You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

5 December 2025

Zone-AGF: An O-RAN-Based Local Breakout and Handover Mechanism for Non-5G Capable Devices in Private 5G Networks

,
and
Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology, Taipei 10607, Taiwan
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue Wireless Sensor Network: Latest Advances and Prospects

Abstract

The growing demand for ultra-reliable and low-latency communication (URLLC) in private 5G environments, such as smart campuses and industrial networks, has highlighted the limitations of conventional Wireline access gateway function (W-AGF) architectures that depend heavily on centralized 5G core (5GC) processing. This paper introduces a novel Centralized Unit (CU)-based Zone-Access Gateway Function (Z-AGF) architecture designed to enhance handover performance and enable Local Breakout (LBO) within Non-Public Networks (NPNs) for non-5G capable (N5GC) devices. The proposed design integrates W-AGF functionalities with the Open Radio Access Network (O-RAN) framework, leveraging the F1 Application Protocol (F1AP) as the primary interface between Z-AGF and CU. By performing local breakout (LBO) locally at the Z-AGF, latency-sensitive traffic is processed closer to the edge, reducing the backhaul load and improving end-to-end latency, throughput, and jitter performance. The experimental results demonstrate that Z-AGF achieves up to 45.6% latency reduction, 69% packet loss improvement, 85.6% reduction of round-trip time (RTT) for local communications under LBO, effective local offloading with quantified throughput compared to conventional W-AGF implementations. This study provides a scalable and interoperable approach for integrating wireline and wireless domains, supporting low-latency, highly reliable services within the O-RAN ecosystem and accelerating the adoption of localized next-generation 5G services.

1. Introduction

The rapid evolution of fifth generation (5G) mobile communication systems has created unprecedented opportunities for both public and private networks, particularly in achieving ultra-reliable low-latency communication (URLLC), massive connectivity, and flexible network slicing [1,2,3]. Among these innovations, Non-Public Networks (NPNs) have emerged as a promising paradigm for enterprises and institutions seeking customized, high-performance networking solutions that address specific latency, reliability, and security requirements [1,2]. Despite the proliferation of 5G-capable devices, a significant portion of end systems in private environments such as laptops, laboratory PCs, and internal departmental servers remain Non-5G-Capable (N5GC) [4,5]. These devices rely heavily on Wi-Fi or fixed network gateways managed by Wireless Access Gateway Functions (W-AGFs) to access network resources [4,6]. In smart campus scenarios, where multiple departments operate their own local networks, W-AGFs serve as the connectivity bridge between N5GC devices and the 5G-enabled infrastructure managed by the Centralized Unit (CU) of the Open Radio Access Network (O-RAN) [7]. However, current W-AGFs are not designed to support session continuity, mobility management, or low-latency handover during user transitions within a CU domain [2,7,8]. When a user moves between Wi-Fi zones such as classrooms, laboratories, or buildings—ongoing sessions to departmental servers may be interrupted, severely degrading the performance of latency-sensitive and real-time applications. Furthermore, W-AGFs lack Quality of Service (QoS) enforcement, path optimization, and URLLC-oriented routing mechanisms [5,7,9], making them unsuitable for next-generation smart campus or industrial IoT applications that demand deterministic performance.

1.1. Motivation

Recent studies have introduced Local Breakout (LBO) as an approach to reduce end-to-end latency and alleviate backhaul congestion by enabling localized routing of data traffic, bypassing the centralized 5G core (5GC) [10,11,12,13], while LBO has shown promise in improving network efficiency, most existing efforts have focused on Fixed Mobile Convergence (FMC) or general next-generation-radio access network (NG-RAN) optimizations [5,6,7]. These solutions do not explicitly address the mobility and session persistence challenges faced by N5GC devices in gateway-centric NPN environments such as smart campuses and enterprise networks.
In distributed smart campus networks, multiple W-AGFs operate independently under a single CU domain, with limited coordination or awareness of device mobility [7,14,15]. This architectural gap results in session interruptions and latency spikes when users move between the access zones. Consequently, there is a pressing need for an integrated mechanism that enables mobility-aware, low-latency, and seamless connectivity for N5GC devices, while maintaining compatibility with existing 5G and open-radio access network(O-RAN) components [7,16,17].
Unlike conventional solutions that rely exclusively on UPF-anchored breakout or Wi-Fi offload, our design leverages the O-RAN CU/F1 architecture. By terminating F1-C/F1-U and preserving CU-based session/mobility control, the Z-AGF extends O-RAN principles to the wireline and non-3GPP access domain.

1.2. Proposed Solution

To bridge this gap, this study introduces a novel centralized unit-based zone access gateway function (Z-AGF) architecture designed to enhance mobility awareness, session persistence, and latency optimization for N5GC devices operating under a CU-O-RAN domain. The Z-AGF integrates with the CU via the F1 Application Protocol (F1AP) for control-plane coordination [17,18,19], and leverages the user-plane enforcement function (UPEF) and local data network (LDN) elements to enable URLLC-aware local breakout [10,11]. In wired environments, the Z-AGF employs a layer 2 tunneling protocol (L2TP) Network Server (LNS) for IP address allocation and traffic management for fixed N5GC devices connected through residential gateways [5,20].
Unlike conventional W-AGF deployment, the proposed Z-AGF introduces cross-gateway coordination and latency-aware routing, ensuring uninterrupted connectivity as devices move across departmental access zones. By integrating session persistence and URLLC-based QoS enforcement, Z-AGF aims to deliver deterministic communication performance for diverse smart campus and enterprise applications.

