Share this
What is Radio Access Network (RAN)?
by Yazz Krdzalic on May 12, 2022 3:41:14 PM
With the increased prevalence of mobile networks, user equipment (UE) must be seamlessly connected to a core network to facilitate rapid communication of data.
In this blog, you'll learn what RAN (radio access network) is, how it works, the different variations, and why it is an integral component of 5G technology.
What is RAN?
A RAN (radio access network) is a type of network infrastructure used commonly for mobile networks that consist of radio base stations with large antennas.
The primary purpose of a RAN is to wirelessly connect user equipment.
How does RAN work?
In a RAN, the radio unit (RU) processes digital radio signals and transmits, receives, and converts the signals for the RAN base station.
When the RU receives signal information from the antennas, it communicates with the baseband unit (BBU) using the Common Public Radio Interface (CPRI).
The BBU takes the signal information and processes it, so it can be forwarded to the core network. Data returns to the user via the reverse process.
The amount of area that a RAN node can cover varies depending on the capabilities of the antennas, RAN hardware, and software at the node.
In mobile networks, 60 to 65 percent of the total cost of ownership of a network is in the RAN.
What are the variations of RAN?
D-RAN (Distributed RAN)
This is the traditional RAN setup where a remote radio unit (RRU) and baseband unit (BBU) are co-located at every cell site.
The RRU filters and amplifies the RF (radio frequency) signal, deciding the coverage of the system; it also converts the RF signal to digital data for processing.
The CPRI (Common Public Radio Interface) is the protocol for frontal communications between the towers and base stations.
Each cell site has a BBU, which manages the entire base station, operating/maintenance, and signaling processing. It decides the capacity of the system.
Backhaul is the interface that is formed between the BBU pool and the core node (network).
C-RAN (Centralized RAN)
With C-RAN, the BBU moves to a centralized location and the cell site has only the antenna and the RRU.
The BBU pool is a pool of BBUs in a centralized location.
Fronthaul is an interface that is formed between the RRU and BBU pool, and backhaul serves as an interface between the BBU pool and the core node.
The primary benefit of C-RAN is that it reduces deployment and maintenance cost per cell site because BBUs are centralized.
Additionally, it improves spectral efficiency and reduces interference as BBU pools can share resources dynamically among the multiple RRUs.
You also have another option to split BBUs into centralized units (CUs) and decentralized units (DUs) to split tasks, reduce costs, and improve efficiency even further. Midhaul is the interface between DU and CU.
DU is software deployed on a COTS (commercial/customizable-off-the shelf) server that is controlled by the CU that controls the RLC (radio link control)/MAC (medium access control) block and parts of the PHY (physical) layer.
The RLC/MAC block is the basic transport unit on the air interface that is used between the mobile and the network.
In essence, the DU helps to split tasks rather than having it all in a BBU pool. This just allocates resources to specific tasks.
The CU is software that runs the RRC (radio resource control)/PDCP (packet data convergence protocol).
The RRC conducts many functions like information broadcasting, establishing and releasing connections between the user equipment and the RAN, and controlling the quality of service.
The PDCP compresses and decompresses IP data stream headers and transfers user data, among other technical functions.
The CU can remain at the base station or it can be placed at a more central aggregation site. A DU, however, is kept at a base station that is not at an aggregation or core network location.
vRAN (Virtualized RAN)
vRAN is a type of C-RAN with its networking functions separated from the hardware that it runs on. In this case, the BBU is what is separated through virtualization.
The control planes--which control how data is forwarded--and the data planes--which actually forward data--are also separated.
This type of RAN is often found in 5G technology architectures because the networks need virtualization to support the uses cases and performance requirements of 5G.
How does vRAN work?
Network functions virtualization (NFV) is the practice of turning hardware-based functions into software. In an NFV architecture, the hardware is typically COTS (commercial-off-the-shelf) hardware.
Virtualizing the RAN makes it more agile, flexible, cost-effective, and scalable than a hardware-based RAN.
A vRAN can adapt to changes in the network faster, including intelligent load balancing and allocating resources on demand; it also allows change without having to replace expensive hardware throughout the entire infrastructure, only needing to update software.
