An Introduction to 5G - Christopher Cox - E-Book

An Introduction to 5G E-Book

Christopher Cox

0,0
100,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

A comprehensive and approachable introduction to 5G and 5G-Advanced

Written by a noted expert on the subject, this Second Edition of An Introduction to 5G delivers a comprehensive, system-level guide to 5G and 5G-Advanced.

Building on the foundations laid in the First Edition, the topics explored include the market and use cases for 5G-Advanced; the architectures of the next generation radio access network, open radio access networks and the 5G core; the principles of radio transmission, millimeter waves and MIMO antennas; the architecture and operation of the 5G New Radio; the implementation of network function services by means of HTTP/2; and the signaling procedures that govern the end-to-end operation of the system.

This Second Edition has been thoroughly expanded and updated for 3GPP Release 18, to cover the new capabilities introduced under the name of 5G-Advanced. There are new chapters on:

  • The foundations of 5G-Advanced, including non-terrestrial networks, multicast/broadcast services, wireless backhauling, unlicensed spectrum, and artificial intelligence and machine learning
  • The Internet of Things, including time-sensitive communications, non-public networks, edge computing, and massive machine-type communications
  • Device-to-device communications on the 5G sidelink, in support of vehicle, aircraft and proximity-based services
  • The new features being introduced in 3GPP Release 19, and the expected applications, technologies and performance capabilities of 6G

An Introduction to 5G is written for engineering professionals in mobile telecommunications, for those in non-technical roles such as management, marketing and intellectual property, and for students. It requires no more than a basic understanding of mobile communications, and includes detailed references to the underlying 3GPP specifications for 5G. The book’s approach provides a comprehensive, end-to-end overview of the 5G standard, which enables readers to move on with confidence to the more specialized texts and to the specifications themselves.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 1047

