<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.itcollege.ee/index.php?action=history&amp;feed=atom&amp;title=5G_technology_and_it%27s_development_in_Estonia</id>
	<title>5G technology and it&#039;s development in Estonia - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.itcollege.ee/index.php?action=history&amp;feed=atom&amp;title=5G_technology_and_it%27s_development_in_Estonia"/>
	<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;action=history"/>
	<updated>2026-05-05T11:18:35Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142006&amp;oldid=prev</id>
		<title>Ilynik: /* Technology */</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142006&amp;oldid=prev"/>
		<updated>2022-04-29T15:11:57Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Technology&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 18:11, 29 April 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l40&quot;&gt;Line 40:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 40:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Technology==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Technology==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Some time ago fast data exchange speed was only possible to reach with cable connections, but with cellular network expansion in Estonia people&amp;#039;s growing data needs can be fulfilled with 5G technologies. One of the main technological improvements achieved in 5G is new radio frequencies, Beamforming, multiple-input and multiple-output (MIMO) technologies. 5G technology offers a very low latency rate, the delay between the sending and receiving information. While 4G was capable of having a speed of 200 milliseconds, with 5G technology 1 millisecond can be achieved. &amp;lt;ref&amp;gt;5G technology and networks (speed, use cases, rollout). Available at: https://www.thalesgroup.com/en/markets/digital-identity-and-security/mobile/inspired/5G - Accessed 25-04-2022. &amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Some time ago fast data exchange speed was only possible to reach with cable connections, but with cellular network expansion in Estonia people&amp;#039;s growing data needs can be fulfilled with 5G technologies. One of the main technological improvements achieved in 5G is new radio frequencies, Beamforming, multiple-input and multiple-output (MIMO) technologies. 5G technology offers a very low latency rate, the delay between the sending and receiving information. While 4G was capable of having a speed of 200 milliseconds, with 5G technology 1 millisecond can be achieved. &amp;lt;ref&amp;gt;5G technology and networks (speed, use cases, rollout). Available at: https://www.thalesgroup.com/en/markets/digital-identity-and-security/mobile/inspired/5G - Accessed 25-04-2022. &amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;5G NR&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;5G NR&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Ilynik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142005&amp;oldid=prev</id>
		<title>Ilynik: /* Technology */</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142005&amp;oldid=prev"/>
		<updated>2022-04-29T15:11:49Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Technology&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 18:11, 29 April 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l41&quot;&gt;Line 41:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 41:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Some time ago fast data exchange speed was only possible to reach with cable connections, but with cellular network expansion in Estonia people&amp;#039;s growing data needs can be fulfilled with 5G technologies. One of the main technological improvements achieved in 5G is new radio frequencies, Beamforming, multiple-input and multiple-output (MIMO) technologies. 5G technology offers a very low latency rate, the delay between the sending and receiving information. While 4G was capable of having a speed of 200 milliseconds, with 5G technology 1 millisecond can be achieved. &amp;lt;ref&amp;gt;5G technology and networks (speed, use cases, rollout). Available at: https://www.thalesgroup.com/en/markets/digital-identity-and-security/mobile/inspired/5G - Accessed 25-04-2022. &amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Some time ago fast data exchange speed was only possible to reach with cable connections, but with cellular network expansion in Estonia people&amp;#039;s growing data needs can be fulfilled with 5G technologies. One of the main technological improvements achieved in 5G is new radio frequencies, Beamforming, multiple-input and multiple-output (MIMO) technologies. 5G technology offers a very low latency rate, the delay between the sending and receiving information. While 4G was capable of having a speed of 200 milliseconds, with 5G technology 1 millisecond can be achieved. &amp;lt;ref&amp;gt;5G technology and networks (speed, use cases, rollout). Available at: https://www.thalesgroup.com/en/markets/digital-identity-and-security/mobile/inspired/5G - Accessed 25-04-2022. &amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===&lt;/del&gt;5G NR&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;=== &lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&#039;&lt;/ins&gt;5G NR&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&#039;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;New Radio (NR) is a new technology invented to replace the 4G wireless communications standard with 5G. It features wireless communication by enhancing electromagnetic radiation spectrum efficiency for mobile broadband and its diversity of spectrum ranging from several hundred kilohertz to millimetre waves is designed for different types of transmissions &amp;lt;ref&amp;gt;5G New Radio (NR). Available at: https://www.techtarget.com/whatis/definition/5G-New-Radio-NR - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. The general purpose of 5G is to use standards and protocols for mobile telecommunications to describe how 5G NR edge devices and 5G NR network infrastructure wirelessly transmit data and communicate&amp;lt;ref&amp;gt;What is 5G NR (New Radio)?. Available at: https://www.sierrawireless.com/iot-blog/what-is-5g-nr/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. Edge