Upgrading the RAN software can improve the network's connectivity, efficiency, or security, among other functions.
With a vRAN infrastructure, network operators can keep up with security better than network operators still using a non-virtualized RAN because bugs and other security issues can be fixed by updating software instead of having to replace hardware on a large scale.
A secure network attracts more customers because the more trust the customer base has in a product like a network, the more likely they are to use it.
This type of RAN, however, puts a strain on servers, as it requires massive amounts of compute power. This is where edge computing comes into play.
OpenRAN
Operators today want a more diverse ecosystem of vendors and are redefining their RAN requirements.
OpenRAN is a term used for industry-wide standards for RAN interfaces that support interoperating between vendors' equipment and offer network flexibility. (Think of O-RAN in the same sense as the open architectures SOSA/MOSA are introducing into their respective fields.)
The main purpose of OpenRAN is to have an interoperability standard for RAN elements including non-proprietary white box hardware and software from different vendors.
OpenRAN is divided into three main building blocks: an O-RU, an O-DU, and an O-CU.
OpenRAN standards are being developed using vRAN principles and technologies to help improve network malleability, enhance security, and reduce costs.
Network operators that opt for OpenRAN can avoid being stuck with one vendor's proprietary hardware and software. This leaves more room for innovation and competition, lower equipment costs, and improved network performance, as more vendors can provide the building blocks and add new services.
The OpenRAN Alliance allows customers to mix and match components from different vendors without being locked into one; it releases open software for the RAN, supporting its members in the integration and testing of their implementations.
Read more about OpenRAN here.
RAN and 5G Technology
The amount of data available daily has grown rapidly, and as devices become more interconnected with each other and the larger network, data is being generated and transmitted at immense volumes.
5G connectivity integrated with edge computers requires RAN virtualization (vRANs) because 5G demands more visibility, automation, and adaptability that traditional hardware-based RANs cannot provide.
The ability to scale and intelligently adjust the network to changing conditions is significant when the demands on 5G networks increase from both mobile phone users and, more significantly, IoT (Internet of Things) devices.
Network administrators must be able to update a vRAN remotely because it enables improvement as technology advances. This a key component of 5G RANs because the component technologies involved are expected to change over the coming years.
Final thoughts
RAN is a critical component in enabling the rapid transfer of data to core networks and user devices.
Through distributed, centralized, virtualized, and open infrastructures, RAN can be amended and modified to fit the requirements of different operators and technologies.
At Trenton, our high-performance computers are able to apply network virtualization to run multiple RAN infrastructures in a hyper-converged environment running on the same piece of hardware.
This helps to improve connectivity at large, reduce hardware costs and downtime, and enable remote management of devices in the field.
The different variations of RAN will help increase flexibility, maximize efficiency, and reduce costs, delivering unmatched performance for a variety use cases and applications across a wide range of industries.