Veröffentlichungsjahr: 2025

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Table of Contents

Title Page

Copyright Page

Dedication Page

Preface

Acknowledgements

List of Abbreviations

1 Introduction

1.1 Architecture of a Mobile Telecommunication System

1.2 History of Mobile Telecommunications

1.3 Technologies for 5G

1.4 The 3GPP 5G System

1.5 Enhanced Mobile Broadband

1.6 Massive Machine-type Communications

1.7 Ultra-reliable Low-latency Communication

References

2 Architecture of the Core Network

2.1 The Evolved Packet Core

2.2 The 5G Core Network

2.3 Network Areas and Identities

2.4 State Diagrams

2.5 Network Slicing

2.6 Non-3GPP Access to the 5G Core

2.7 Signalling Protocols

2.8 The Hypertext Transfer Protocol

2.9 Example Network Function Services

References

3 Architecture of the Radio Access Network

3.1 The Evolved UMTS Terrestrial Radio Access Network

3.2 The Next-generation Node B

3.3 Architectural Options

3.4 Network Areas and Identities

3.5 RRC State Diagram

3.6 Signalling Protocols

3.7 Open Radio Access Networks

References

4 Spectrum, Antennas and Propagation

4.1 Radio Spectrum

4.2 Antennas and Propagation

4.3 Radio Propagation Issues for Millimetre Waves

4.4 Multipath, Fading and Coherence

References

5 Digital Signal Processing

5.1 Modulation and Demodulation

5.2 Radio Transmission in a Mobile Cellular Network

5.3 Orthogonal Frequency Division Multiple Access

5.4 Other Features of OFDMA

5.5 Signal-processing Issues for 5G

5.6 Error Management

References

6 Multiple-antenna Techniques

6.1 Beamforming

6.2 Beamforming at the gNB

6.3 Beamforming at the Mobile

6.4 Beam Management

6.5 Spatial Multiplexing

6.6 Multiple-user MIMO

6.7 Massive MIMO

6.8 Single-user MIMO

6.9 Multipoint Transmission and Reception

References

7 Architecture of the 5G New Radio

7.1 Air Interface Protocol Stack

7.2 Frequency Bands and Combinations

7.3 Frequency Domain Structure

7.4 Time Domain Structure

7.5 Multiple Antennas

7.6 Data Transmission

References

8 Cell Acquisition

8.1 Acquisition Procedure

8.2 Resource Mapping

8.3 Acquisition of the SS/PBCH Block

8.4 System Information

References

9 Random Access

9.1 Physical Random Access Channel

9.2 Random Access Procedure

9.3 Variations on the Random Access Procedure

References

10 Link Adaptation

10.1 CSI Reference Signals

10.2 Channel State Information

10.3 Physical Uplink Control Channel

10.4 Sounding

References

11 Data Transmission and Reception

11.1 Introduction

11.2 Transmission and Reception of the PDCCH

11.3 Scheduling Messages

11.4 Transmission and Reception of the PUSCH and PDSCH

11.5 Reference Signals

11.6 Hybrid ARQ Acknowledgements

11.7 Related Procedures

11.8 Performance of 5G

References

12 Air Interface Layer 2

12.1 Medium Access Control

12.2 Radio Link Control

12.3 Packet Data Convergence Protocol

12.4 Service Data Adaptation Protocol

References

13 Registration Procedures

13.1 Power-on Sequence

13.2 Network and Cell Selection

13.3 RRC Connection Establishment

13.4 Registration Procedure

13.5 Deregistration Procedure

References

14 Security

14.1 Security Principles

14.2 Network Access Security

14.3 Network Access Security Procedures

14.4 Network Domain Security

14.5 Service-based Architecture Domain Security

References

15 Session Management, Policy and Charging

15.1 Types of PDU Session

15.2 Quality of Service

15.3 Implementation of PDU Sessions

15.4 Policy and Charging Control Architecture

15.5 PDU Session Management Procedures

References

16 Mobility Management in RRC_CONNECTED

16.1 Introduction to RRC_CONNECTED

16.2 Measurement Configuration and Reporting

16.3 Handover Procedures

16.4 Dual Connectivity Procedures

16.5 State Transitions out of RRC_CONNECTED

References

17 Mobility Management in RRC_IDLE

17.1 Introduction to RRC_IDLE

17.2 Cell Reselection Procedures

17.3 Registration Updating

17.4 State Transitions out of RRC_IDLE

References

18 Mobility Management in RRC_INACTIVE

18.1 Introduction to RRC_INACTIVE

18.2 Mobility Management

18.3 State Transitions

18.4 Small Data Transmission in RRC_INACTIVE

References

19 Inter-operation with the Evolved Packet Core

19.1 Inter-operation Architectures

19.2 Registration Modes

19.3 Use of the Migration Architecture

19.4 Interworking Without N26

19.5 Interworking with N26

References

20 Foundations of 5G-Advanced

20.1 Location Services

20.2 Integrated Access and Backhaul

20.3 Use of Unlicensed Spectrum

20.4 Multicast and Broadcast Services

20.5 Non-terrestrial Networks

20.6 Network Automation, Artificial Intelligence and Machine Learning

20.7 Service Enabler Architecture Layer

References

21 The Internet of Things

21.1 Time-sensitive Communications

21.2 Non-public Networks

21.3 5G Virtual Networks

21.4 Edge Computing

21.5 Massive Machine-type Communications

21.6 Messaging Services

References

22 Vehicle Communications and the Sidelink

22.1 Vehicle-to-Everything (V2X) Communications

22.2 Uncrewed Aerial Vehicles

22.3 Proximity-based Services

22.4 Architecture of the Sidelink

22.5 Sidelink Timing Synchronization

22.6 Sidelink Transmission and Reception

22.7 Access Stratum Procedures for the Sidelink

22.8 Operation of Sidelink Communication

22.9 Operation of ProSe Direct Discovery

References

23 From 5G-Advanced to 6G

23.1 Release 19

23.2 6G

References

Further Reading

Index

End User License Agreement

List of Tables

Chapter 1

Table 1.1 3GPP specification releases for UMTS, LTE and 5G.

Table 1.2 3GPP specification series used by UMTS, LTE and 5G.

Table 1.3 Technical performance requirements for 5G.

Table 1.4 Mapping between the 5G architectural options and the contents of t...

Chapter 2

Table 2.1 Standardized values of the slice/service type.

Table 2.2 HTTP/2 methods used by the 5G core network.

Chapter 3

Table 3.1 Signalling radio bearers.

Chapter 7

Table 7.1 Logical channels.

Table 7.2 Transport channels.

Table 7.3 Control information.

Table 7.4 Physical channels.

Table 7.5 Physical signals.

Table 7.6 Frequency bands in frequency range 1.

Table 7.7 Frequency bands in frequency range 2.

Table 7.8 Numerologies.

Table 7.9 Maximum transmission bandwidth configurations in frequency range 1...

Table 7.10 Maximum transmission bandwidth configurations in frequency range ...

Table 7.11 Values of the global frequency raster and the channel raster.

Table 7.12 Details of the frame structure for the different numerologies.

Table 7.13 Uplink antenna ports.

Table 7.14 Downlink antenna ports.

Chapter 8

Table 8.1 Summary of the acquisition procedure.

Table 8.2 Values of the global synchronization raster.

Table 8.3 Organization of the system information in Release 15.

Table 8.4 Additional system information blocks in Releases 16–18.

Chapter 9

Table 9.1 Number of PUSCH resource blocks occupied by the PRACH.

Chapter 10

Table 10.1 Interpretation of the channel quality indicator.

Table 10.2 Valid combinations of time domain behaviour for the measurement a...

Table 10.3 PUCCH formats.

Chapter 11

Table 11.1 DCI formats.

Table 11.2 Radio network temporary identifiers in Release 15.

Table 11.3 Types of PDCCH search space.

Table 11.4 Contents of DCI formats 0_0 and 1_0.

Table 11.5 Valid choices for the start and length indicator value

Table 11.6 Minimum PUSCH preparation time.

Table 11.7 Minimum PDSCH processing time.

Table 11.8 Peak spectral efficiency of 5G.

Table 11.9 Test conditions for the 3GPP simulations of 5G and LTE.

Chapter 12

Table 12.1 MAC control elements in Release 15.

Chapter 15

Table 15.1 Quality-of-service (QoS) parameters.

Table 15.2 Standardized values of the 5G QoS identifier: (1) GBR QoS flows....

Table 15.3 Standardized values of the 5G QoS identifier: (2) non-GBR QoS flo...

Table 15.4 Standardized values of the 5G QoS identifier: (3) delay-critical ...

Table 15.5 Minimum set of 5G QoS identifiers that expected for each standard...

Chapter 16

Table 16.1 Measurement events involving 5G cells alone.

Table 16.2 Measurement events involving other radio access technologies.

Chapter 20

Table 20.1 Channel access priority class.

Table 20.2 Example parameters for terrestrial and non-terrestrial platforms....

Table 20.3 Satellite bands in frequency range 1.

Table 20.4 Satellite bands in frequency range 2.

Chapter 21

Table 21.1 Capabilities of eMTC and NB-IoT devices.

Table 21.2 Capabilities of RedCap and eRedCap devices.

Chapter 22

Table 22.1 PC5 quality-of-service parameters.

