14% Global SSA
2.1.19 Energy efficiency in the 5G era
Energy efficiency is a major consideration for 5G era networks
3GPP specifications point to an aspirational goal for 5G networks to be much more efficient than 4G. This will be driven by more efficient constituent components.
Yet, in several ways, the overall 5G era networks will be challenged to deliver a greener operational outcome. Network densification will add more sites and
‘softwarisation’ of the core will add more control points.
This disaggregation of the network will likely result in multiple sites consuming relatively small amounts of energy, and imposing a complex challenge to optimise
overall energy consumption.
While the debate and discussions continue, in the short-term, operators are likely to see an energy increase in maintaining legacy networks in 2G, 3G and 4G networks in addition to new requirements in deploying 5G, at least until legacy networks are decommissioned.
FIGURE 2.1.9
SECURITY CONTROLS OUTLINED IN 3GPP RELEASE 15 Device
CARD
Device
This profile data is used to securely identify and authenticate the subscriber
The profile data on the eSIM is used to identify and authenticate the subscriber,
just as for the SIM card authentication
details with subscribers
profile data is securely downloaded directly to the
device
The red dot represents the data stored on the SIM,
called a ‘Profile’
The eSIM can store several profiles The profile, once
downloaded, is securely stored on an eSIM, which is
soldered into the device
SUBSCRIBER PROTECTION
STREAMLINE REGULATORY CONDITIONS TO FACILITATE 5G DEPLOYMENT
PROVIDE REGULATORY FLEXIBILITY FOR INNOVATIVE 5G PROPOSITIONS
RADIO PROTECTION CORE PROTECTION
• Subscriber Permanent Identifier (SUPI); a unique identifier for the subscriber
• Dual authentication and key agreement (AKA)
• Anchor key is used to identify and authenticate UE. This key is used to create a secured access throughout the 5G infrastructure.
• X509 certificates and PKI are used to protect various non UE devices
• Encryption keys are used to demonstrate the integrity of signalling data
• Authentication when moving from 3GPP network to non 3GPP network
• Security Anchor Function (SEAF) allows re-authentication of the UE when it moves between different access or serving networks
• The home network carries out the original authentication based on the home profile (home control)
• Encryption keys will be based on IP network protocols and IPSec
• Security Edge Protection Proxy (SEPP) protects the home network edge
• 5G separates control and data plane traffic
RELEASE SUFFICIENT SPECTRUM FOR 5G THAT IS HARMONISED AND AFFORDABLE
EASE FINANCIAL DEMANDS OF 5G BY BRINGING DOWN COSTS
5G Readiness & Enabling Conditions THE 5G GUIDE
66
Policy Readiness (including Spectrum) 2.2
KEY TAKEAWAYS
• An enabling policy environment is a prerequisite for 5G success. Accordingly, policymakers need to foster a pro-investment and pro-innovation environment for the mobile ecosystem.
• To accelerate 5G into commercial use, policymakers should focus on network deployment, network flexibility, spectrum access and regulatory costs, including reducing sector specific taxes on customers and operators.
• Specifically, regulators need to promote streamlined network deployment regulations to address the emerging challenges of network densification.
• Likewise, regulators should promote flexibility to support emerging 5G services (e.g.
through a pragmatic interpretation of the Open Internet principle) and modernising regulatory frameworks.
• Sufficient, affordable, exclusively licensed, contiguous spectrum should be made available in harmonised 5G bands. Set-asides in these bands jeopardize the success of public 5G services and could waste spectrum.
• Spectrum policy measures should be adopted which support long-term 5G investment.
These should include long-term technology neutral licences, clear renewal processes, a spectrum roadmap and due care taken to avoid artificially inflated spectrum prices.
5G Readiness & Enabling Conditions THE 5G GUIDE
67
To accelerate 5G into commercial use, governments and regulators need to consider market structures that will foster a pro-investment and pro-innovation environment for the mobile ecosystem. Many mobile operators face significant headwinds from the
prevailing policy and regulatory environment, in terms of investment; spectrum access; network management flexibility; and infrastructure deployment.