devices manage the entry point to networks and include routers, gateways, multiplexers or routing switches. Network infrastructure refers to mostly Radio Access Network devices. New Radio may use the same band of the spectrum as LTE because of Dynamic Spectrum Sharing (DSS) technology. That makes NR capable of being rolled out without shutting down LTE or other networks that may support existing LTE smartphones or IoT devices&amp;lt;ref&amp;gt;How Private LTE can help with construction optimisation. Available at: https://www.iotcentral.io/blog/Connectivity - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;New Radio (NR) is a new technology invented to replace the 4G wireless communications standard with 5G. It features wireless communication by enhancing electromagnetic radiation spectrum efficiency for mobile broadband and its diversity of spectrum ranging from several hundred kilohertz to millimetre waves is designed for different types of transmissions &amp;lt;ref&amp;gt;5G New Radio (NR). Available at: https://www.techtarget.com/whatis/definition/5G-New-Radio-NR - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. The general purpose of 5G is to use standards and protocols for mobile telecommunications to describe how 5G NR edge devices and 5G NR network infrastructure wirelessly transmit data and communicate&amp;lt;ref&amp;gt;What is 5G NR (New Radio)?. Available at: https://www.sierrawireless.com/iot-blog/what-is-5g-nr/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. Edge devices manage the entry point to networks and include routers, gateways, multiplexers or routing switches. Network infrastructure refers to mostly Radio Access Network devices. New Radio may use the same band of the spectrum as LTE because of Dynamic Spectrum Sharing (DSS) technology. That makes NR capable of being rolled out without shutting down LTE or other networks that may support existing LTE smartphones or IoT devices&amp;lt;ref&amp;gt;How Private LTE can help with construction optimisation. Available at: https://www.iotcentral.io/blog/Connectivity - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l49&quot;&gt;Line 49:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 49:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In Estonia, Ericsson Spectrum Sharing solutions with Telia are using both LTE and New Radio units to expand 5G technology influence. At present Telia has intentions to expand its low-band 5G commercial services with additional improved nationwide 5G coverage, including mid- and high-bands&amp;lt;ref&amp;gt;Telia and Ericsson switch on Estonia’s first commercial 5G network. Available at: https://www.ericsson.com/en/news/2020/11/estonia-switches-on-5g - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. Since 2016 the partnership of Estonia and Sweden to develop 5G technologies has made 5G available on Estonian territory. On December 20, 2018, the first 5G network was opened at Tallinn University of Technology (TalTech) and is used now for innovation and research purposes. University has the goals to improve 5G network solutions in the country and create an environment where companies and start-ups can develop and test new products and services together with the university&amp;lt;ref&amp;gt;Estonia’s first 5G network opens. Available at: https://estonianworld.com/technology/estonias-first-5g-network-opens/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt; With the usage of this technology, TalTech University has launched a self-driving car, which may interact with the surrounding environment at high-speed communication thanks to 5G&amp;lt;ref&amp;gt;ISEAUTO. Available at: https://iseauto.taltech.ee/en/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. The autonomous car must react fast in case of vehicle-to-vehicle and vehicle-to-infrastructure communications. 5G NR provides a suitable environment for that with extremely low latency.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In Estonia, Ericsson Spectrum Sharing solutions with Telia are using both LTE and New Radio units to expand 5G technology influence. At present Telia has intentions to expand its low-band 5G commercial services with additional improved nationwide 5G coverage, including mid- and high-bands&amp;lt;ref&amp;gt;Telia and Ericsson switch on Estonia’s first commercial 5G network. Available at: https://www.ericsson.com/en/news/2020/11/estonia-switches-on-5g - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. Since 2016 the partnership of Estonia and Sweden to develop 5G technologies has made 5G available on Estonian territory. On December 20, 2018, the first 5G network was opened at Tallinn University of Technology (TalTech) and is used now for innovation and research purposes. University has the goals to improve 5G network solutions in the country and create an environment where companies and start-ups can develop and test new products and services together with the university&amp;lt;ref&amp;gt;Estonia’s first 5G network opens. Available at: https://estonianworld.com/technology/estonias-first-5g-network-opens/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt; With the usage of this technology, TalTech University has launched a self-driving car, which may interact with the surrounding environment at high-speed communication thanks to 5G&amp;lt;ref&amp;gt;ISEAUTO. Available at: https://iseauto.taltech.ee/en/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. The autonomous car must react fast in case of vehicle-to-vehicle and vehicle-to-infrastructure communications. 5G NR provides a suitable environment for that with extremely low latency.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===&lt;/del&gt;Beamforming&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&#039;&lt;/ins&gt;Beamforming&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&#039;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Beamforming is a method used in 5G antennas signal processing to filter the reception and transmission of radio signals in different directions. Beamforming antennas are made to send a stronger signal in a specified direction while others have low-quality signals or their absence&amp;lt;ref&amp;gt;What is Beamforming?. Available at: https://www.everythingrf.com/community/what-is-beamforming - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. As a result, the connection between devices can be done faster and data transmission speed is higher.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Beamforming is a method used in 5G antennas signal processing to filter the reception and transmission of radio signals in different directions. Beamforming antennas are made to send a stronger signal in a specified direction while others have low-quality signals or their absence&amp;lt;ref&amp;gt;What is Beamforming?. Available at: https://www.everythingrf.com/community/what-is-beamforming - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. As a result, the connection between devices can be done faster and data transmission speed is higher.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Ilynik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142004&amp;oldid=prev</id>