Table 22.2 Standardized PQI values for vehicle communications.

Table 22.3 Standardized PQI values for aircraft communications.

Table 22.4 Standardized PQI values for proximity-based services.

Table 22.5 Sidelink signalling radio bearers.

Table 22.6 Sidelink logical channels.

Table 22.7 Sidelink transport channels.

Table 22.8 Sidelink control information.

Table 22.9 Sidelink physical channels.

Table 22.10 Sidelink physical signals.

Table 22.11 Sidelink frequency bands.

Table 22.12 Sidelink antenna ports.

Table 22.13 SCI formats.

Table 22.14 Contents of SCI format 1-A in licensed spectrum.

Table 22.15 Contents of SCI formats 2-A and 2-B in licensed spectrum.

Table 22.16 Sidelink channel access priority class.

Chapter 23

Table 23.1 Estimated performance targets for IMT-2030.

List of Illustrations

Chapter 1

Figure 1.1 Architecture of a mobile telecommunication system.

Figure 1.2 Example of base stations with two carrier frequencies and three s...

Figure 1.3 Examples of the communication protocols used by the internet.

Figure 1.4 High-level architectures of GSM, UMTS and LTE.

Figure 1.5 Architecture of a telecommunication network using software-define...

Figure 1.6 High-level architectures of LTE and 5G.

Figure 1.7 Architectural options for 5G.

Figure 1.8 Monthly traffic due to different mobile telecommunication applica...

Figure 1.9 Numbers of subscriptions to different mobile telecommunication te...

Figure 1.10 Quarterly revenue earned by UK mobile network operators up to th...

Figure 1.11 Numbers of cellular IoT devices using different mobile telecommu...

Chapter 2

Figure 2.1 Architecture of the evolved packet core.

Figure 2.2 Representation of the 5G core network using reference points.

Figure 2.3 Representation of the 5G core network using service-based interfa...

Figure 2.4 PDU sessions and QoS flows.

Figure 2.5 Roaming architecture using home-routed traffic.

Figure 2.6 Roaming architecture using local breakout.

Figure 2.7 Data storage architectures.

Figure 2.8 Registration management state diagram.

Figure 2.9 Connection management state diagram.

Figure 2.10 Network slicing architecture.

Figure 2.11 Architecture for untrusted non-3GPP access to the 5G core networ...

Figure 2.12 Signalling protocols used by the 5G core network.

Figure 2.13 PFCP association setup procedure.

Figure 2.14 Example of an HTTP/2 request and response.

Figure 2.15 Example of a JSON object.

Figure 2.16 Network function service registration procedure.

Figure 2.17 Network function service discovery procedure.

Figure 2.18 Procedures for network function service subscription and notific...

Figure 2.19 Procedure for delegated network function service discovery.

Chapter 3

Figure 3.1 Architecture of the evolved UMTS terrestrial radio access network...

Figure 3.2 Carrier aggregation.

Figure 3.3 Dual connectivity.

Figure 3.4 Internal architecture of the gNB.

Figure 3.5 Example architecture for the deployment of the gNB. AMF, access a...

Figure 3.6 Architectural options 1 and 3.

Figure 3.7 Architectural options 5 and 7.

Figure 3.8 Architectural options 2 and 4.

Figure 3.9 Data radio bearers.

Figure 3.10 5G radio resource control state diagram, for a mobile served by ...

Figure 3.11 Relationship between the 4G and 5G RRC state diagrams for a mobi...

Figure 3.12 Signalling protocols used by the next-generation radio access ne...

Figure 3.13 High-level O-RAN architecture.

Chapter 4

Figure 4.1 The electromagnetic spectrum.

Figure 4.2 Radiation pattern of a parabolic reflector antenna, with a diamet...

Figure 4.3 Benefit of using a base station antenna array in a high-frequency...

Figure 4.4 Non-line-of-sight communications using (a) diffraction and (b) re...

Figure 4.5 Example measurements of penetration loss at frequencies from 1 to...

Figure 4.6 Estimates of foliage losses due to different depths of vegetation...

Figure 4.7 Estimates of atmospheric losses due to absorption by the air.

Figure 4.8 Estimates of atmospheric losses due to rainfall.

Figure 4.9 Generation of constructive interference, destructive interference...

Figure 4.10 Examples of fading as a function of (a) position and (b) frequen...

Figure 4.11 Example used to estimate the relationship between angular spread...

Figure 4.12 Example used to estimate the relationship between delay spread a...

Chapter 5

Figure 5.1 Quadrature phase shift keying (QPSK). (a) Example QPSK waveform. ...

Figure 5.2 Example modulation schemes used by 5G.

Figure 5.3 Block diagram of the modulator in a wireless communication system...

Figure 5.4 Block diagram of the demodulator in a wireless communication syst...

Figure 5.5 Operation of FDD and TDD modes.

Figure 5.6 Division of the frequency band into subcarriers using OFDM.

Figure 5.7 Processing steps in an OFDM transmitter.

Figure 5.8 Processing steps in an OFDM receiver.

Figure 5.9 Block diagram of the OFDMA downlink.

Figure 5.10 Block diagram of the OFDMA uplink.

Figure 5.11 Frequency-specific scheduling in 5G.

Figure 5.12 Processing steps in an OFDM receiver, in which the information a...

Figure 5.13 Inter-symbol interference (ISI). (a) Creation of ISI in a multip...

Figure 5.14 Operation of the cyclic prefix on a single subcarrier.

Figure 5.15 Block diagram of a transmitter and receiver using hybrid ARQ wit...