1.3. Key Contributions

The key contributions of this paper are summarized as follows:
  • Novel Z-AGF architecture for seamless N5GC connectivity: We introduce a Zone-Access Gateway Function (Z-AGF) as a CU-coordinated control-plane entity that complements existing CU-O-RAN and W-AGF components to enable session continuity and mobility for N5GC and fixed devices in private 5G environments.
  • Practical integration and implementation: We demonstrate the integration of Z-AGF within a private smart-campus deployment using interoperable open-source platforms (Open5GS and UERANSIM), confirming feasibility and alignment with standardized O-RAN/3GPP interfaces.
  • Latency-aware mobility enhancement: We design control- and user-plane mechanisms that apply localized breakout and QoS-aware routing at the access edge to support reliable and low-latency communication for delay-sensitive N5GC traffic.
  • Experimental validation against a W-AGF baseline: We evaluate Z-AGF performance in terms of handover latency, packet loss, and session continuity, demonstrating consistent gains over a conventional W-AGF/UPF deployment in the examined smart-campus scenario.
These contributions collectively advance support for non-5GC devices in private 5G smart-campus networks, while maintaining compatibility with existing O-RAN and 3GPP procedures.

3. Proposed Approach: Zone Access Gateway Function (Z-AGF)

This section presents the design and operational framework of the proposed Zone Access Gateway Function (Z-AGF).
The Z-AGF is introduced as a novel control and user-plane entity that complements the existing wireless access gateway function (W-AGF) and Centralized Unit (CU) within private smart campus networks. Its primary objective is to ensure seamless mobility, session continuity, and low-latency connectivity for Non-5G-Capable (N5GC) devices connected via Wi-Fi or fixed access networks under a CU domain.

3.1. Architectural Overview

Figure 14 presents the overall architecture of the proposed Z-AGF framework.
Figure 14. Proposed Z-AGF architecture integrating wireline access with CU–O-RAN for N5GC devices.
The Z-AGF operates as an F1-terminating O-RAN access-edge entity, maintaining strict compliance with 3GPP/O-RAN specifications through F1AP-based control signaling and CU-coordinated PDCP/SDAP user-plane functions. By interfacing directly with the Zone-CU over the standardized F1-C/F1-U split, the Z-AGF seamlessly integrates mobility, policy, and data-path management for wireline clients connected via Fixed Network Residential Gateways (FN-RGs).
Unlike conventional W-AGF or I-UPF deployments, which depend heavily on the 5G Core (5GC) for session anchoring, Z-AGF introduces a User-Plane Enhancement Function (UPEF) and a Local Data Network (LDN) to enable localized breakout for latency-sensitive traffic. in addition, an integrated l2tp Network Server (LNS) provides scalable IP allocation per departmental zone, ensuring address isolation and efficient routing. This design supports seamless inter-Z-AGF mobility and traffic steering within the smart-campus domain, substantially reducing the backhaul dependency and end-to-end delay.

3.2. Interface Legitimacy and F1AP Adaptation in Z-AGF

The Z-AGF extends CU–O-RAN intelligence to wireline domains by implementing a proxy DU-like abstraction that enables legitimate F1AP communication with the CU. Although the F1 interface is standardized primarily for CU–DU coordination (TS 38.470–38.473) [16,17,18], the Z-AGF operates strictly at the PDCP/SDAP boundary of functional split Option 2 (TS 38.401) [17], avoiding any dependency on lower-layer RLC/MAC/PHY scheduling and radio-specific procedures.
To achieve this, the Z-AGF introduces a lightweight shim-control layer that translates PPPoE/L2TP session parameters into F1-C BearerContextSetup, modification, and release procedures based on TS 38.471–38.473 [17,18,19], preserving TEID/QFI/5QI semantics for QoS enforcement [2]. This allows the CU to retain full ownership of radio-level capabilities, QoS rules, and mobility state machines [7].
On the user-plane side, the Z-AGF encapsulates wireline traffic into F1-U GTP-U flows toward the CU-UP (TS 38.472) [18], allowing transparent session anchoring without modifying 5GC logic [2]. Thus, the Z-AGF behaves as a logical bearer-anchoring DU [7], ensuring interoperability with vendor-neutral CU implementations under standard O-RAN procedures [16].
Mobility-related tunnel updates (uplink/downlink) are coordinated and authenticated by the Z-CU, which performs session-context synchronization across departmental zones, ensuring seamless handover without violating 3GPP DU scope constraints [19].

3.3. Protocol Stack Design

3.3.1. Control Plane Inter-Working

Figure 15 illustrates the control-plane protocol stack for the N5GC devices under the Z-AGF. On the FN-RG side, signaling is initiated through PPPoE and DHCP, traversing the Y5 interface toward the Z-AGF. The Z-AGF adapts this signaling to 3GPP-compliant procedures using the F1 Application Protocol (F1AP) over SCTP/IP and forwards control-plane messages to the CU-CP. Subsequently, NGAP procedures manage the registration and authentication toward the AMF through the N2 interface [29]. This layered interworking ensures seamless session establishment and mobility management while maintaining compliance with the 3GPP TS 38.471 [17] and TS 23.316 specifications [5].
Figure 15. Control-plane protocol stack between FN-RG, Z-AGF, and 5GC elements.

3.3.2. User-Plane Operations

The user-plane operation shown in Figure 16 maps fixed-access traffic into 5G-compliant GTP-U tunnels. FN-RG packets encapsulated through PPPoE/DHCP are relayed over Ethernet to Z-AGF, where they are translated into F1-U traffic toward CU-UP over UDP/IP. The CU-UP subsequently encapsulate the data into GTP-U tunnels over the N3 interface toward the UPF. This layered architecture ensures end-to-end QoS preservation, efficient bearer handling, and transparent inter-working between fixed and mobile domains.
Figure 16. User-plane protocol stack for N5GC traffic through Z-AGF and CU-UP.

