5 Service Functions
Basic Description
Function
Security On 2G, 3G, and 4G networks, the UDM supports the following
managemen authentication methods. Carriers can select authentication methods
t according to their policies.
⚫ GSM authentication
GSM authentication is a process of checking the validity of subscribers
who use SIM cards to access GSM networks, ensuring GSM network
security.
⚫ UMTS authentication
UMTS authentication provides mutual authentication between UMTS
networks and subscribers using USIM cards to access UMTS networks.
ensuring UMTS network security.
⚫ EPS-AKA authentication
EPS Authentication and Key Agreement (EPS-AKA) authentication
provides mutual authentication between EPS networks and subscribers
using USIM cards to access EPS networks. It requires that the access
network and the core network use different keys, ensuring the security of
access stratum (AS) and non-access stratum (NAS).
⚫ EAP-AKA/EAP-AKA' authentication
Extensible Authentication Protocol Method for UMTS Authentication
and Key Agreement (EAP-AKA) and EAP-AKA' authentication is used
for authenticating non-3GPP subscribers. When a non-3GPP subscriber
attempts to access an EPC network, the AAA and SAE-HSS exchange
information such as authentication information, subscription data, and
location information over the SWx interface to authenticate the
subscriber.
Subscriber The UDM provides flexible subscriber data management functions, such as
data defining and deleting 2G/3G/4G subscribers, changing SIM/USIM cards,
managemen changing MSISDNs, and modifying and querying subscription data.
t
UDM
Product Description 5 Service Functions
Basic Description
Function
Subscriber On 2G/3G/4G networks, the UDM can process requests for subscribing to or
data unsubscribing from subscription data changes. After the peer NE/NF
subscription subscribes to subscription data changes, the UDM promptly notifies the peer
and NE/NF of data changes. After the peer NE/NF unsubscribes from
notification subscription data changes, the UDM does not notify the peer NE/NF of data
changes. This function enables subscription data changes to be delivered
promptly, ensuring data consistency between NEs/NFs and improving
system reliability.
Auto- Auto-Provisioning for VoLTE enables the HSS to provide voice over Long
Provisionin Term Evolution (VoLTE) services for 2G/3G or LTE subscribers who have
g for not subscribed to the VoLTE services and attempt to access an LTE or IMS
VoLTE network for the first time. With VoLTE auto-provisioning, subscribers can
use VoLTE services without changing their USIM cards and MSISDNs.
Auto-provisioning automatically enable subscribers with LTE, VoLTE, and
VoWiFi services to accelerate the development of these services.
UDM
Product Description 5 Service Functions
Basic Description
Function
Supporting The Voice over WiFi (VoWiFi) service enables non-3GPP subscribers to
VoWiFi use IMS services, such as voice, SMS, and supplementary services, over
Wi-Fi connections. VoWiFi provides better indoor coverage and rich voice
service experience.
The VoWiFi service can be provided for a VoWiFi subscriber or a VoWiFi
Multi-SIM subscriber. Different from a VoWiFi subscriber who has only
one USIM card, a VoWiFi Multi-SIM subscriber has multiple terminals that
share one IMPU.
Mobility Provides the access and mobility capabilities for UEs on a network and the
managemen service continuity capabilities for UEs during movement. On the network,
t the UDM stores the subscription data and registration data of subscribers,
delivers subscription data to the AMF, and stores the address of the AMF
serving subscribers. The UDM can flexibly manage subscribers' access
registration information. ARD and barring services are used to flexibly
manage subscriber access to networks.
UDM
Product Description 5 Service Functions
Basic Description
Function
Session Enables UEs to access packet data networks (PDNs) through a network and
managemen enjoy data services. Session management includes the session establishment
t and release. During the session establishment, the SMF sends a registration
request to the UDM to obtain the subscription data of a subscriber and
subscribes to the data from the UDM. The SMF sends a deregistration
request to the UDM during session release.