		<title>Ilynik: /* Architecture */</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142004&amp;oldid=prev"/>
		<updated>2022-04-29T15:11:12Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Architecture&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 18:11, 29 April 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l34&quot;&gt;Line 34:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 34:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;MEC&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;MEC&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;5G architecture has an important element named Multi-Access Edge Computing (MEC) which task is to shift traffic and services from a centralized cloud to the edge of the network and closer to the customer. It does not send all data to a cloud for processing, but the network edge analyzes, processes, and stores the data instead of that. This is beneficial because data collection that happens closer to the customer diminishes latency and provides real-time performance to high-bandwidth applications. Although this technology may be avoided or substituted, it provides necessary effectiveness for the work of 5G because MEC has special characteristics like low latency, high bandwidth and real-time access to RAN information &amp;lt;ref&amp;gt;What is multi-access edge computing?. Available at: https://www.juniper.net/us/en/research-topics/what-is-multi-access-edge-computing.html&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;5G architecture has an important element named Multi-Access Edge Computing (MEC) which task is to shift traffic and services from a centralized cloud to the edge of the network and closer to the customer. It does not send all data to a cloud for processing, but the network edge analyzes, processes, and stores the data instead of that. This is beneficial because data collection that happens closer to the customer diminishes latency and provides real-time performance to high-bandwidth applications. Although this technology may be avoided or substituted, it provides necessary effectiveness for the work of 5G because MEC has special characteristics like low latency, high bandwidth and real-time access to RAN information &amp;lt;ref&amp;gt;What is multi-access edge computing?. Available at: https://www.juniper.net/us/en/research-topics/what-is-multi-access-edge-computing.html&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key ico_mediawiki-ITK_:diff:1.41:old-142003:rev-142004:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Ilynik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142003&amp;oldid=prev</id>
		<title>Ilynik: /* Architecture */</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142003&amp;oldid=prev"/>
		<updated>2022-04-29T15:11:05Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Architecture&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 18:11, 29 April 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l33&quot;&gt;Line 33:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 33:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;h5&amp;gt;&lt;/del&gt;MEC&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/h5&amp;gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&#039;&lt;/ins&gt;MEC&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&#039;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;5G architecture has an important element named Multi-Access Edge Computing (MEC) which task is to shift traffic and services from a centralized cloud to the edge of the network and closer to the customer. It does not send all data to a cloud for processing, but the network edge analyzes, processes, and stores the data instead of that. This is beneficial because data collection that happens closer to the customer diminishes latency and provides real-time performance to high-bandwidth applications. Although this technology may be avoided or substituted, it provides necessary effectiveness for the work of 5G because MEC has special characteristics like low latency, high bandwidth and real-time access to RAN information &amp;lt;ref&amp;gt;What is multi-access edge computing?. Available at: https://www.juniper.net/us/en/research-topics/what-is-multi-access-edge-computing.html&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;5G architecture has an important element named Multi-Access Edge Computing (MEC) which task is to shift traffic and services from a centralized cloud to the edge of the network and closer to the customer. It does not send all data to a cloud for processing, but the network edge analyzes, processes, and stores the data instead of that. This is beneficial because data collection that happens closer to the customer diminishes latency and provides real-time performance to high-bandwidth applications. Although this technology may be avoided or substituted, it provides necessary effectiveness for the work of 5G because MEC has special characteristics like low latency, high bandwidth and real-time access to RAN information &amp;lt;ref&amp;gt;What is multi-access edge computing?. Available at: https://www.juniper.net/us/en/research-topics/what-is-multi-access-edge-computing.html&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Ilynik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142002&amp;oldid=prev</id>
		<title>Ilynik: /* Architecture */</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142002&amp;oldid=prev"/>
