# IVC 5G O-RAN Summary
###### tags: `UNILA`
## Summary 29th of July 2021
Name : Dimas Danu Saputra
Student ID : 1915031076
Date : 29th of July 2021
# Summary “RAN Intelligent Controller (RIC), Network Management and Security”
Fundamental QoS
Two Perspectives of QoS
1. Networks => QoS
The service quality or service level that the network offers applications or user in terms of QoS parameters. They are :
a. Latency or delay
b. Loss or error rate
c. Throughput
d. Delay Jitter
e. Fairness
2. Applications/Users : Quality of Experience (QoE)

RAN Intelligent Controller (RIC)
- Near-Realtime RIC
• Radio Resource Management (RRM)
• Quality of Service (QoS) Management
• Connectivity Management
• Seamless Handover Control
QoS Mechanism
1. Traffic handling (In-traffic)
2. Bandwidth management (Out-of-traffic)
3. Mechanisms
Admission Control
Admission control
– a mechanism that decides whether to allow a new session/flow to join the network.
– ensure that existing sessions' QoS will not be degraded by accepting new session
Admission control and resource reservation signaling mechanisms are implemented in the
same device.
Packet scheduling
– selects a packet from transmission queues for transmission
– decides which packet from which queue and station are scheduled
– controls bandwidth allocation to stations, classes, and applications
– deals with how to retrieve packets from queues
Scheduling
First In First Out (FIFO)
– Strict Priority
– Weight Fair Queue (WFQ)
Two Kinds RAN Intelligent Controller (RIC)
– Non-Real Time RIC
– Near Real Time RIC
• Goal :
– To configure or control RAN
- Near-RT RIC Functions Description
Near-RT RIC hosts the following functions:
– Database to read/write of RAN/UE information;
– xApp subscription management to merge subscriptions from xApps
– Conflict mitigation to resolve conflicting requests from xApps;
– Messaging infrastructure for internal functions interaction
– Security scheme for the xApps
– Management services
– Interface Termination: E2/A1/O1
– Functions hosted by xApps,

- Network Management and Security

- Security considerations of 5G
o Crimeware (Attack Toolkits) Deployed By Internal Actors
o Eavesdropping
o Security breach from one part of the network to another
o DDoS
o Data Interception And Rerouting
o Man In The Middle Attack
o A False Base Station
o Roaming Fraud
o Microprocessor level vulnerabilities
o AI-driven attacks
o IMSI Tracking
o 2G/3G Downgrade