3.3.3. Local Breakout Mechanism

To overcome the limitations of centralized UPF routing, Z-AGF implements a distributed Local Breakout (LBO) mechanism through integrated UPEF and LDN components (Figure 17). Latency-sensitive traffic is dynamically classified at the Z-AGF and redirected to the LDN for local processing, thereby bypassing the 5G core. While latency-sensitive flows are locally offloaded through the UPEF/LDN, all QoS policies remain enforced under PCF rules, charging records are still reported to the CHF via the SMF, and lawful-interception visibility is preserved through NEF/AF exposure, ensuring full 3GPP governance compliance.
Figure 17. Z-AGF-enabled Local Breakout (LBO) protocol stack for latency-sensitive traffic via UPEF and LDN.
The UPEF manages encapsulation and session persistence, whereas the LNS dynamically assigns IP addresses within each departmental zone. This localized optimization significantly reduces the round-trip time (RTT) and jitter for enterprise applications, thereby achieving real-time responsiveness and enhanced reliability across departments.

3.4. Z-AGF Call Flow Procedures

Figure 18 illustrates the PDU session establishment process for the N5GC devices under Z-AGF control. The procedure begins with device registration and authentication at the Z-AGF, followed by session establishment through CU and UPF components. The Z-AGF coordinates with the CU-CP for the bearer setup, whereas the CU-UP manages user-plane mapping, ensuring context synchronization between the control and data paths.
Figure 18. PDU session establishment sequence for N5GC devices under Z-AGF.
The Local Breakout signaling flow, shown in Figure 19, demonstrates how the Z-AGF redirects traffic to the LDN for localized processing. The CU maintains flow control and policy coordination, ensuring a consistent QoS between the LBO and core-based sessions. This integration enables seamless local service access without disrupting the global 5GC connectivity.
Figure 19. Local Breakout (LBO) signaling flow between N5GC, Z-AGF, and CU components.
Finally, Figure 20 depicts the inter-Z-AGF handover procedure coordinated by the Z-CU using a Mobility-Based Bridging (MBB) mechanism. When a device moves across zones, Z-CU manages session continuity by pre-synchronizing the session contexts between the source and target Z-AGFs. This enables smooth mobility for N5GC devices without requiring re-authentication or PDU session re-establishment, thereby minimizing interruption and signaling overhead.
Figure 20. Inter-Z-AGF handover procedures coordinated by Z-CU using the MBB mechanism.

3.4.1. PDU Session Establishment

As shown in Figure 18, the Z-AGF manages the complete PDU session setup for each FN-RG, including PPPoE discovery, authentication, and signaling coordination with the CU-CP and 5G core. Once the GTP-U tunnel is established between the Z-AGF and CU-UP, FN-RG obtains IP configuration and achieves full connectivity within the CU-coordinated NPN environment.
Z-AGF PDU Session Establishment Procedures:
  • FN-RG requests a PPPoE session from the ISP (Z-AGF): its broadcasts a PPPoE Discovery Procedure to the Z-AGF. A PPPoE session was established, and the Z-AGF executed the control procedures for FN-RG registration and session setup.
  • Registration and Authentication: The Z-AGF handles the registration and authentication procedure of the FN-RG to the 5G Core Network and sends it through an RRC message transfer.
  • PDU Session Acceptance: The Z-AGF receives the PDU Session Establishment Accept message and establishes the corresponding GTP-U tunnel. At this stage, Z-AGF manages the FN-RG’s user plane.
  • Tunnel Creation: The tunnel to the Z-AGF was created and is listed in the routing table.
  • PDU Session Completion: The PDU session of the FN-RG is successfully established.

3.4.2. Local Breakout (LBO) Procedures

As illustrated in Figure 19, the Local Breakout (LBO) procedure enables latency-sensitive traffic to be routed locally through the Z-AGF without traversing the 5G core. Once the PDU session is established, the N5GC device initiates session control signaling that triggers UPEF encapsulation and the L2TP configuration for direct local path formation between the Z-AGF and CU. This mechanism ensures low-latency communication and optimized bandwidth utilization within the CU-coordinated network domain.
Z-AGF Local Breakout (LBO) Procedures:
  • DHCP/PPPoE Connection: A DHCP/PPPoE connection is established between the N5GC device and FN-RG.
  • SCCRQ Initiation: The N5GC device sends an SCCRQ message.
  • UPEF Encapsulation: The Z-AGF encapsulates the N5GC SCCRQ within the UPEF tunnel.
  • UPEF Message Transfer: The encapsulated message is forwarded through the UPEF tunnel.
  • CU Decapsulation: The CU decapsulates the received UPEF message.
  • Record Z-AGF Information in Z-CU: The Z-CU records Z-AGF information as follows:
    • Z-AGF ID = 1
    • Z-CU (Z-AGF) IP = 10.50.0.88
  • CU Message Handling: The CU transfers the SCCRQ message to the target entity.
  • Tunnel and Session Validation: The CU verifies the N5GC device’s tunnel ID and session ID.
  • L2TP Procedure: The CU performs L2TP configuration for the N5GC device.
  • Record Session Parameters:N5GC Device Tunnel ID (stored)
  • Record Session Parameters:N5GC Device Session ID (stored)
  • PPP Exchange: PPP negotiation is performed between the N5GC device and the Z-AGF.
  • IPCP Configuration: The N5GC device receives a PPP IPCP Configuration ACK message.
  • Record N5GC Device Information:
    • N5GC ID = 1
    • Z-CU Z-AGF ID = 1
    • N5GC Z-AGF IP Tunnel = 10.50.0.88
  • CU Encapsulation: The CU encapsulates traffic using F1-U.
  • F1-U Message Transfer: The CU transfers the encapsulated F1-U message.
  • Z-AGF Decapsulation: The Z-AGF decapsulates the F1-U traffic, carrying the LBO payload.
  • Final Configuration: The N5GC device receives PPP IPCP Configuration ACK confirmation.
  • LBO Tunnel Creation: The LBO tunnel for the N5GC device is successfully created.