		<updated>2022-04-29T15:07:27Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Architecture&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 18:07, 29 April 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l32&quot;&gt;Line 32:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 32:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&#039;&lt;/del&gt;MEC&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&#039;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;h5&amp;gt;&lt;/ins&gt;MEC&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/h5&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;5G architecture has an important element named Multi-Access Edge Computing (MEC) which task is to shift traffic and services from a centralized cloud to the edge of the network and closer to the customer. It does not send all data to a cloud for processing, but the network edge analyzes, processes, and stores the data instead of that. This is beneficial because data collection that happens closer to the customer diminishes latency and provides real-time performance to high-bandwidth applications. Although this technology may be avoided or substituted, it provides necessary effectiveness for the work of 5G because MEC has special characteristics like low latency, high bandwidth and real-time access to RAN information &amp;lt;ref&amp;gt;What is multi-access edge computing?. Available at: https://www.juniper.net/us/en/research-topics/what-is-multi-access-edge-computing.html&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;5G architecture has an important element named Multi-Access Edge Computing (MEC) which task is to shift traffic and services from a centralized cloud to the edge of the network and closer to the customer. It does not send all data to a cloud for processing, but the network edge analyzes, processes, and stores the data instead of that. This is beneficial because data collection that happens closer to the customer diminishes latency and provides real-time performance to high-bandwidth applications. Although this technology may be avoided or substituted, it provides necessary effectiveness for the work of 5G because MEC has special characteristics like low latency, high bandwidth and real-time access to RAN information &amp;lt;ref&amp;gt;What is multi-access edge computing?. Available at: https://www.juniper.net/us/en/research-topics/what-is-multi-access-edge-computing.html&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Ilynik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142001&amp;oldid=prev</id>
		<title>Ilynik: /* Architecture */</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142001&amp;oldid=prev"/>
		<updated>2022-04-29T15:06:37Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Architecture&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 18:06, 29 April 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l32&quot;&gt;Line 32:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 32:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===&lt;/del&gt;MEC&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&#039;&lt;/ins&gt;MEC&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&#039;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;5G architecture has an important element named Multi-Access Edge Computing (MEC) which task is to shift traffic and services from a centralized cloud to the edge of the network and closer to the customer. It does not send all data to a cloud for processing, but the network edge analyzes, processes, and stores the data instead of that. This is beneficial because data collection that happens closer to the customer diminishes latency and provides real-time performance to high-bandwidth applications. Although this technology may be avoided or substituted, it provides necessary effectiveness for the work of 5G because MEC has special characteristics like low latency, high bandwidth and real-time access to RAN information &amp;lt;ref&amp;gt;What is multi-access edge computing?. Available at: https://www.juniper.net/us/en/research-topics/what-is-multi-access-edge-computing.html&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;5G architecture has an important element named Multi-Access Edge Computing (MEC) which task is to shift traffic and services from a centralized cloud to the edge of the network and closer to the customer. It does not send all data to a cloud for processing, but the network edge analyzes, processes, and stores the data instead of that. This is beneficial because data collection that happens closer to the customer diminishes latency and provides real-time performance to high-bandwidth applications. Although this technology may be avoided or substituted, it provides necessary effectiveness for the work of 5G because MEC has special characteristics like low latency, high bandwidth and real-time access to RAN information &amp;lt;ref&amp;gt;What is multi-access edge computing?. Available at: https://www.juniper.net/us/en/research-topics/what-is-multi-access-edge-computing.html&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key ico_mediawiki-ITK_:diff:1.41:old-142000:rev-142001:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Ilynik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142000&amp;oldid=prev</id>
		<title>Ilynik: /* Technology */</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=142000&amp;oldid=prev"/>