It is important to note that across a broad range of policy and regulatory issues, the industry position is no different in a 5G world to earlier generations of mobile network technology. Positions published in the GSMA Mobile Policy Handbook20, spanning infrastructure sharing, taxation and spectrum, to name but a few, are as relevant and applicable as ever.
Policymakers, as vocal proponents of mobile network evolution and technology-led economic growth, should play a driving role in the realisation of 5G, creating the conditions for efficient and timely mobile network deployment while bringing down the regulatory costs for operators. Their attention should focus on the following key areas to bring 5G to fruition: network deployment; network flexibility; spectrum access; and regulatory costs.
Figure 2.2.1 is a summary of the four key policy considerations for the 5G era.
2.2.1 5G era policy framework
Supportive policy framework is a key enabler for 5G readiness
FIGURE 2.2.1
KEY POLICY CONSIDERATIONS FOR THE 5G ERA Device
CARD
Device
This profile data is used to securely identify and authenticate the subscriber
The profile data on the eSIM is used to identify and authenticate the subscriber,
just as for the SIM card authentication
details with subscribers
profile data is securely downloaded directly to the
device
The red dot represents the data stored on the SIM,
called a ‘Profile’
The eSIM can store several profiles The profile, once
downloaded, is securely stored on an eSIM, which is
soldered into the device
SUBSCRIBER PROTECTION
STREAMLINE REGULATORY CONDITIONS TO FACILITATE 5G DEPLOYMENT
PROVIDE REGULATORY FLEXIBILITY FOR INNOVATIVE 5G PROPOSITIONS
RADIO PROTECTION CORE PROTECTION
• Subscriber Permanent Identifier (SUPI); a unique identifier for the subscriber
• Dual authentication and key agreement (AKA)
• Anchor key is used to identify and authenticate UE. This key is used to create a secured access throughout the 5G infrastructure.
• X509 certificates and PKI are used to protect various non UE devices
• Encryption keys are used to demonstrate the integrity of signalling data
• Authentication when moving from 3GPP network to non 3GPP network
• Security Anchor Function (SEAF) allows re-authentication of the UE when it moves between different access or serving networks
• The home network carries out the original authentication based on the home profile (home control)
• Encryption keys will be based on IP network protocols and IPSec
• Security Edge Protection Proxy (SEPP) protects the home network edge
• 5G separates control and data plane traffic
RELEASE SUFFICIENT SPECTRUM FOR 5G
THAT IS HARMONISED AND AFFORDABLE EASE FINANCIAL DEMANDS OF 5G BY BRINGING DOWN COSTS
25. https://www.gsma.com/publicpolicy/handbook
5G Readiness & Enabling Conditions
68
Operators are still rolling out 4G infrastructure in most markets, with 5G as the evolutionary step with newer equipment added to earlier-generation sites.
Operators will rely, in some geographical areas, on the deployment of small cells, including more densely distributed antennas and the provision of backhaul, to connect a far greater number of mobile base stations.
As a frame of reference, in a hypothetical scenario where 5G small cells are installed on all street lamp posts, the GSMA calculates that London in the UK could see up to 500,000 small cells installed across the city.
The densification of networks to cope with urban capacity demands requires significant new investments in additional sites and supporting infrastructure, potentially four- to six-times higher than for 4G based on some market estimates. Furthermore, complex planning procedures involving multiple layers of approval in some countries create additional burden, significantly delaying 5G deployment. Policymakers must strive to ensure that the deployment regulations at the local level are aligned with the national
digital ambitions and market realities. For example, governments should adopt a national code for new mobile sites and modification of existing sites, implemented by local authorities (e.g. FCC orders).
Policymakers are urged to:
• Simplify planning procedures and regulations for site acquisition, colocation and upgrades of base stations;
• Provide operators access and right-of-ways to public/government facilities for antenna siting on reasonable terms and conditions;
• Establish uniform electromagnetic field (EMF) rules that are no more restrictive than internationally agreed levels.
• Encourage and incentivize fibre investments, and enact appropriate policies to ease and expedite fibre rollouts.
• Strive to ensure that the deployment regulations at the local level are aligned with the national digital ambitions and market realities. This includes setting reasonable fees and other conditions for network deployment at local level.
• Offer a reasonable expectation of approval for voluntary network sharing deals while avoiding mandated sharing agreements that may amount to an access obligation.