Figure 5.16 Operation of a stop-and-wait re-transmission scheme using multip...

Figure 5.17 Operation of a selective re-transmission scheme.

Chapter 6

Figure 6.1 Constructive and destructive interference from a base station arr...

Figure 6.2 Radiation pattern from an array of (a) two, (b) four, (c) eight a...

Figure 6.3 Beam steering by means of a phase ramp.

Figure 6.4 Radiation pattern from an array of four antennas, with a spacing ...

Figure 6.5 Analogue spatial filtering by means of a phase ramp: (a) transmis...

Figure 6.6 Digital beamforming by means of antenna-specific amplitude scalin...

Figure 6.7 Example radiation patterns from an array of four antennas using d...

Figure 6.8 Partly connected architecture for hybrid beamforming.

Figure 6.9 Example radiation patterns from a hybrid antenna array: (a) spati...

Figure 6.10 Example deployments and antenna configurations. (a) Traditional ...

Figure 6.11 Digital precoding and analogue spatial filtering at the mobile....

Figure 6.12 Reference signal transmission for beam management, if the CSI-RS...

Figure 6.13 Beam pair selection.

Figure 6.14 Principles of spatial multiplexing.

Figure 6.15 Uplink multiple-user MIMO.

Figure 6.16 Example radiation patterns from an array of four antennas using ...

Figure 6.17 Downlink multiple-user MIMO.

Figure 6.18 Massive MIMO.

Figure 6.19 Single-user MIMO.

Figure 6.20 Single-user MIMO in a sparse multipath environment.

Chapter 7

Figure 7.1 Air interface protocol stack for architectural option 2.

Figure 7.2 Air interface protocol stack in cases of dual connectivity.

Figure 7.3 Uplink information flows.

Figure 7.4 Downlink information flows.

Figure 7.5 Frequency bands used by operational and planned 5G networks in Ma...

Figure 7.6 Example common resource blocks in a channel bandwidth of 10 MHz....

Figure 7.7 Frames, subframes and slots.

Figure 7.8 Slots and symbols when using the (a) normal and (b) extended cycl...

Figure 7.9 Example of a TDD configuration.

Figure 7.10 Transport channel processing: (a) transmission and (b) reception...

Figure 7.11 Physical channel processing: (a) transmission and (b) reception....

Figure 7.12 Analogue processing: (a) transmission and (b) reception.

Chapter 8

Figure 8.1 Analogue beam selection during the acquisition procedure.

Figure 8.2 Internal structure of an SS/PBCH block, using a physical cell ide...

Figure 8.3 Timing patterns for the SS/PBCH blocks when using licensed spectr...

Figure 8.4 Timing patterns for the SS/PBCH blocks when using licensed spectr...

Chapter 9

Figure 9.1 Durations of the long PRACH formats.

Figure 9.2 Durations of the short PRACH formats.

Figure 9.3 Four-step contention-based random access procedure.

Figure 9.4 Two-step contention-based random access procedure.

Chapter 10

Figure 10.1 Physical channel processing for the CSI reference signal: (a) tr...

Figure 10.2 Example resource mappings for the CSI reference signal on port 3...

Figure 10.3 Interpretations of the CSI reference signal.

Figure 10.4 Non-repeated and repeated transmissions of the resources in a no...

Figure 10.5 Types of PMI codebook in Release 15.

Figure 10.6 Transmission of uplink control information on the PUCCH.

Figure 10.7 Physical channel processing for the sounding reference signal: (...

Figure 10.8 Example resource mapping for the sounding reference signal, usin...

Figure 10.9 Interpretations of the sounding reference signal.

Chapter 11

Figure 11.1 Data transmission procedures for the downlink and uplink.

Figure 11.2 Transmission of downlink control information (DCI) on the PDCCH:...

Figure 11.3 Example of a control resource set.

Figure 11.4 Example time domain resource assignments for the uplink. (a) Slo...

Figure 11.5 Transport channel processing for the (a) DL-SCH and (b) UL-SCH....

Figure 11.6 Physical channel processing for the (a) PDSCH and (b) PUSCH.

Figure 11.7 Example resource mappings for the DM-RS using downlink port 1000...

Figure 11.8 Example resource mappings for the PDSCH and PUSCH using mapping ...

Figure 11.9 Example time domain resource assignments for the downlink. (a) S...

Figure 11.10 Peak spectral efficiencies of LTE and 5G.

Figure 11.11 Average spectral efficiencies of LTE and 5G.

Chapter 12

Figure 12.1 Architecture of the mobile's medium access control protocol. BCH...

Figure 12.2 Structure of a MAC PDU.

Figure 12.3 Radio link control protocol.

Figure 12.4 Architecture of the RLC protocol in transparent mode.

Figure 12.5 Architecture of the RLC protocol in unacknowledged mode.

Figure 12.6 Structure of an RLC data PDU in unacknowledged mode.

Figure 12.7 Structure of an RLC data PDU in acknowledged mode.

Figure 12.8 Architecture of the RLC protocol in acknowledged mode.

Figure 12.9 Architecture of the packet data convergence protocol.

Figure 12.10 PDCP status reporting and re-transmission procedures.

Figure 12.11 Architecture of the service data adaptation protocol.

Chapter 13

Figure 13.1 Overview of the power-on procedures in architectural option 2.

Figure 13.2 RRC connection establishment procedure.

Figure 13.3 Initial UE message procedure.

Figure 13.4 Registration procedure if the AMF is unchanged.

Figure 13.5 Registration procedure if the new AMF is different from the old ...

Figure 13.6 Registration procedure, including re-allocation of the AMF.