		<updated>2022-04-29T15:02:17Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Technology&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 18:02, 29 April 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l43&quot;&gt;Line 43:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 43:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;New Radio (NR) is a new technology invented to replace the 4G wireless communications standard with 5G. It features wireless communication by enhancing electromagnetic radiation spectrum efficiency for mobile broadband and its diversity of spectrum ranging from several hundred kilohertz to millimetre waves is designed for different types of transmissions &amp;lt;ref&amp;gt;5G New Radio (NR). Available at: https://www.techtarget.com/whatis/definition/5G-New-Radio-NR - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. The general purpose of 5G is to use standards and protocols for mobile telecommunications to describe how 5G NR edge devices and 5G NR network infrastructure wirelessly transmit data and communicate&amp;lt;ref&amp;gt;What is 5G NR (New Radio)?. Available at: https://www.sierrawireless.com/iot-blog/what-is-5g-nr/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. Edge devices manage the entry point to networks and include routers, gateways, multiplexers or routing switches. Network infrastructure refers to mostly Radio Access Network devices. New Radio may use the same band of the spectrum as LTE because of Dynamic Spectrum Sharing (DSS) technology. That makes NR capable of being rolled out without shutting down LTE or other networks that may support existing LTE smartphones or IoT devices&amp;lt;ref&amp;gt;How Private LTE can help with construction optimisation. Available at: https://www.iotcentral.io/blog/Connectivity - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;New Radio (NR) is a new technology invented to replace the 4G wireless communications standard with 5G. It features wireless communication by enhancing electromagnetic radiation spectrum efficiency for mobile broadband and its diversity of spectrum ranging from several hundred kilohertz to millimetre waves is designed for different types of transmissions &amp;lt;ref&amp;gt;5G New Radio (NR). Available at: https://www.techtarget.com/whatis/definition/5G-New-Radio-NR - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. The general purpose of 5G is to use standards and protocols for mobile telecommunications to describe how 5G NR edge devices and 5G NR network infrastructure wirelessly transmit data and communicate&amp;lt;ref&amp;gt;What is 5G NR (New Radio)?. Available at: https://www.sierrawireless.com/iot-blog/what-is-5g-nr/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. Edge devices manage the entry point to networks and include routers, gateways, multiplexers or routing switches. Network infrastructure refers to mostly Radio Access Network devices. New Radio may use the same band of the spectrum as LTE because of Dynamic Spectrum Sharing (DSS) technology. That makes NR capable of being rolled out without shutting down LTE or other networks that may support existing LTE smartphones or IoT devices&amp;lt;ref&amp;gt;How Private LTE can help with construction optimisation. Available at: https://www.iotcentral.io/blog/Connectivity - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[File:Beam forming.jpg|350px|thumb|right|baseline|Photo: Beamforming schematic representation]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[File:Beam forming.jpg|350px|thumb|right|baseline|Photo: Beamforming schematic representation&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;ref&amp;gt;What is Beamforming?. Available at: https://www.everythingrf.com/community/what-is-beamforming - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/ins&gt;]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In Estonia, Ericsson Spectrum Sharing solutions with Telia are using both LTE and New Radio units to expand 5G technology influence. At present Telia has intentions to expand its low-band 5G commercial services with additional improved nationwide 5G coverage, including mid- and high-bands&amp;lt;ref&amp;gt;Telia and Ericsson switch on Estonia’s first commercial 5G network. Available at: https://www.ericsson.com/en/news/2020/11/estonia-switches-on-5g - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. Since 2016 the partnership of Estonia and Sweden to develop 5G technologies has made 5G available on Estonian territory. On December 20, 2018, the first 5G network was opened at Tallinn University of Technology (TalTech) and is used now for innovation and research purposes. University has the goals to improve 5G network solutions in the country and create an environment where companies and start-ups can develop and test new products and services together with the university&amp;lt;ref&amp;gt;Estonia’s first 5G network opens. Available at: https://estonianworld.com/technology/estonias-first-5g-network-opens/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt; With the usage of this technology, TalTech University has launched a self-driving car, which may interact with the surrounding environment at high-speed communication thanks to 5G&amp;lt;ref&amp;gt;ISEAUTO. Available at: https://iseauto.taltech.ee/en/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. The autonomous car must react fast in case of vehicle-to-vehicle and vehicle-to-infrastructure communications. 5G NR provides a suitable environment for that with extremely low latency.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In Estonia, Ericsson Spectrum Sharing solutions with Telia are using both LTE and New Radio units to expand 5G technology influence. At present Telia has intentions to expand its low-band 5G commercial services with additional improved nationwide 5G coverage, including mid- and high-bands&amp;lt;ref&amp;gt;Telia and Ericsson switch on Estonia’s first commercial 5G network. Available at: https://www.ericsson.com/en/news/2020/11/estonia-switches-on-5g - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. Since 2016 the partnership of Estonia and Sweden to develop 5G technologies has made 5G available on Estonian territory. On December 20, 2018, the first 5G network was opened at Tallinn University of Technology (TalTech) and is used now for innovation and research purposes. University has the goals to improve 5G network solutions in the country and create an environment where companies and start-ups can develop and test new products and services together with the university&amp;lt;ref&amp;gt;Estonia’s first 5G network opens. Available at: https://estonianworld.com/technology/estonias-first-5g-network-opens/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt; With the usage of this technology, TalTech University has launched a self-driving car, which may interact with the surrounding environment at high-speed communication thanks to 5G&amp;lt;ref&amp;gt;ISEAUTO. Available at: https://iseauto.taltech.ee/en/ - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;. The autonomous car must react fast in case of vehicle-to-vehicle and vehicle-to-infrastructure communications. 5G NR provides a suitable environment for that with extremely low latency.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Ilynik</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=141996&amp;oldid=prev</id>