Interested in learning more about 5G? Check out some other key 5G technologies that enhance compute architectures here.
Source:Share this
- High-performance computers (42)
- Military computers (38)
- Rugged computers (32)
- Cybersecurity (25)
- Industrial computers (25)
- Military servers (24)
- MIL-SPEC (20)
- Rugged servers (19)
- Press Release (17)
- Industrial servers (16)
- MIL-STD-810 (16)
- 5G Technology (14)
- Intel (13)
- Rack mount servers (12)
- processing (12)
- Computer hardware (11)
- Edge computing (11)
- Rugged workstations (11)
- Made in USA (10)
- Partnerships (9)
- Rugged computing (9)
- Sales, Marketing, and Business Development (9)
- Trenton Systems (9)
- networking (9)
- Peripheral Component Interconnect Express (PCIe) (7)
- Encryption (6)
- Federal Information Processing Standards (FIPS) (6)
- GPUs (6)
- IPU (6)
- Joint All-Domain Command and Control (JADC2) (6)
- Server motherboards (6)
- artificial intelligence (6)
- Computer stress tests (5)
- Cross domain solutions (5)
- Mission-critical servers (5)
- Rugged mini PCs (5)
- AI (4)
- BIOS (4)
- CPU (4)
- Defense (4)
- Military primes (4)
- Mission-critical systems (4)
- Platform Firmware Resilience (PFR) (4)
- Rugged blade servers (4)
- containerization (4)
- data protection (4)
- virtualization (4)
- Counterfeit electronic parts (3)
- DO-160 (3)
- Edge servers (3)
- Firmware (3)
- HPC (3)
- Just a Bunch of Disks (JBOD) (3)
- Leadership (3)
- Navy (3)
- O-RAN (3)
- RAID (3)
- RAM (3)
- Revision control (3)
- Ruggedization (3)
- SATCOM (3)
- Storage servers (3)
- Supply chain (3)
- Tactical Advanced Computer (TAC) (3)
- Wide-temp computers (3)
- computers made in the USA (3)
- data transfer (3)
- deep learning (3)
- embedded computers (3)
- embedded systems (3)
- firmware security (3)
- machine learning (3)
- Automatic test equipment (ATE) (2)
- C6ISR (2)
- COTS (2)
- COVID-19 (2)
- Compliance (2)
- Compute Express Link (CXL) (2)
- Computer networking (2)
- Controlled Unclassified Information (CUI) (2)
- DDR (2)
- DDR4 (2)
- DPU (2)
- Dual CPU motherboards (2)
- EW (2)
- I/O (2)
- Military standards (2)
- NVIDIA (2)
- NVMe SSDs (2)
- PCIe (2)
- PCIe 4.0 (2)
- PCIe 5.0 (2)
- RAN (2)
- SIGINT (2)
- SWaP-C (2)
- Software Guard Extensions (SGX) (2)
- Submarines (2)
- Supply chain security (2)
- TAA compliance (2)
- airborne (2)
- as9100d (2)
- chassis (2)
- data diode (2)
- end-to-end solution (2)
- hardware security (2)
- hardware virtualization (2)
- integrated combat system (2)
- manufacturing reps (2)
- memory (2)
- mission computers (2)
- private 5G (2)
- protection (2)
- secure by design (2)
- small form factor (2)
- software security (2)
- vRAN (2)
- zero trust (2)
- zero trust architecture (2)
- 3U BAM Server (1)
- 4G (1)
- 4U (1)
- 5G Frequencies (1)
- 5G Frequency Bands (1)
- AI/ML/DL (1)
- Access CDS (1)
- Aegis Combat System (1)
- Armed Forces (1)
- Asymmetric encryption (1)
- C-RAN (1)
- COMINT (1)
- CPUs (1)
- Cloud-based CDS (1)
- Coast Guard (1)
- Compliance testing (1)
- Computer life cycle (1)
- Containers (1)
- D-RAN (1)
- DART (1)
- DDR5 (1)
- DMEA (1)
- Data Center Modular Hardware System (DC-MHS) (1)
- Data Plane Development Kit (DPDK) (1)
- Defense Advanced Research Projects (DARP) (1)
- ELINT (1)
- EMI (1)
- EO/IR (1)
- Electromagnetic Interference (1)
- Electronic Warfare (EW) (1)
- FIPS 140-2 (1)
- FIPS 140-3 (1)
- Field Programmable Gate Array (FPGA) (1)
- Ground Control Stations (GCS) (1)
- Hardware-based CDS (1)
- Hybrid CDS (1)
- IES.5G (1)
- ION Mini PC (1)
- IP Ratings (1)
- IPMI (1)
- Industrial Internet of Things (IIoT) (1)
- Industry news (1)
- Integrated Base Defense (IBD) (1)
- LAN ports (1)
- LTE (1)
- Life cycle management (1)
- Lockheed Martin (1)