3.4.3. Handover Procedures

As shown in Figure 20, the handover procedure in the Z-AGF framework enables seamless mobility for N5GC devices transitioning between different Z-AGF zones under CU-coordination. When a device moves from one departmental zone to another, the Z-CU manages tunnel updates, signaling synchronization, and the Y5 interface reconfiguration to ensure uninterrupted service continuity and session persistence. If tunnel establishment or Z-CU synchronization fails during mobility, the session temporarily falls back to the UPF-anchored route while the Z-CU triggers context refresh or incremental FN-RG reauthentication, ensuring continuity without PDU-session loss.
Z-AGF Handover Procedure for N5GC Devices:
  • Connection Establishment: The N5GC device establishes an active connection with the current Z-AGF.
  • Roaming Event: The N5GC device initiates a handover, roaming from Z-AGF1 to Z-AGF2.
  • Tunnel Detection: The serving Z-AGF detects a new tunnel request from the N5GC device.
  • F1AP UL Message Transfer: The Z-AGF sends an F1AP uplink message to initiate a tunnel update request.
  • Tunnel Update Request: The request is sent to the Z-CU for coordination.
  • Tunnel Information Update: The Z-CU updates the tunnel parameters as follows in Table 1:
    Table 1. Z-CU/Z-AGF tunnel information for an N5GC device before and after handover.
  • Tunnel Update Response: The Z-CU sends the tunnel update response to confirm the successful modification.
  • F1AP DL Message Transfer: The CU transmits a downlink F1AP message carrying the tunnel update response.
  • Y5 Reconfiguration (Target Tunnel Setup): The Y5 interface was reconfigured to establish the tunnel toward the target Z-AGF.
  • Tunnel Response Delivery: The CU sends the tunnel update response to the target Z-AGF.
  • Target Z-AGF Tunnel Detection: The target Z-AGF detects and activates a new N5GC tunnel request.
  • Y5 Reconfiguration Completion: The system completes Y5 reconfiguration by breaking the tunnel associated with the source Z-AGF.
  • Connection to LNS Established: A new connection to the LNS is established, completing the inter-Z-AGF handover process.
The proposed inter-Z-AGF handover does not require a new registration or NAS protocol update. As shown in Figure 18, the FN-RG/N5GC device completes a standard 5GC registration and PDU-session establishment with the AMF/SMF once, and this NAS context remains anchored at the Z-CU. During mobility between zones, only the F1-U and Y5 tunnel bindings are updated under Z-CU coordination, while the original NAS and PDU-session state is fully preserved. The handover procedure is treated as an intra-CU mobility event and remains fully compliant with existing 3GPP NAS specifications. Therefore, Z-AGF establishes a unified, latency-optimized access framework that extends CU-O-RAN intelligence to wireline domains, enabling seamless N5GC integration in smart campuses and private 5G deployments.

4. Implementation and Experimental Setup

This section presents the implementation setup of the proposed Zone Access Gateway Function (Z-AGF) and its experimental validation within a private 5G smart campus environment.
The objective is to evaluate session continuity, latency performance, and local breakout efficiency for Non-5G-Capable (N5GC) devices operating under the Z-AGF framework.

4.1. Prototype Experimental Environment

The Z-AGF prototype was developed and deployed using a hybrid testbed environment that combines virtualized network functions with emulated access devices, as illustrated in Figure 21. The experimental setup integrates several open-source components to realize the end-to-end Next-Generation Radio Access Network (NG-RAN) architecture and to evaluate the proposed Zone–Access Gateway Function (Z-AGF) concept.
Figure 21. Experimental testbed integrating Open5GS, UERANSIM, and OpenAirInterface components for Z-AGF implementation and configuration.
The test environment consists of the following major components:
  • 5G Core Network: Implemented using the Open5GS platform [22,34], comprising Access and Mobility Management Function (AMF), Session Management Function (SMF), and User-Plane Function (UPF) [35]. These modules were deployed on Ubuntu 22.04 (Jammy) with kernel version 5.15.0, providing reference 5GC functions for the control and user-plane operations.
  • Wi-Fi Access and Gateway Layer: The Wireless Access Gateway Functions (W-AGFs) were virtualized and connected to departmental Wi-Fi access points simulated via host-based bridges. Each W-AGF instance interacts with the Z-AGF through a lightweight control channel for session synchronization and mobility coordination. The W-AGF was realized through the UERANSIM [36] framework, operating as a proxy UE over the N2 and N3 interfaces toward the 5GC, and integrated with an rp-pppoe [37] server for PPPoE-based aggregation.
  • Z-AGF Module: Implemented as a middleware between the W-AGFs and the Centralized Unit (CU), the Z-AGF was developed in Python 3.13 (control-plane) and C++23 (user-plane). It incorporates three submodules: Mobility Management Module (MMM), Session Persistence Engine (SPE), and QoS Policy Control Unit (QPCU). Z-AGF leverages the OpenAirInterface (OAI) [34,38] stack to support F1 interface signaling and proxy UE interconnection with the CU. An rp-pppoe server provides tunneling support for subscriber sessions through PPPoE encapsulation.
  • Centralized Unit (CU): The CU–O-RAN instance was emulated using the OpenAirInterface CU implementation, which manages the F1 Application Protocol (F1AP) signaling and coordinates Z-AGF functions during handovers and QoS updates. The CU interfaces with the UPF for packet forwarding and session management across distributed AGFs.
  • Fixed network residential gateway (FN-RGs): Each FN-RG node was implemented using the ISC-DHCP server [39] for dynamic IP allocation to end devices, complemented by xl2tpd [40] for Layer-2 tunneling to local access networks. The FN-RGs emulate customer premises equipment (CPE) devices that act as tunnel endpoints for PPPoE sessions connected to AGFs.
  • Database and Analytics: A MongoDB instance stores session contexts, device identifiers, and latency statistics collected during the post-analysis experiments [41].
  • UE and Traffic Simulation: The UERANSIM toolkit emulates 5G user equipment (UE) and generates UDP/TCP traffic flows. For N5GC devices, Wi-Fi clients were emulated via virtual interfaces connected through departmental W-AGFs.
The entire testbed was hosted on an Intel Core i9 workstation with 64 GB RAM and VMware-based virtualization. Network namespaces and virtual bridges are configured to isolate each component, allowing the emulation of realistic mobility transitions within a single CU domain. This modular and reproducible environment enables flexible experimentation with different tunneling, access, and interworking mechanisms across fixed and mobile segments.