Figure 13.7 Mobile-initiated deregistration procedure.

Chapter 14

Figure 14.1 Network access security architecture.

Figure 14.2 Network access security keys.

Figure 14.3 5G authentication and key agreement procedure.

Figure 14.4 Non-access stratum security mode command procedure.

Figure 14.5 Access stratum security mode command procedure.

Figure 14.6 Ciphering.

Figure 14.7 Integrity protection.

Figure 14.8 Network domain security architecture.

Figure 14.9 Service-based interface security architecture.

Figure 14.10 Principles of secure message delivery over N32-f.

Figure 14.11 Procedure for secure message delivery over N32-f.

Chapter 15

Figure 15.1 Packet flows, service data flows and QoS flows.

Figure 15.2 Example implementation of a PDU session using QoS flows, bearers...

Figure 15.3 User plane protocols.

Figure 15.4 End-to-end user plane protocol stack.

Figure 15.5 Multiple PDU session anchors.

Figure 15.6 Representation of the policy and charging control architecture u...

Figure 15.7 Representation of the policy and charging control architecture u...

Figure 15.8 Converged architecture for charging and billing.

Figure 15.9 PDU session establishment procedure. (1) Initiation.

Figure 15.10 PDU session establishment procedure. (2) Completion.

Figure 15.11 Interactions with the policy control function during PDU sessio...

Figure 15.12 Request for a packet flow with a specific quality of service....

Figure 15.13 Addition of a PDU session anchor.

Chapter 16

Figure 16.1 Measurement configuration and reporting procedure.

Figure 16.2 Forwarding of measurement configuration and reporting messages b...

Figure 16.3 Xn-based handover procedure in the absence of dual connectivity....

Figure 16.4 Path switch procedure.

Figure 16.5 Addition of a secondary node.

Figure 16.6 QoS flow mobility procedure.

Figure 16.7 Access network release procedure.

Figure 16.8 Suspension of the RRC connection.

Chapter 17

Figure 17.1 Example of an inactive PDU session.

Figure 17.2 Registration update procedure if the AMF is unchanged.

Figure 17.3 Mobile-triggered service request procedure for a mobile initiall...

Figure 17.4 Network-triggered service request procedure, for a mobile initia...

Chapter 18

Figure 18.1 Example of a suspended PDU session.

Figure 18.2 RAN-based notification area update procedure.

Figure 18.3 Access network release procedure for a mobile initially in RRC_I...

Figure 18.4 Mobile-triggered resumption of the RRC connection. (1) Initiatio...

Figure 18.5 Mobile-triggered resumption of the RRC connection. (2) Completio...

Figure 18.6 Network-triggered resumption of the RRC connection.

Chapter 19

Figure 19.1 Architecture for migration from the evolved packet core.

Figure 19.2 Architecture for interworking with the evolved packet core.

Figure 19.3 Architecture for direct interworking between the UDM and the HSS...

Figure 19.4 Mobility to the evolved packet core using the migration architec...

Figure 19.5 RRC release with redirection using the migration architecture fo...

Figure 19.6 Mobility to the evolved packet core using the interworking archi...

Figure 19.7 Mobility to the evolved packet core using the N26 reference poin...

Figure 19.8 Mobility to the evolved packet core using the N26 reference poin...

Figure 19.9 Handover to the evolved packet core using the N26 reference poin...

Figure 19.10 Handover to the evolved packet core using the N26 reference poi...

Chapter 20

Figure 20.1 Representation of the location service architecture using servic...

Figure 20.2 Underlying architecture for integrated access and backhaul.

Figure 20.3 Example IAB architecture involving NR dual connectivity and a mu...

Figure 20.4 Mobile's access stratum protocol stack for the case of a single-...

Figure 20.5 Sources of interference for an in-band backhaul.

Figure 20.6 Network-controlled repeater architecture.

Figure 20.7 Example of uplink resource allocation type 2 for transmission on...

Figure 20.8 Example of dynamic channel access type 1 using a defer duration ...

Figure 20.9 Example of a location-dependent multicast MBS session.

Figure 20.10 Representation of the MBS architecture using service-based inte...

Figure 20.11 Satellite access architecture.

Figure 20.12 Delay and Doppler compensation during non-terrestrial radio acc...

Figure 20.13 Types of satellite beam.

Figure 20.14 Satellite backhaul architecture.

Figure 20.15 Representation of the network data analytics architecture using...

Figure 20.16 Representation of the SEAL architecture using reference points....

Chapter 21

Figure 21.1 Illustration of a real-time closed-loop wireless control system....

Figure 21.2 Architecture for time synchronization in 5G.

Figure 21.3 Integration of the 5G system with an IEEE time-sensitive network...

Figure 21.4 Architecture of a standalone NPN.

Figure 21.5 Example architecture of a public network integrated NPN.

Figure 21.6 Example of packet forwarding in a 5G virtual network.

Figure 21.7 Architecture for edge computing using session breakout.

Figure 21.8 Example procedure for edge application server discovery.

Figure 21.9 Example procedure for edge application server relocation.

Figure 21.10 Architecture of the edge enabler layer.

Figure 21.11 Architecture for SMS over the non-access stratum.

Chapter 22

Figure 22.1 Architecture for vehicle-to-everything (V2X) communications.

Figure 22.2 Example of PC5 unicast links.

Figure 22.3 Scope of the V2X layer.

Figure 22.4 Architecture for uncrewed aerial vehicles and aircraft-to-everyt...

Figure 22.5 Architecture for proximity-based services.

Figure 22.6 Scope of the ProSe layer.

