From the course: 5G Standalone (SA): Air Interface, NR Design, Cloud Core, QoS, Slicing, and Mobility
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Virtualization and containerization essentials
From the course: 5G Standalone (SA): Air Interface, NR Design, Cloud Core, QoS, Slicing, and Mobility
Virtualization and containerization essentials
Imagine you could make one physical computer act like an independent computers or package an application with everything it needs to run anywhere. And this is the power of two fundamental cloud technologies. One is virtualization, another is containerization. Let's start with the virtualization where the physical server runs the multiple virtual machines simultaneously. Each virtual machine acts like a complete computer with its own operating system, applications and resources. Think of it as dividing a powerful server into several smaller independent virtual servers. This is made possible by a special software layer called Hypervisor which manages and allocates the physical resources to each virtual machine. Now here is how virtualization works in practice. The hypervisor which sits directly on the physical server creates virtual versions of resources. For example, one single machine of 8 GB RAM converts it into 3 applications using virtual machines. And each virtual machine gets its…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Overview of modern telecom networks3m 26s
-
(Locked)
Architecture of telecom networks5m 18s
-
(Locked)
Key building blocks of the 5G system4m 20s
-
(Locked)
Evolution from traditional networks to 5G2m 58s
-
(Locked)
Radio access network (RAN) essentials2m 27s
-
(Locked)
Structure of the 5G new radio4m 50s
-
(Locked)
Transport network fundamentals3m 7s
-
(Locked)
Service-aware transport networking3m 42s
-
(Locked)
The 5G core network explained4m 10s
-
(Locked)
Deployment options for 5G networks4m 4s
-
(Locked)
Standalone (SA) architecture: Option 2 explained4m 31s
-
(Locked)
-
-
(Locked)
Understanding 5G spectrum5m 17s
-
(Locked)
NR frame structure3m 18s
-
(Locked)
NR resource grid explained4m 16s
-
(Locked)
Downlink signals and channels4m 21s
-
(Locked)
Initial access in NR2m 15s
-
(Locked)
Synchronization signal block (SSB)2m 24s
-
(Locked)
OFDMA in 5G NR2m 44s
-
(Locked)
Modulation techniques2m 54s
-
(Locked)
Modulation and coding schemes2m 47s
-
(Locked)
Duplex schemes in 5G2m 47s
-
(Locked)
Scheduler and resource allocation2m 24s
-
(Locked)
Scheduler modes3m 51s
-
(Locked)
-
-
(Locked)
Introduction to cloud computing3m 58s
-
(Locked)
Key attributes of cloud systems3m 50s
-
(Locked)
IaaS, PaaS, and SaaS explained4m 25s
-
(Locked)
How 5G network uses cloud platforms4m 10s
-
(Locked)
Public, private, and hybrid cloud models4m 15s
-
(Locked)
Virtualization and containerization essentials4m 30s
-
(Locked)
-
-
(Locked)
Overview of 5G core architecture2m 39s
-
(Locked)
AMF: Access and Mobility Management Function2m 39s
-
(Locked)
SMF: Session Management Function2m 45s
-
(Locked)
UPF: User Plane Function2m 28s
-
(Locked)
PCF: Policy Control Function3m 10s
-
(Locked)
UDM: Subscriber and Data Management2m 19s
-
(Locked)
NWDAF: Analytics for 5G networks2m 40s
-
(Locked)
NSSF: Slice selection function2m 23s
-
(Locked)
NRF: NF repository and discovery2m 46s
-
(Locked)
-
-
(Locked)
Why 5G needs cloud technologies3m 30s
-
(Locked)
NFV: Virtualization of network functions3m 21s
-
(Locked)
NFV in 5G deployments3m 30s
-
(Locked)
SBA: Cloud-native 5G architecture7m 21s
-
(Locked)
RAN evolution stages3m 44s
-
(Locked)
Disaggregated RAN concepts2m 58s
-
(Locked)
O-RAN Alliance architecture2m 54s
-
(Locked)
O-RAN split 2 (3GPP)2m 23s
-
(Locked)
O-Cloud overview4m 12s
-
(Locked)
O-Cloud in open RAN4m 5s
-
(Locked)
End-to-end cloud architecture for 5G RAN and core3m 34s
-
(Locked)
-
-
(Locked)
Path loss and attenuation in 5G2m 48s
-
(Locked)
Large-scale propagation models3m 26s
-
(Locked)
Doppler and phase noise effects2m 24s
-
(Locked)
Building penetration loss4m 33s
-
(Locked)
Link budget fundamentals2m 37s
-
(Locked)