4.2. Experimental Configuration and Results

As shown in Figure 22, the experimental log outputs from the Z-AGF implementation demonstrate the association of an FN-RG with the 5G Core and the corresponding IP allocation process. The upper log segment SMF/UPF confirms that the FN-RG, identified by its SUPI 208997000000002), successfully establishes a PDU session with the UPF allocating IPv4 address 10.45.0.6 for data connectivity. The lower log segment Z-AGF captures the PPPoE session setup at the access gateway, where the FN-RG identifier is authenticated and mapped to the same allocated IP address.
Figure 22. Experimental log outputs showing FN-RG association, SUPI mapping, and IP allocation via Z-AGF–5GC interworking.
These results validate that the Z-AGF correctly manages end-to-end mapping between the FN-RG identity, control-plane signaling (via SMF), and user-plane IP allocation (via UPF). The successful binding of the SUPI and IP address (10.45.0.6) confirms the proposed Z-AGF protocol stack design and its ability to integrate fixed network access into the 5G Core while remaining compliant with 3GPP architectural procedures.

5. Results and Discussion

This section presents an experimental evaluation and analysis of the proposed Zone Access Gateway Function (Z-AGF)architecture in comparison with conventional approaches, namely the Wireless Access Gateway Function (W-AGF) and Intermediate User-Plane Function (I-UPF). The experiments were conducted in an emulated 5G Non-Public Network (NPN) environment integrating Open5GS, OpenAirInterface (OAI),UERANSIM, and PPPoE/L2TP tunneling, as described in Section 4.
The evaluation focused on performance gains in round-trip time (RTT), handover latency, packet loss ratio, jitter, throughput, and CPU utilization. Wireshark traces and system counters were used to collect data under controlled bitrate variations (5–50 Mbps). The results are presented as numerical tables and graphical visualizations.
Overall, the proposed Z-AGF consistently outperforms the baseline W-AGF/UPF configuration. By enabling Local Breakout (LBO) and direct coordination with a Centralized Unit (CU), Z-AGF minimizes core traversal, reduces signaling overhead, and achieves lower latency with improved reliability. The following subsections analyze the handover, reliability, LBO efficiency, and resource utilization in detail.
As in Figure 23, Z-AGF minimizes Path C traversal through 5GC by enabling local breakout and inter-zone routing, resulting in shorter data paths and reduced latency.
Figure 23. Experimental setup and traffic flow comparison between baseline W-AGF and proposed Z-AGF architectures.

5.1. Evaluation Methodology

Experiments were executed under three primary configurations using both TCP and UDP traffic profiles:
  • Scenario 1: Standard W-AGF(baseline), mobility and session management handled solely by W-AGF/I-UPF.
  • Scenario 2: Z-AGF Enabled, Mobility jointly managed by the Z-AGF and CU using cached session contexts.
  • Scenario 3: Z-AGF combined with LBO, mobility and localized data routing for intra-campus communication.
Each scenario was repeated to ensure statistical consistency. The reported results corresponded to the average values from these runs.

5.2. Handover Latency Analysis

Figure 24 shows the measured handover latencies across configurations. Z-AGF demonstrates a smoother latency profile compared to the W-AGF baseline, validating the CU-assisted coordination and optimized control-plane signaling.
Figure 24. Measured handover latency comparison between W-AGF baseline, I-UPF and Z-AGF setups. The Z-AGF with LBO achieves the lowest T h o through CU-assisted coordination.
As shown in Table 2, the proposed Z-AGF achieves 45.6% reduction in the average handover latency relative to the baseline. This improvement arises from the pre-cached session contexts in the Session Persistence Engine (SPE) and reduced control signaling during inter-domain mobility. The LBO mechanism further eliminates redundant packet redirection, enabling sub-250 ms mobility crucial for URLLC and interactive streaming.
Table 2. Comparison of Handover Latency Across Test Scenarios.

5.3. Packet Loss and Session Continuity

The Packet Loss Ratio (PLR) and Session Continuity Rate (SCR) were evaluated during mobility across the departmental gateways.
As shown in Figure 25 and Table 3, Z-AGF achieved superior reliability and session preservation.
Figure 25. Packet Loss Ratio and Session Continuity Rate comparison across configurations. Z-AGF maintains perfect session stability.
Table 3. PLR and SCR Performance under Mobility Scenarios.
Z-AGF yields up to 69% packet loss reduction compared with the baseline and ensures 98.1% session continuity. This improvement results from the MBB handover procedures coordinated by the Z-CU and persistent NAS context caching. This mechanism ensures uninterrupted connectivity for latency-critical applications such as smart classrooms, telepresence, and industrial robotics.