Figure 22.7 Architectures for (a) ProSe UE-to-network relays and (b) ProSe U...

Figure 22.8 Sidelink protocol stack.

Figure 22.9 Sidelink information flows.

Figure 22.10 Propagation of timing synchronization information on the sideli...

Figure 22.11 Internal structure of a sidelink synchronization block using a ...

Figure 22.12 Procedure for sidelink transmission and reception.

Figure 22.13 Example sidelink resource mapping using the normal cyclic prefi...

Figure 22.14 Example sidelink resource mapping using the normal cyclic prefi...

Figure 22.15 Sidelink resource allocation mode 1.

Figure 22.16 Establishment of groupcast communications over PC5.

Figure 22.17 Establishment of a PC5 unicast link.

Figure 22.18 Open ProSe direct discovery using Model A.

Chapter 23

Figure 23.1 Intended 3GPP timeline for 6G, as published in March 2025.

Guide

Cover Page

Table of Contents

Title Page

Copyright Page

Dedication

Preface

Acknowledgements

List of Abbreviations

Begin Reading

Further Reading

Index

WILEY END USER LICENSE AGREEMENT

Pages

iii

iv

v

xxiii

xxiv

xxv

xxvii

xxviii

xxix

xxx

xxxi

xxxii

xxxiii

xxxiv

xxxv

xxxvi

xxxvii

xxxviii

xxxix

xl

xli

xlii

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

An Introduction to 5G

The New Radio, 5G Network, 5G Advanced and Beyond

Second Edition

Christopher Cox

Chris Cox Communications LtdCambridge, UK

This edition first published 2025© 2025 John Wiley & Sons Ltd

Edition HistoryJohn Wiley & Sons Ltd (1e, 2021)

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

The right of Christopher Cox to be identified as the author of this work has been asserted in accordance with law.

Registered OfficesJohn Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USAJohn Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

The manufacturer’s authorized representative according to the EU General Product Safety Regulation is Wiley-VCH GmbH, Boschstr. 12, 69469 Weinheim, Germany, e-mail: [email protected].

Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats.

Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of WarrantyWhile the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

Library of Congress Cataloging-in-Publication Data applied for

Hardback ISBN: 9781394284726

Cover design by WileyCover image: © Weiquan Lin/Getty Images

To Susie

Preface

This book is an introduction to fifth-generation (5G) mobile telecommunication systems and to the enhancements that have been made to those systems under the name of 5G-Advanced.

5G builds on earlier generations of mobile telecommunications, but it differs in several ways. It is designed for a wider range of applications than before: not only consumer applications such as voice, video and data, but also industrial applications such as machine-type communications. In turn, those applications have a wider range of requirements than before: some require a peak data rate of several gigabits per second, others require the delivery of data packets with delays as low as a few milliseconds, while others require a battery life of several years. To help meet those requirements, the network uses technologies such as network function virtualization, software-defined networking and network slicing to provide a flexible, underlying resource that can be easily reconfigured to support new requirements as they arise. In pursuit of higher data rates and higher system capacities, the air interface supports higher radio frequencies than previous generations have done and makes extensive use of multiple antennas.

There are many other books on 5G which contain detailed accounts of the underlying technologies, the likely applications, the system architecture and the air interface. The aim of this book is to complement them by offering an end-to-end, system-level perspective. It contains fewer details about individual topics than many of the others, but it is broader in scope, covering the requirements and architecture of 5G, the principles and implementation of the air interface, the signalling procedures within the network, and the new capabilities that have been added in 5G-Advanced. It is aimed at mobile telecommunication engineers who want an introduction to the architecture and operation of 5G, at those who are experts in one part of the system but who want to understand what is taking place elsewhere, and as a technical foundation for those in related roles such as management, marketing, intellectual property and consultancy.

The first few chapters cover the foundations. Chapter 1 reviews the history of mobile telecommunications and introduces the applications, requirements and key technical features of 5G. Chapter 2 covers the architecture of the core network and the signalling protocols that it uses, while Chapter 3 covers similar ground in the case of the radio access network.

The next three chapters address the underlying technologies that are used by the air interface. Chapter 4 reviews the use of radio spectrum and discusses the coverage issues that appear when operating at high radio frequencies. Chapter 5 reviews the techniques that are used for digital signal processing, for example modulation, demodulation, orthogonal frequency division multiple access and error correction. (Much of that chapter has been condensed from the author’s previous work, An Introduction to LTE.) Chapter 6 explains how 5G uses multiple antennas to compensate for the coverage problems that appear at high radio frequencies and to improve the system capacity when the radio frequency is low.

The next six chapters describe how the air interface is actually implemented. Chapter 7 is an introduction to the air interface, Chapter 8 describes the acquisition procedure in which a mobile discovers a nearby cell and Chapter 9 describes the random access procedure in which the mobile makes its initial communication. Chapter 10 covers the procedures for link adaptation, which compensate for changes in the amplitude and phase of the incoming radio signal, and help to control the use of multiple antennas. Chapter 11 addresses the procedures that are used for scheduling and data transmission, while Chapter 12 explains how the air interface’s higher-level protocols handle tasks such as scheduling and re-transmission.

We then move on to the end-to-end operation of 5G. Chapter 13 covers the procedures that a mobile runs when it switches on to discover a nearby cell and register with its chosen network. Chapter 14 addresses the security procedures in 5G, while Chapter 15 covers the procedures which connect a mobile to an external data network and which allow an external application server to monitor and influence its behaviour.