Coverage planning methodology4m 12s
-
(Locked)
Downlink link budget calculation4m 49s
-
(Locked)
Uplink link budget calculation2m 39s
-
(Locked)
Detailed link budget breakdown7m 13s
-
(Locked)
-
-
(Locked)
Blueprint for 5G network planning2m 43s
-
(Locked)
Traffic growth and network dimensioning2m 50s
-
(Locked)
Shannon’s capacity law2m 44s
-
(Locked)
Peak data rate calculation6m 55s
-
(Locked)
Practical throughput planning4m 16s
-
(Locked)
Throughput across deployment modes2m 4s
-
(Locked)
User plane latency fundamentals2m 42s
-
(Locked)
Latency calculation module3m 39s
-
(Locked)
-
-
(Locked)
Complete 5G protocol stack overview4m 13s
-
(Locked)
Downlink signals and channels4m 3s
-
(Locked)
Initial access procedures4m 36s
-
(Locked)
PDCCH: 5G control channel4m 2s
-
(Locked)
PDCCH simulation module2m 53s
-
(Locked)
PDSCH: Downlink data channel2m 10s
-
(Locked)
PDSCH simulation module2m 51s
-
(Locked)
PUCCH: Uplink control3m 3s
-
(Locked)
PUSCH: Uplink shared channel2m 48s
-
(Locked)
PUCCH/PUSCH simulation2m 54s
-
(Locked)
L2 data flow overview2m 12s
-
(Locked)
RLC layer explained3m 6s
-
(Locked)
MAC layer explained2m 37s
-
(Locked)
PDCP layer explained3m 23s
-
(Locked)
SDAP and QoS flow mapping2m 51s
-
(Locked)
RRC layer explained2m 34s
-
(Locked)
-
-
(Locked)
Initial access and registration4m 36s
-
(Locked)
5G call setup flow2m 35s
-
(Locked)
Key steps in call establishment5m 59s
-
(Locked)
RRC state transitions3m 27s
-
(Locked)
UE state transitions3m 11s
-
(Locked)
RRC idle and connected modes1m 45s
-
(Locked)
Registration message flow6m 32s
-
(Locked)
Context setup in 5G3m 8s
-
(Locked)
Initial context setup flow4m 56s
-
(Locked)
PDU session setup4m 24s
-
(Locked)
Understanding QoS flows5m 26s
-
(Locked)
QoS flow and PDU management4m 2s
-
(Locked)
DRB explained5m 38s
-
(Locked)
-
-
(Locked)
Why networks need quality of service (QoS)2m 26s
-
(Locked)
End-to-end QoS priority lanes for network traffic3m 29s
-
(Locked)
5G standalone QoS3m 20s
-
(Locked)
Dynamic QoS enforcement in 5G networks3m 12s
-
(Locked)
QoS hierarchy in 5G networks3m 16s
-
(Locked)
Multiple data radio bearers in 5G3m 5s
-
(Locked)
Understanding 5G QoS parameters3m 7s
-
(Locked)
-
-
(Locked)
Network slicing in 5G3m 22s
-
(Locked)
Network slice identifiers (NSSAI)2m 28s
-
(Locked)
Keeping your service seamless using slicing3m 18s
-
(Locked)
Slice selection during registration4m 49s
-
(Locked)
AMF selection based on slicing3m 36s
-
(Locked)
Network slice configuration in RAN2m 17s
-
(Locked)
USRP: User Equipment Route Selection Policy4m 34s
-
(Locked)
-
-
(Locked)
5G voice option in ENDC2m 45s
-
(Locked)
EPS fallback for voice call2m 23s
-
(Locked)
Voice over NR (VoNR)2m 10s
-
(Locked)
IMS architecture and core components4m 45s
-
(Locked)
VoNR registration flow3m 38s
-
(Locked)
VoNR call setup flow3m 7s
-
(Locked)
Emergency calls on 5G network2m 55s
-
(Locked)
QoS and GBR bearers for VoNR6m 54s
-
(Locked)
VoNR coverage considerations9m 15s
-
(Locked)
VoNR capacity considerations2m 39s
-
(Locked)
-
-
(Locked)
Measurement events overview (A and B series)3m 50s
-
(Locked)
Event A1 (serving cell becomes better than threshold)2m 1s
-
(Locked)
Event A2 (serving cell becomes worse than threshold)1m 29s
-
(Locked)
Event A3 (neighbor cell becomes offset better than serving cell)2m 44s
-
(Locked)
Event A4 (neighbor cell becomes better than threshold)2m 6s
-
(Locked)
Event A51m 35s
-
(Locked)
Event A6 (neighbor cell becomes offset better than SCell)2m 52s
-
(Locked)
5G measurement events: B-series2m 6s
-
(Locked)
Event B1 (inter-RAT neighbor becomes better than threshold)1m 8s
-
(Locked)
Event B21m 42s
-
(Locked)
-
-
(Locked)
Idle mode mobility in standalone (SA) 5G2m 45s
-
(Locked)
Cell selection in 5G2m 35s
-
(Locked)
Cell reselection types2m 40s
-
(Locked)
Cell reselection procedure2m 40s
-
(Locked)
Priority management (priority and subpriority)3m 17s
-
(Locked)
Configuring reselection priorities2m 18s
-
(Locked)
Interfrequency reselection5m 6s
-
(Locked)
Inter-RAT reselection4m 16s
-
(Locked)
Intrafrequency handover (PCell)1m 23s
-
(Locked)