		<title>Alekse: /* 5G Security */</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=141996&amp;oldid=prev"/>
		<updated>2022-04-29T11:38:24Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;5G Security&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 14:38, 29 April 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l75&quot;&gt;Line 75:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 75:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Authentication:&amp;#039;&amp;#039;&amp;#039; The user equipment must authenticate the network identifier through key authentication.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Authentication:&amp;#039;&amp;#039;&amp;#039; The user equipment must authenticate the network identifier through key authentication.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&#039;&#039;&#039;Confidentiality of user and signaling data:&#039;&#039;&#039; User equipment can support confidentiality of data through cipher algorithms for encryption. User equipment must use the NEA0 (Null ciphering algorithm), 128-NEA1 (128-bit SNOW 3G based algorithm), 128-NEA2 (128-bit AES based algorithm), and 128-NEA3 (128-bit ZUC based algorithm) cipher algorithms.&amp;lt;ref&amp;gt;5G Security Standard. Available at: https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/15.01.00_60/ts_133501v150100p.pdf - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&#039;&#039;&#039;Confidentiality of user and signaling data:&#039;&#039;&#039; User equipment can support confidentiality of data through cipher algorithms for encryption. User equipment must use the NEA0 (Null ciphering algorithm), 128-NEA1 (128-bit SNOW 3G based algorithm), 128-NEA2 (128-bit AES based algorithm), and 128-NEA3 (128-bit ZUC based algorithm) cipher algorithms.&amp;lt;ref&amp;gt;5G Security Standard. Available at: https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/15.01.00_60/ts_133501v150100p.pdf &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;- Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;5G Security Standards. Available at: https://www.ericsson.com/en/standardization/network-security &lt;/ins&gt;- Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Integrity of user and signaling data:&amp;#039;&amp;#039;&amp;#039; The cipher algorithms NIA0, 128-NIA1, and 128-NIA2 are used for integrity protection. User equipment must support integrity protection and replay protection of user data between it and the network nodes. Integrity protection is done to ensure a program runs properly and prevent data disruption or change by malicious entities. An optional element of integrity of user data is integrity protection of the data between the user equipment and the network node. It is optional because it increases the processing on the user equipment and network node.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Integrity of user and signaling data:&amp;#039;&amp;#039;&amp;#039; The cipher algorithms NIA0, 128-NIA1, and 128-NIA2 are used for integrity protection. User equipment must support integrity protection and replay protection of user data between it and the network nodes. Integrity protection is done to ensure a program runs properly and prevent data disruption or change by malicious entities. An optional element of integrity of user data is integrity protection of the data between the user equipment and the network node. It is optional because it increases the processing on the user equipment and network node.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l95&quot;&gt;Line 95:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 95:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Confidentiality of user and signaling data:&amp;#039;&amp;#039;&amp;#039; The 5G gNB must support the encryption of user data in transit and for radio resource control (RRC) signaling. The gNB should activate the user data encryption process based on security policy. Such encryption algorithms are NEA0, 128-NEA1, 128-NEA2, 128-NEA3.&amp;lt;ref&amp;gt;What is 5G Security? Available at: https://cybersecurity.att.com/blogs/security-essentials/what-is-5g-security - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Confidentiality of user and signaling data:&amp;#039;&amp;#039;&amp;#039; The 5G gNB must support the encryption of user data in transit and for radio resource control (RRC) signaling. The gNB should activate the user data encryption process based on security policy. Such encryption algorithms are NEA0, 128-NEA1, 128-NEA2, 128-NEA3.&amp;lt;ref&amp;gt;What is 5G Security? Available at: https://cybersecurity.att.com/blogs/security-essentials/what-is-5g-security - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&#039;&#039;&#039;Integrity of user and signaling data:&#039;&#039;&#039;  The nodes, like the user equipment, must support integrity protection and replay protection of user data going between the user equipment and the gNB. The encryption algorithms are the same as the ones used by the user equipment for integrity protection. However, NIA0 isn’t recommended for integrity protection since it does not encrypt and therefore adds unnecessary overhead and increases load on user equipment and network node. 5G network nodes must also support integrity protection and replay protection of RRC. For context, RRC exists in the control plane and controls configuration between radio interface Layer 2 and Layer 3.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&#039;&#039;&#039;Integrity of user and signaling data:&#039;&#039;&#039;  The nodes, like the user equipment, must support integrity protection and replay protection of user data going between the user equipment and the gNB. The encryption algorithms are the same as the ones used by the user equipment for integrity protection. However, NIA0 isn’t recommended for integrity protection since it does not encrypt and therefore adds unnecessary overhead and increases load on user equipment and network node. 5G network nodes must also support integrity protection and replay protection of RRC. For context, RRC exists in the control plane and controls configuration between radio interface Layer 2 and Layer 3.