The next four chapters address different aspects of mobility management, in which the network keeps track of the mobile’s location and controls the cells with which it is communicating. Chapter 16 covers the procedures in a state known as RRC_CONNECTED, in which the mobile is carrying out normal communications with the network. Chapter 17 addresses the state of RRC_IDLE, in which the mobile is on standby, while Chapter 18 deals with the new state of RRC_INACTIVE, which is an optimization for low data rate communications. Chapter 19 covers the procedures used for inter-operation between the core networks of 4G and 5G.

The last four chapters address the enhancements that have been made to 5G in later releases of the specifications. Chapter 20 covers the general-purpose capabilities that form the foundations of 5G-Advanced, including location services, unlicensed spectrum, non-terrestrial networks, and artificial intelligence and machine learning. Chapter 21 focuses on system enhancements for the industrial internet of things and for massive machine-type communications. Chapter 22 addresses device-to-device communications on the 5G sidelink, as well as the vehicle, aircraft and proximity-based services that the sidelink helps to support. As the final topic, Chapter 23 reviews the enhancements that are planned for future releases of 5G and looks ahead to the introduction of a sixth generation of mobile telecommunications.

Like any technical subject, 5G uses a large number of acronyms and abbreviations. To help make the text readable, I have tried to strike a balance between the uses of abbreviations and text, for example by using ‘downlink’ in place of DL, but AMF in place of ‘access and mobility management function’. New terms are highlighted in italics throughout the text, and there is a full list of abbreviations at the start of the book.

Unavoidably, some of the topics are mathematical ones. Some previous knowledge of Fourier transforms would help the reader understand the discussion of orthogonal frequency division multiple access in Chapter 5. Similarly, some previous knowledge of matrices would help with the discussion of multiple antennas in Chapter 6, while familiarity with complex numbers would be helpful for both. However, I have attempted to make the maths as lightweight as possible and to explain the important concepts using English instead. The Bibliography contains some references for further reading.

Acknowledgements

My first acknowledgement is to the team at Wiley, for taking on the publication of this book and for guiding me through the writing and production process. I am particularly grateful for the support received from my Commissioning Editor, Sandra Grayson, from my Project Editors for the two editions of the book, Steve Fassioms, Kavipriya Ramachandran and Veena Rajendran, from my Production Editors, Juliet Booker and Srinivasan Kandasamy, from my Editorial Assistant, Becky Cowan, from my Copy-editor, Lesley Montford, and from the whole of the production team. I would also like to extend my appreciation to the directors and staff of Wray Castle Limited. My first exposure to 5G was as part of a contract to write training material on their behalf, and I am grateful for the opportunities that the work provided to extend my knowledge and understanding of the subject.

Particular thanks are due to Paul Mason, Jeff Cartwright, Tony Wakefield, Les Granfield and Matt Brenner for many valuable discussions about telecommunications in general and 5G in particular, to Ignacio Rodriguez Larrad, for providing the data on penetration losses underlying Figure 4.5, to David Herbert, for his guidance about the signalling protocols that are used by the internet, and to Arein Zarour and Nurudeen Salau, for highlighting issues with the first edition that I hope to have addressed in the second. I would also like to offer a big thank you to the delegates in my training classes, whose probing questions have so often proved the ideal trigger for learning new aspects of the technology. Nevertheless, the responsibility for any errors and omissions in the text, and for any lack of clarity in the explanations, is entirely my own.

Several diagrams in this book have been reproduced from the technical specifications for 5G, with permission from the European Telecommunications Standards Institute, © 2024. 3GPP™ TSs and TRs are the property of ARIB, ATIS, CCSA, ETSI, TSDSI, TTA and TTC who jointly own the copyright in them. They are subject to further modifications and are therefore provided to you ‘as is’ for information purposes only. Further use is strictly prohibited.

On a lighter note, I would like to thank the creators of the internet blocking application Cold Turkey for removing innumerable opportunities for procrastination and keeping me focused on the task. I would also like to thank the spirits of J.S. Bach and Frédéric Chopin for providing me with some more valuable diversions, and for reminding me that there are more things in life than mobile telecommunications.

My last and greatest thank you is to my beloved wife, Susie. The first edition of this book coincided with our engagement and marriage, while the intervening years have served to demonstrate the wisdom of those events. Her kindness, patience and understanding have been extraordinary throughout, and I dedicate this book to her.