5.4. Local Breakout and QoS Performance

The introduction of the Local Breakout Handler (LBH) within the proposed Z-AGF framework enables local traffic offloading to the campus domain, effectively bypassing the core UPF. This design significantly shortens the data path and enhances the Quality of Service (QoS) for Non-5G-Capable (N5GC) devices. Figure 26, Figure 27, Figure 28 and Figure 29 presents a comparative performance analysis across RTT, jitter, packet loss, and throughput metrics for the UPF/W-AGF and Z-AGF configurations.
Figure 26. CDF of RTT for different paths under W-AGF, I-UPF and Z-AGF configurations.
Figure 27. Jitter versus bitrate comparison across W-AGF, I-UPF and Z-AGF.
Figure 28. Packet loss versus bitrate for W-AGF, I-UPF and Z-AGF architectures.
Figure 29. Throughput versus bitrate for W-AGF, I-UPF and Z-AGF configurations.
As shown in Figure 26, the CDF curves indicate that the proposed Z-AGF achieves the lowest latency distribution, with a mean RTT of approximately 5.1 ms, compared to 44.9 ms for the conventional W-AGF. This demonstrates a latency reduction, highlighting the efficiency of the local breakout and direct CU coordination.
Figure 27 shows that jitter remains minimal and highly stable under Z-AGF operation, remaining below 0.8 ms across all tested bitrates. In contrast, W-AGF exhibits higher jitter (up to 3 ms at low bitrates) owing to extended routing through the CU and core interfaces. This stability underlines the effectiveness of the QoS Policy Control Unit (QPCU) in enforcing URLLC-grade traffic prioritization.
As illustrated in Figure 28, packet loss increases with bitrate for all cases, but the Z-AGF maintains the lowest loss ratio of only 0.13% at 20 Mbps and 2.7% at 30 Mbps compared to 4.4% for W-AGF. This reduction confirms that Z-AGF’s superior link stability and optimized flow control under high-load conditions.
Figure 29 demonstrates that Z-AGF sustains throughput above 99% efficiency across most bitrates, whereas W-AGF degrade to below 96% at higher loads. This highlights the improved bandwidth utilization achieved through local routing and the reduced signaling overhead. Overall, the combined results verify that the proposed Z-AGF with Local Breakout consistently enhances QoS by minimizing delay, loss, and jitter, while maintaining higher throughput stability. These improvements confirm its suitability for delay-sensitive and mission-critical applications within smart-campuses and industrial-IoT networks.

5.5. Functional and Resource Efficiency

Beyond latency and packet loss, Z-AGF significantly optimizes the resource usage. Figure 30 illustrates UPF CPU utilization across the architectures.
Figure 30. UPF CPU utilization across architectures. Z-AGF offloading keeps UPF nearly idle during local traffic handling.
The UPF CPU load decreased from 38.7% at the baseline to less than 1.2% under Z-AGF offloading. This demonstrates the efficiency of the edge processing through the User-Plane Enhancement Function (UPEF). Table 4 summarizes the comparative functional capabilities.
Table 4. Feature Comparison of W-AGF, I-UPF, and Z-AGF Architectures.

5.6. Security, Trust, and Policy Governance in LBO

The Z-AGF strengthens security by performing local authentication, tunnel validation, and CU-supervised session management, reducing exposure to core-network threats. Persistent NAS context caching prevents spoofing and hijacking during mobility, while the UPEF and LDN enforce data isolation and a zero-trust posture across departments.
To prevent rogue access or forged mobility signaling, FN-RG identity, L2TP tunnel parameters, and inter-Z-AGF mobility updates are cryptographically bound to the 5GC/NAS-authenticated context and transported over secure channels (e.g., IPSec/TLS), ensuring that unauthenticated devices, hijacked tunnels, or spoofed mobility events are rejected at the Z-AGF boundary. To maintain policy and charging integrity, Z-AGF integrates with PCF and CHF for localized enforcement equivalent to core processing. NEF/AF coordination ensures lawful exposure of network services and controlled application access. Overall, this LBO design combines low-latency routing with secure, trusted, and standards-aligned governance for N5GC devices in private 5G O-RAN environments.

5.7. Key Findings

The results confirm that Z-AGF substantially enhances the overall system performance while reducing network load and latency. The key observed improvements include the following:
  • Up to 45.6% latency reduction during handovers.
  • 69% packet loss reduction and 98.1% session continuity.
  • 85.6% reduction of RTT for local communications under LBO.
  • 98.8% UPF idle rate, validating the effective local offloading.
Overall, the proposed Z-AGF demonstrates robust, scalable, and low-latency connectivity for Non-5G-Capable (N5GC) devices. The synergy between CU coordination, MBB mobility, and localized breakout provides an adaptable foundation for URLLC-driven smart campus and industrial IoT applications.

6. Conclusions and Future Work

This study presents the design, implementation, and evaluation of the Zone Access Gateway Function (Z-AGF),which is a CU-coordinated framework designed to enable seamless mobility, session persistence, and localized data processing for Non-5G-Capable devices within private 5G networks. By combining mobility management, QoS control, and Local Breakout functionality, Z-AGF bridges the wireless and wireline domains while preserving O-RAN and 3GPP compliance. Experimental results verified that Z-AGF substantially improved handover responsiveness, reduced packet loss, and enhanced throughput stability, confirming its suitability for latency-sensitive and mission-critical applications in smart-campus environments.
Future work will enhance Z-AGF with AI-based mobility prediction, RIC/xApp integration, and decentralized authentication to improve intelligence and security. Further exploration will target 6G and multi-RAT integration, including Wi-Fi 7 and LiFi, along with edge computing support for latency-sensitive applications. The Z-AGF framework thus paves the way toward intelligent, autonomous, and latency-optimized Non-Public Networks.