&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;ref&amp;gt;Integrity of user and signaling data Available at: https://www.ericsson.com/en/security/a-guide-to-5g-network-security#securityarchitecture - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Setup and configuration requirements:&amp;#039;&amp;#039;&amp;#039; When operations and management (O&amp;amp;M) systems setup and configure gNBs must be authenticated and authorized by registration authority and a certification authority (RA/CA) so attackers won’t be able to modify the gNB settings and software configurations. Communication between the O&amp;amp;M systems and the gNB must be confidentially-, integrity-, and replay-protected from unauthorized entities. Additionally, software and data changes must be authorized before installation and use, the software and data itself must be authorized, and transferring the software to the gNB must be confidential and have integrity protection. The bootup process must be done in a secure environment to protect its sensitive elements.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Setup and configuration requirements:&amp;#039;&amp;#039;&amp;#039; When operations and management (O&amp;amp;M) systems setup and configure gNBs must be authenticated and authorized by registration authority and a certification authority (RA/CA) so attackers won’t be able to modify the gNB settings and software configurations. Communication between the O&amp;amp;M systems and the gNB must be confidentially-, integrity-, and replay-protected from unauthorized entities. Additionally, software and data changes must be authorized before installation and use, the software and data itself must be authorized, and transferring the software to the gNB must be confidential and have integrity protection. The bootup process must be done in a secure environment to protect its sensitive elements.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key ico_mediawiki-ITK_:diff:1.41:old-141974:rev-141996:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Alekse</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=141974&amp;oldid=prev</id>
		<title>Alekse: /* 5G Security */</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=141974&amp;oldid=prev"/>
		<updated>2022-04-28T15:58:59Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;5G Security&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 18:58, 28 April 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l75&quot;&gt;Line 75:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 75:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Authentication:&amp;#039;&amp;#039;&amp;#039; The user equipment must authenticate the network identifier through key authentication.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Authentication:&amp;#039;&amp;#039;&amp;#039; The user equipment must authenticate the network identifier through key authentication.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&#039;&#039;&#039;Confidentiality of user and signaling data:&#039;&#039;&#039; User equipment can support confidentiality of data through cipher algorithms for encryption. User equipment must use the NEA0 (Null ciphering algorithm), 128-NEA1 (128-bit SNOW 3G based algorithm), 128-NEA2 (128-bit AES based algorithm), and 128-NEA3 (128-bit ZUC based algorithm) cipher algorithms.&amp;lt;ref&amp;gt;5G Security. Available at: https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/15.01.00_60/ts_133501v150100p.pdf - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&#039;&#039;&#039;Confidentiality of user and signaling data:&#039;&#039;&#039; User equipment can support confidentiality of data through cipher algorithms for encryption. User equipment must use the NEA0 (Null ciphering algorithm), 128-NEA1 (128-bit SNOW 3G based algorithm), 128-NEA2 (128-bit AES based algorithm), and 128-NEA3 (128-bit ZUC based algorithm) cipher algorithms.&amp;lt;ref&amp;gt;5G Security &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Standard&lt;/ins&gt;. Available at: https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/15.01.00_60/ts_133501v150100p.pdf - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Integrity of user and signaling data:&amp;#039;&amp;#039;&amp;#039; The cipher algorithms NIA0, 128-NIA1, and 128-NIA2 are used for integrity protection. User equipment must support integrity protection and replay protection of user data between it and the network nodes. Integrity protection is done to ensure a program runs properly and prevent data disruption or change by malicious entities. An optional element of integrity of user data is integrity protection of the data between the user equipment and the network node. It is optional because it increases the processing on the user equipment and network node.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Integrity of user and signaling data:&amp;#039;&amp;#039;&amp;#039; The cipher algorithms NIA0, 128-NIA1, and 128-NIA2 are used for integrity protection. User equipment must support integrity protection and replay protection of user data between it and the network nodes. Integrity protection is done to ensure a program runs properly and prevent data disruption or change by malicious entities. An optional element of integrity of user data is integrity protection of the data between the user equipment and the network node. It is optional because it increases the processing on the user equipment and network node.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l93&quot;&gt;Line 93:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 93:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Access network authorization:&amp;#039;&amp;#039;&amp;#039; Access network must be authorized by the serving network to provide services to user equipment.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Access network authorization:&amp;#039;&amp;#039;&amp;#039; Access network must be authorized by the serving network to provide services to user equipment.