UDM
Product Description 5 Service Functions
Basic Description
Function
Basic Description
Function
Subscriber The UDM provides flexible subscriber data management functions, such as
data defining and deleting 5G subscribers, changing SIM cards, changing
managemen MSISDNs, and modifying and querying subscription data.
t
Subscriber On the 5G network, the UDM can process requests for subscribing to or
data unsubscribing from subscription data changes. After the peer NF subscribes
subscription to subscription data changes, the UDM promptly notifies the peer NF of data
and changes. After the peer NF unsubscribes from subscription data changes, the
notification UDM does not notify the peer NF of data changes. This function enables
subscription data changes to be delivered promptly, ensuring data
consistency between NFs and improving system reliability.
Network The UDM provides available slices and the default slice list for 5G
slice subscribers. During a service procedure, the AMF/SMF obtains subscribers'
managemen slice information from the UDM based on subscriber attributes and service
t types to manage slices on 5G networks.
UDM
Product Description 5 Service Functions
Function Description
UDM
Product Description 5 Service Functions
4G-5G During the network evolution, carriers need to use existing 4G investments
interworkin to smoothly evolve to 5G networks. Therefore, the 4G and 5G networks will
g coexist for a long time. The UDM supports 4G-5G interworking. This
function ensures service continuity during handovers between 5G networks
and 4G networks, helping improve user experience.
As shown in Figure 5-1, there are two modes for 4G-5G interworking:
single registration and dual registration.
⚫ Single registration mode: When a UE switches between the 4G network
and 5G network, the UE can register with only one network. That is, the
UDM only stores the registration data of either the MME or the AMF.
If a UE has registered with the 4G network, an EPC-to-5GC handover is
triggered when the UE moves to the 5G network. The UE sends a
registration request over the 5G network through the AMF to the UDM.
After receiving the AMF registration information, the UDM clears the
MME registration information of the UE from the 4G network.
If the UE has registered with the 5G network, a 5GC-to-EPC handover is
triggered when the UE moves to the 4G network. The UE sends a
registration request over the 4G network through the MME to the UDM.
After receiving the MME registration information, the UDM clears the
AMF registration information of the UE from the 5G network.
⚫ Dual registration mode: When a UE switches between the 4G network
and 5G network, the UE can register with both networks.
If a UE has registered with the 4G network, an EPC-to-5GC handover is
triggered when the UE moves to the 5G network. The UE sends a
registration request to the AMF on the 5G network and completes the
location update through the SMF on the 5G network. The UDM uses the
PGW-C/SMF address on the 5G network to update the PGW-C address
stored on the 4G network and sends an address update notification to the
MME on the 4G network.
If the UE has registered with the 5G network, a 5GC-to-EPC handover is
triggered when the UE moves to the 4G network. The UE sends a
registration request to the MME on the 4G network and completes the
location update on the 4G network. The UDM uses the PGW-C/SMF
address on the MME of the 4G network to update the PGW-C/SMF
address stored on the 5G network and sends an address update
notification to the SMF on the 5G network.
Function Description
UDM
Product Description 5 Service Functions
Function Description
VoNR Although data services drive 5G evolution, voice services are still important
services of carriers. The voice over NR (VoNR) provides the technology of
bearing voice over the 5G New Radio (5G NR), which features short call
setup time. The VoNR is an E2E voice solution based on the 5G NR
network, all-IP network, and IMS network. By deploying the IMS network,
VoNR enables the IMS to process CS services so that both CS and PS
services can be carried over the 5G network.
As shown in Figure 5-3, in the VoNR solution, the UE camps on the NR
network, and CS and PS services are processed on the NR network and
enjoy the 5G bandwidth. When the UE moves to the area with poor NR
coverage, the UE is handed over to the LTE network and VoLTE is used to
provide CS services.
The key functions of the UDM in the VoNR solution are as follows:
⚫ 5G domain selection: When a UE initiates or receives a call, a network
must be selected to connect the call. This process is called domain
selection. During 5G domain selection, the SCC AS sends a request to
the UDM to obtain the T-ADS information. The UDM sends a T-ADS
query message to the AMF and MME to obtain the domain which the UE
accesses and the network on which the UE camps. Then, the UDM sends
a message containing the obtained information to the SSC AS.