Author Contributions

Conceptualization, A.H. and S.Z.D.; methodology, A.H.; software, A.H. and S.Z.D.; validation, J.-T.W., A.H. and S.Z.D.; formal analysis, A.H.; investigation, S.Z.D.; resources, J.-T.W.; data curation, A.H. and S.Z.D.; writing—original draft preparation, A.H.; writing—review and editing, A.H.; visualization, S.Z.D.; supervision, J.-T.W.; project administration, J.-T.W.; funding acquisition, J.-T.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Science and Technology Council (NSTC), Taiwan, under Grant No. NSTC-113-2221-E-011-067. The support of the NSTC is gratefully acknowledged.

Data Availability Statement

The dataset used in this study is publicly available in onedrive in hackmd at [42].

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
3GPPThird Generation Partnership Project
5GC|5GS5th Generation Core|5th Generation System
5G-RG5th Generation Residential Gateway
AGF|AFAccess Gateway Function|Application Function
AS|AMFAccess Stratum|Access and Mobility Management Function
ATSSSAccess Traffic Steering, Switching and Splitting
AUN3Authenticable Non-3GPP Device
AUSFAuthentication Server Function
BBFBroadband Forum
BBMBreak-Before-Make
CDFCumulative Distribution Function
CHAPChallenge-Handshake Authentication Protocol
CPControl Plane
CPECustomer Premises Equipment
CUCentralized Unit
D2DDevice-to-Device
DHCPDynamic Host Configuration Protocol
DLDown Link
DUDistributed Unit
DNData Network
DOCSISData Over Cable Systems Interface Specifications
DSLDigital Subscriber Line
F1APF1 Application Protocol
FN-RGFixed Network Residential Gateway
FMCFixed-Mobile Convergence
FWAFixed Wireless Access
GPONGigabit Passive Optical Network
GTP-UGPRS Tunneling Protocol - User Plane
GLIGlobal Line Identifier
gNBNext-Generation Node B
IoTInternet of Things
IP/IPCPInternet Protocol/IP Control Protocol
IPV6CPIPV6 Control Protocol
IPoEInternet Protocol over Ethernet
I-UPFIntermediate-UPF
ISPInternet Service Provider
MACMedia Access Control
MBBMake-Before-Break
N5GCNon-5G Capable
NASNon-Access Stratum
NAUN3Non-Authenticable Non-3GPP Device
NEFNetwork Exposure Function
NFNetwork Function
NGAPNext-Generation Application Protocol
NG-RANNext-Generation Radio Access Network
NICNetwork Interface Card
NPNNon-Public Network
NRNew Radio
NRFNetwork Slice Selection Function
NSSFNetwork Exposure Function
L2TPLayer 2 Tunneling Protocol
LACL2TP Access Concentrator
LBOLocal Breakout
LCPLink Control Protocol
LDNLocal Data Network
LNSL2TP Network Server
L-W-CP/UPLegacy Wireline Access Control/User Plane Protocol
PCFPolicy Control Function
PDUPacket Data Unit
PNPublic Network
PNI-NPNPublic Network Integrated NPN
PPPPoint-to-Point Protocol
PPPoEPoint-to-Point Protocol over Ethernet
PDCP-CPacket Data Convergence Protocol - Control
PDCP-UPacket Data Convergence Protocol - User
PHYPhysical
PSA-UPFPDU Session Anchor - UPF
QoSQuality of Service
RANRadio Access Network
RGResidential Gateway
RLCRadio Link Control
RRCRadio Resource Control
RTTRound-Trip Time
RURadio Unit
SUPISubscription Permanent Identifier
SCCRQStart-Control-Connection-Request
SCTPStream Control Transmission Protocol
SDAPService Data Adaptation Protocol
SMFSession Management Function
SNPNStandalone Non-Public Network
UDMUnified Data Management
UDPUser Datagram Protocol
UEUser Equipment
UP/ULUser Plane/Up Link
UPF/UPEFUser Plane Function/User Plane Extension Function
W-5GANWireline 5G Access Network
W-AGFWireline Access Gateway Function
W-CP/UPWireline Access Control/User Plane Protocol
WWCWireless Wireline Convergence
XGS-PON10-Gigabit Symmetric Passive Optical Network
Z-AGFZone-Access Gateway Function
Z-CUZone-Centralized Unit