- MIL-S-901 (1)
- MIL-STD-167-1 (1)
- MIL-STD-461 (1)
- MIL-STD-464 (1)
- MOSA (1)
- Multi-Access Edge Computing (1)
- NASA (1)
- NIC (1)
- NIC Card (1)
- NVMe (1)
- O-RAN compliant (1)
- Oil and Gas (1)
- Open Compute Project (OCP) (1)
- OpenRAN (1)
- P4 (1)
- PCIe card (1)
- PCIe lane (1)
- PCIe slot (1)
- Precision timestamping (1)
- Product life cycle (1)
- ROM (1)
- Raytheon (1)
- Remotely piloted aircraft (RPA) (1)
- Rugged computing glossary (1)
- SEDs (1)
- SIM Card (1)
- Secure boot (1)
- Sensor Open Systems Architecture (SOSA) (1)
- Small form-factor pluggable (SFP) (1)
- Smart Edge (1)
- Smart NIC (1)
- SmartNIC (1)
- Software-based CDS (1)
- Symmetric encryption (1)
- System hardening (1)
- System hardening best practices (1)
- TME (1)
- Tech Partners (1)
- Total Memory Encryption (TME) (1)
- Transfer CDS (1)
- USB ports (1)
- VMEbus International Trade Association (VITA) (1)
- Vertical Lift Consortium (VLC) (1)
- Virtual machines (1)
- What are embedded systems? (1)
- Wired access backhaul (1)
- Wireless access backhaul (1)
- accredidation (1)
- aerospace (1)
- air gaps (1)
- airborne computers (1)
- asteroid (1)
- authentication (1)
- autonomous (1)
- certification (1)
- cognitive software-defined radios (CDRS) (1)
- command and control (C2) (1)
- communications (1)
- cores (1)
- custom (1)
- customer service (1)
- customer support (1)
- data linking (1)
- data recording (1)
- ethernet (1)
- full disk encryption (1)
- hardware monitoring (1)
- heat sink (1)
- hypervisor (1)
- in-house technical support (1)
- input (1)
- integrated edge solution (1)
- international business (1)
- licensed spectrum (1)
- liquid cooling (1)
- mCOTS (1)
- microelectronics (1)
- missile defense (1)
- mixed criticality (1)
- moving (1)
- multi-factor authentication (1)
- network slicing (1)
- neural networks (1)
- new headquarters (1)
- next generation interceptor (1)
- non-volatile memory (1)
- operating system (1)
- output (1)
- outsourced technical support (1)
- post-boot (1)
- pre-boot (1)
- private networks (1)
- public networks (1)
- radio access network (RAN) (1)
- reconnaissance (1)
- secure flash (1)
- security (1)
- self-encrypting drives (SEDs) (1)
- sff (1)
- software (1)
- software-defined radios (SDRs) (1)
- speeds and feeds (1)
- standalone (1)
- storage (1)
- systems (1)
- tactical wide area networks (1)
- technical support (1)
- technology (1)
- third-party motherboards (1)
- troposcatter communication (1)
- unlicensed spectrum (1)
- volatile memory (1)
- vpx (1)
- zero trust network (1)
- November 2024 (1)
- October 2024 (1)
- August 2024 (1)
- July 2024 (1)
- May 2024 (1)
- April 2024 (3)
- February 2024 (1)
- November 2023 (1)
- October 2023 (1)
- July 2023 (1)
- June 2023 (3)
- May 2023 (7)
- April 2023 (5)
- March 2023 (7)
- December 2022 (2)
- November 2022 (6)
- October 2022 (7)
- September 2022 (8)
- August 2022 (3)
- July 2022 (4)
- June 2022 (13)
- May 2022 (10)
- April 2022 (4)
- March 2022 (11)
- February 2022 (4)
- January 2022 (4)
- December 2021 (1)
- November 2021 (4)
- September 2021 (2)
- August 2021 (1)
- July 2021 (2)
- June 2021 (3)
- May 2021 (4)
- April 2021 (3)
- March 2021 (3)
- February 2021 (8)
- January 2021 (4)
- December 2020 (5)
- November 2020 (5)
- October 2020 (4)
- September 2020 (4)
- August 2020 (6)
- July 2020 (9)
- June 2020 (11)
- May 2020 (13)
- April 2020 (8)
- February 2020 (1)
- January 2020 (1)
- October 2019 (1)
- August 2019 (2)
- July 2019 (2)
- March 2019 (1)
- January 2019 (2)
- December 2018 (1)
- November 2018 (2)
- October 2018 (5)
- September 2018 (3)
- July 2018 (1)
- April 2018 (2)
- March 2018 (1)
- February 2018 (9)
- January 2018 (27)
- December 2017 (1)
- November 2017 (2)
- October 2017 (3)
Comments (2)