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&#039;&#039;&#039;Confidentiality of user and signaling data:&#039;&#039;&#039; The 5G gNB must support the encryption of user data in transit and for radio resource control (RRC) signaling. The gNB should activate the user data encryption process based on security policy. Such encryption algorithms are NEA0, 128-NEA1, 128-NEA2, 128-NEA3.&amp;lt;ref&amp;gt;5G Security&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;. &lt;/del&gt;Available at: https://cybersecurity.att.com/blogs/security-essentials/what-is-5g-security - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&#039;&#039;&#039;Confidentiality of user and signaling data:&#039;&#039;&#039; The 5G gNB must support the encryption of user data in transit and for radio resource control (RRC) signaling. The gNB should activate the user data encryption process based on security policy. Such encryption algorithms are NEA0, 128-NEA1, 128-NEA2, 128-NEA3.&amp;lt;ref&amp;gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;What is &lt;/ins&gt;5G Security&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;? &lt;/ins&gt;Available at: https://cybersecurity.att.com/blogs/security-essentials/what-is-5g-security - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Integrity of user and signaling data:&amp;#039;&amp;#039;&amp;#039;  The nodes, like the user equipment, must support integrity protection and replay protection of user data going between the user equipment and the gNB. The encryption algorithms are the same as the ones used by the user equipment for integrity protection. However, NIA0 isn’t recommended for integrity protection since it does not encrypt and therefore adds unnecessary overhead and increases load on user equipment and network node. 5G network nodes must also support integrity protection and replay protection of RRC. For context, RRC exists in the control plane and controls configuration between radio interface Layer 2 and Layer 3.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Integrity of user and signaling data:&amp;#039;&amp;#039;&amp;#039;  The nodes, like the user equipment, must support integrity protection and replay protection of user data going between the user equipment and the gNB. The encryption algorithms are the same as the ones used by the user equipment for integrity protection. However, NIA0 isn’t recommended for integrity protection since it does not encrypt and therefore adds unnecessary overhead and increases load on user equipment and network node. 5G network nodes must also support integrity protection and replay protection of RRC. For context, RRC exists in the control plane and controls configuration between radio interface Layer 2 and Layer 3.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Alekse</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=141971&amp;oldid=prev</id>
		<title>Alekse: /* 5G Security */</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=5G_technology_and_it%27s_development_in_Estonia&amp;diff=141971&amp;oldid=prev"/>
		<updated>2022-04-28T15:55:23Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;5G Security&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 18:55, 28 April 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l93&quot;&gt;Line 93:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 93:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Access network authorization:&amp;#039;&amp;#039;&amp;#039; Access network must be authorized by the serving network to provide services to user equipment.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Access network authorization:&amp;#039;&amp;#039;&amp;#039; Access network must be authorized by the serving network to provide services to user equipment.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&#039;&#039;&#039;Confidentiality of user and signaling data:&#039;&#039;&#039; The 5G gNB must support the encryption of user data in transit and for radio resource control (RRC) signaling. The gNB should activate the user data encryption process based on security policy. Such encryption algorithms are NEA0, 128-NEA1, 128-NEA2, 128-NEA3.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&#039;&#039;&#039;Confidentiality of user and signaling data:&#039;&#039;&#039; The 5G gNB must support the encryption of user data in transit and for radio resource control (RRC) signaling. The gNB should activate the user data encryption process based on security policy. Such encryption algorithms are NEA0, 128-NEA1, 128-NEA2, 128-NEA3.&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;ref&amp;gt;5G Security. Available at: https://cybersecurity.att.com/blogs/security-essentials/what-is-5g-security - Accessed 25-04-2022.&amp;lt;/ref&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Integrity of user and signaling data:&amp;#039;&amp;#039;&amp;#039;  The nodes, like the user equipment, must support integrity protection and replay protection of user data going between the user equipment and the gNB. The encryption algorithms are the same as the ones used by the user equipment for integrity protection. However, NIA0 isn’t recommended for integrity protection since it does not encrypt and therefore adds unnecessary overhead and increases load on user equipment and network node. 5G network nodes must also support integrity protection and replay protection of RRC. For context, RRC exists in the control plane and controls configuration between radio interface Layer 2 and Layer 3.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#039;&amp;#039;&amp;#039;Integrity of user and signaling data:&amp;#039;&amp;#039;&amp;#039;  The nodes, like the user equipment, must support integrity protection and replay protection of user data going between the user equipment and the gNB. The encryption algorithms are the same as the ones used by the user equipment for integrity protection. However, NIA0 isn’t recommended for integrity protection since it does not encrypt and therefore adds unnecessary overhead and increases load on user equipment and network node. 5G network nodes must also support integrity protection and replay protection of RRC. For context, RRC exists in the control plane and controls configuration between radio interface Layer 2 and Layer 3.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key ico_mediawiki-ITK_:diff:1.41:old-141967:rev-141971:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Alekse</name></author>
	</entry>
</feed>