References

  1. Trick, U. 5G: An Introduction to the 5th Generation Mobile Networks; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
  2. 3GPP TS 23.501 v17.9.0; System Architecture for the 5G System (5GS). 3GPP: Valbonne, France, 2024.
  3. Recommendation Y.3101; Framework of IMT-2020 Network Requirements. ITU-T: Paris, France, 2022.
  4. Broadband Forum. Access Gateway Function Functional Requirements for 5G; BBF TR-456 Issue 2; Broadband Forum: Fremont, CA, USA, 2023. [Google Scholar]
  5. 3GPP TS 23.316 v17.6.0; Access to the 5G Core via Fixed Access Networks. 3GPP: Valbonne, France, 2023.
  6. Broadband Forum. Functional Requirements for Hybrid Wireline-Wireless Networks; BBF TR-456 Corrigendum 1; Broadband Forum: Fremont, CA, USA, 2024. [Google Scholar]
  7. O-RAN.WG1.Architecture-v10.00; O-RAN Architecture Description. O-RAN Alliance: Alfter, Germany, 2023.
  8. 3GPP TS 23.502 v17.7.0; Procedures for the 5G System (5GS). 3GPP: Valbonne, France, 2024.
  9. 3GPP TS 29.502 v17.4.0; Session Management Services for the 5G System (SMF). 3GPP: Valbonne, France, 2023.
  10. Wu, J.; Zhang, L. MEC-Enabled Local Breakout for Low-Latency Services in 5G Networks. IEEE Access 2023, 11, 45678–45689. [Google Scholar]
  11. Sharma, A.; Choi, S. Low-Latency Path Optimization in Distributed UPF Architectures. IEEE Trans. Netw. Serv. Manag. 2023, 20, 1001–1012. [Google Scholar]
  12. Zhao, M.; Lee, Y.; Lin, P. Performance Analysis of MEC-Based Local Breakout in Edge 5G. IEEE Commun. Mag. 2023, 61, 70–77. [Google Scholar]
  13. Chen, Y.; Liu, J. O-RAN-Based Latency Benchmarking for 5G Private Networks. IEEE Access 2024, 12, 99901–99912. [Google Scholar]
  14. Broadband Forum. WWC Scenarios and Deployment Guidelines; BBF Report; Broadband Forum: Fremont, CA, USA, 2024. [Google Scholar]
  15. Li, R.; Peng, M.; Wang, C. Enhancing Mobility Management in O-RAN through CU Coordination. IEEE Commun. Mag. 2023, 61, 88–95. [Google Scholar]
  16. 3GPP TS 38.401 v17.4.0; NG-RAN Architecture and Functional Split. 3GPP: Valbonne, France, 2023.
  17. 3GPP TS 38.471 v17.5.0; F1 Application Protocol (F1AP). 3GPP: Valbonne, France, 2023.
  18. 3GPP TS 38.472 v17.3.0; Signaling Procedures for F1AP. 3GPP: Valbonne, France, 2023.
  19. 3GPP TS 38.413 v17.7.0; NGAP Protocol for 5GS. 3GPP: Valbonne, France, 2024.
  20. IETF. 5WE Encapsulation for Fixed Access Integration; RFC 8822; IETF: Vienna, Austria, 2021. [Google Scholar]
  21. Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions. IEEE Commun. Surv. Tutor. 2020, 22, 196–248. [Google Scholar] [CrossRef]
  22. Open5GS Project. Open Source 5G Core Network. Available online: https://open5gs.org (accessed on 25 October 2025).
  23. 3GPP TS 22.261 v17.2.0; Service Requirements for the 5G System (Stage 1). 3GPP: Valbonne, France, 2023.
  24. Broadband Forum. WWC Progress Report; BBF Technical Update; Broadband Forum: Fremont, CA, USA, 2024. [Google Scholar]
  25. CableLabs. 5G WWC Core Architecture Overview. Technical Report. 2023. Available online: https://www.cablelabs.com/ (accessed on 25 October 2025).
  26. Ren, L.; Xu, K. AI-Driven RIC/xApp Integration for Intelligent 6G Networks. IEEE Netw. 2024, 38, 55–62. [Google Scholar]
  27. Broadband Forum. WT-456: AGF Requirements for 5G RG/FN-RG; BBF Working Text; Broadband Forum: Fremont, CA, USA, 2023. [Google Scholar]
  28. 3GPP TS 24.502 v17.5.0; Non-Access Stratum (NAS) Protocol for 5GS. 3GPP: Valbonne, France, 2024.
  29. SCTE–ISBE. Authentication and Key Management for WWC Access. Technical Report. 2023. Available online: https://www.scte.org/ (accessed on 25 October 2025).
  30. 3GPP. 5G System Architecture Update; Release 17 Summary; 3GPP: Valbonne, France, 2024. [Google Scholar]
  31. Foukas, X.; Marina, M.K. 3GPP Core Network Evolution Toward Access-Agnostic 5G Systems. IEEE J. Sel. Areas Commun. 2022, 40, 1182–1196. [Google Scholar]
  32. Yousaf, F.; Fontanelli, P.; Iovanna, P.; Costa-Requena, J. A Survey on Converged Fixed-Mobile Access in 5G. IEEE Commun. Surv. Tutor. 2021, 23, 1954–1985. [Google Scholar]
  33. Ruffini, M.; Kaminski, N.; Marchetti, N.; Doyle, L.; Marquez-Barja, J.M. Optical and wireless network convergence in 5G systems—An experimental approach. J. Light. Technol. 2017, 35, 535–548. [Google Scholar] [CrossRef]
  34. Park, S.; Kim, Y. Experimental Evaluation of OAI and Open5GS Integration in Private 5G Networks. IEEE Access 2024, 12, 90900–90911. [Google Scholar]
  35. Nguyen, T.; Huang, P. Optimizing Distributed User Plane in Private 5G Networks. IEEE Access 2024, 12, 120340–120351. [Google Scholar]
  36. UERANSIM Team. 5G UE and RAN Simulator. Available online: https://github.com/aligungr/UERANSIM (accessed on 25 October 2025).
  37. Roaring Penguin. RP-PPPoE: PPP Over Ethernet. Available online: http://www.roaringpenguin.com/products/pppoe (accessed on 25 October 2025).
  38. OpenAirInterface Software Alliance. 5G RAN & Core Platforms. Available online: https://openairinterface.org (accessed on 25 October 2025).
  39. Internet Systems Consortium (ISC). ISC DHCP Server. Available online: https://www.isc.org/dhcp/ (accessed on 25 October 2025).
  40. Xelerance. xl2tpd: L2TP Daemon. Available online: https://github.com/xelerance/xl2tpd (accessed on 25 October 2025).
  41. MongoDB Inc. MongoDB Community Server. Available online: https://www.mongodb.com/try/download/community (accessed on 25 October 2025).
  42. Hitayezu, A. Zone-Access Gateway Function Data. Available online: https://hackmd.io/@rkT12RG1TWOl4CBfOlDE4w/BJ4nWnNcA (accessed on 9 November 2025).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.