⚫ 5G subscriber location and status query: Charging and location differ
between subscribers. The AS needs to obtain the current locations and
status of subscribers to implement service control during a call. The AS
obtains the locations and status of 5G subscribers from the UDM to
control, adjust, and provide high-quality services for 5G subscribers.
⚫ UE reachability management: This function is responsible for detecting
whether the UE is reachable and providing the UE location for the
network to reach the UE. When a UE has registered with the IMS
network and the SMSC receives an SMS request, the SMS message
cannot be delivered if the UE is temporarily out of the service area or
unreachable. In this case, the IP-SM-GW sends a UE reachability
subscription request to the UDM to detect the reachability status of the
UDM
Product Description 5 Service Functions
Function Description
UE. When the UE is reachable, the UDM instructs the IP-SM-GW to
trigger the short message resending procedure.
⚫ P-CSCF restoration: In VoNR scenarios, if the UDM detects that the P-
CSCF with which the called party is registered is faulty, the UDM
instructs the registered AMF to trigger the P-CSCF Restoration
procedure to recover the P-CSCF.
UDM
Product Description 6 Product Architecture
6 Product Architecture
Hardware layer Common COTS devices, including servers, storage devices, and
network devices.
Virtualization Virtualizes hardware resources into virtual resources. The virtual
layer network supports EVS, OVS, and SR-IOV.
UDM
Product Description 6 Product Architecture
Category Component
VNF layer EMS: a VNF management system. One or more EMSs can be
deployed to meet site requirements.
VNF: virtual network function entities, that is, service NEs hosted on
VMs.
⚫ CSP: provides unified, efficient, web-based, visual O&M functions
for applications.
⚫ USCDB: provides data storage, data management, and data services
for the UDM.
⚫ UDM: integrates and stores 2G/3G/4G/5G subscriber data to
implement centralized data management. The SBA architecture is
used to support quick service rollout and A/B test.
Operations Carrier operations support system and service support system.
support layer
Ma Applicatio VNFM: a VNF lifecycle management component, implementing VNF
nag n instantiation, scaling, and rebuilding.
em manageme
ent nt
Infrastruct FusionStage: a container management platform, implementing
ure container deployment and container resource management.
manageme FusionSphere: includes FusionSphere OpenStack and FusionSphere
nt OpenStack OM, which are used to manage the cloud OS and virtual
resources.
iMaster NCE-Fabric: SDN controller, implementing automatic
network deployment and configuration.
eSight: an NFVI O&M center that manages NFVI hardware and
topologies and provides O&M functions.
Service Description
Name
Convergent Provides the signaling processing subsystem for receiving and processing
HLR/HSS 2G/3G/4G signaling messages.
service
USCDB Provides data storage, data management, and data service of 2G/3G/4G/5G
service subscribers.
CSLB Forwards messages and balances the load at L3 (IP layer) and L4
service (TCP/SCTP/UDP layer).
UDM
Product Description 6 Product Architecture
Service Description
Name
The 5G UDM adopts the Service Based Architecture and introduces service-based interfaces,
in addition to traditional interfaces on 2G/3G/4G networks. All NFs on the control plane
interact with each other over service-based interfaces. A type of service can be invoked by
multiple NFs to reduce coupling for interfaces between NFs. This way, all NFs can be
customized on demand, flexibly meeting requirements in different service scenarios.
Interaction mode between NFs: The interaction modes are simplified as Request-Response
and Subscribe-Notify so that NFs can interact with each other over service-based interfaces.
9 Reliability
UDM stores subscriber data and its reliability is crucially important. A serious accident, such
as a misoperation, equipment failure, or natural disaster, will cause service interruption in
large areas and immeasurable losses. To ensure the high system reliability of mobile
networks, the UDM uses the distributed architecture, anti-affinity deployment, anti-split-brain
cluster, multi-level data backup, and seamless geographic redundancy.
0 illustrates the UDM reliability design.
UDM
Product Description 9 Reliability
UDM
Product Description 10 Reliability Specifications
10 Reliability Specifications