List of Abbreviations

1G

First generation

2G

Second generation

3G

Third generation

3GPP

Third Generation Partnership Project

3GPP2

Third Generation Partnership Project 2

4G

Fourth generation

5G

Fifth generation

5G AKA

5G authentication and key agreement

5G-AN

5G access network

5GC

5G core network

5G-EIR

5G equipment identity register

5G-GUTI

5G globally unique temporary identity

5GMM

5G mobility management

5GS

5G system

5GSM

5G session management

5G-S-TMSI

5G S temporary mobile subscriber identity

5G-TMSI

5G temporary mobile subscriber identity

5QI

5G QoS identifier

6G

Sixth generation

A/D

Analogue to digital

A2X

Aircraft to everything

AAA

Authentication, authorization and accounting

AAS

Active antenna system

ABMF

Account balance management function

ADRF

Analytics data repository function

AES

Advanced Encryption Standard

AF

Application function

AGC

Automatic gain control

AI

Artificial intelligence

AI/ML

Artificial intelligence and machine learning

A-IoT

Ambient internet of things

AKA

Authentication and key agreement

AM

Acknowledged mode

AMBR

Aggregate maximum bit rate

AMF

Access and mobility management function

AMFI

AMF identifier

AMPS

Advanced Mobile Phone System

AN

Access network

AnLF

Analytics logical function

AoA

Angle of arrival

AoD

Angle of departure

API

Application programming interface

APN

Access point name

AR

Augmented reality

ARIB

Association of Radio Industries and Businesses

ARP

Allocation and retention priority

ARPF

Authentication credential repository and processing function

ARQ

Automatic repeat request

AS

Access stratum

ATIS

Alliance for Telecommunications Industry Solutions

ATSSS

Access traffic steering, switch and splitting

AuC

Authentication centre

AUSF

Authentication server function

AUTN

Authentication token

BAP

Backhaul adaptation protocol

BCCH

Broadcast control channel

BCH

Broadcast channel

BD

Billing domain

BLER

Block error ratio

BM-SC

Broadcast/multicast service centre

BPSK

Binary phase shift keying

BSF

Binding support function

BSR

Buffer status report

BTS

Base transceiver station

BWP

Bandwidth part

C2

Command and control

CA

Carrier aggregation

CAA

Civil Aviation Administration

CAG

Closed access group

CAPC

Channel access priority class

CBG

Code block group

CCCH

Common control channel

CCE

Control channel element

CCSA

China Communications Standards Association

CDM

Code division multiplexing

CDMA

Code division multiple access

CDR

Charging data record

CE

Control element

CGF

Charging gateway function

CHF

Charging function

CHO

Conditional handover

CIoT

Cellular internet of things

cIPX

Consumer’s IPX

CI-RNTI

Cancellation indication RNTI

CJT

Coherent joint transmission

CLI

Cross-link interference

CLI-RSSI

CLI received signal strength indicator

CM

Connection management

CMAS

Commercial mobile alert system

CN

Core network

CNC

Centralized network configuration

cNF

Consumer’s network function

CoMP

Coordinated multi-point

CORESET

Control resource set

CP

Control plane

or

Cyclic prefix

CPRI

Common Public Radio Interface

CQI

Channel quality indicator

C-RAN

Centralized RAN

or

Cloud RAN

CRB

Common resource block

CRC

Cyclic redundancy check

CRI

CSI-RS resource indicator

CriC

Critical communication

C-RNTI

Cell RNTI

CRUD

Create, read, update and delete

CS

Circuit switched

cSEPP

Consumer’s SEPP

CSFB

Circuit-switched fallback

CSI

Channel state information

CSI-IM

CSI interference measurement

CSI-RS

CSI reference signal

CS-RNTI

Configured scheduling RNTI

CTF

Charging trigger function

CU

Central unit

D/A

Digital to analogue

D2D

Device-to-device

DAPS

Dual active protocol stack

dB

Decibel

dBi

Decibels relative to an isotropic antenna

dBm

Decibels relative to 1 milliwatt

DC

Dual connectivity

DCCF

Data collection coordination function

DCCH

Dedicated control channel

DCI

Downlink control information

DDNMF

Direct discovery name management function

DFT

Discrete Fourier transform

DFT-s-OFDMA

Discrete Fourier transform spread OFDMA

DFS

Dynamic frequency sharing

DHCP

Dynamic host configuration protocol

DiffServ

Differentiated services

DL

Downlink

DL-SCH

Downlink shared channel

DM-RS

Demodulation reference signal

DN

Data network

DNAI

Data network access identifier

DNN

Data network name

DNS

Domain name system

D-RAN

Distributed RAN

DRB

Data radio bearer

DRX

Discontinuous reception

DSCP

Differentiated services code point

DSRC

Dedicated short-range communication

DSS

Dynamic spectrum sharing

DS-TT

Device side TSN translator

DTCH

Dedicated traffic channel

DTLS

Datagram transport layer security

DU

Distributed unit

E1-AP

E1 application protocol

EAC

Edge application client

EAP

Extensible authentication protocol

EAS

Edge application server

EASDF

Edge application server discovery function

ECGI

EUTRA cell global identification

EC-GSM

Extended coverage GSM

ECI

EUTRA cell identity

E-CID

Enhanced cell identity

ECIES

Elliptic curve integrated encryption scheme

ECM

EPS connection management

eCPRI

Evolved Common Public Radio Interface

ECS

Edge configuration server

EDC

Edge DNS client

EDGE

Enhanced Data Rates for GSM Evolution

eDRX

Extended discontinuous reception

EEC

Edge enabler client

EEL

Edge enabler layer

EES

Edge enabler server

EHC

Ethernet header compression

EHF

Extremely high frequency

EIR

Equipment identity register

eMBB

Enhanced mobile broadband

EMM

EPS mobility management

eMTC

Enhanced machine-type communications

eNB

Evolved Node B

EN-DC

EUTRA–NR dual connectivity

EPC

Evolved packet core

EPS

Evolved packet system

eRedCap

Enhanced reduced capability

ESM

EPS session management

ESP

Encapsulating security payload

ETSI

European Telecommunications Standards Institute

ETWS

Earthquake and tsunami warning system

EUTRA

Evolved UMTS terrestrial radio access

E-UTRAN

Evolved UMTS terrestrial radio access network

F1-AP

F1 application protocol

FDD

Frequency division duplex

FDMA

Frequency division multiple access

FFT

Fast Fourier transform

FR

Frequency range

GBR

Guaranteed bit rate

GEO

Geostationary earth orbit

GERAN

GSM EDGE radio access network

GFBR

Guaranteed flow bit rate

GM

Grandmaster

GMLC

Gateway mobile location centre

gNB

Next-generation Node B

gNB-CU

gNB central unit

gNB-CU-CP

gNB central unit control plane

gNB-CU-UP

gNB central unit user plane

gNB-DU

gNB distributed unit

GNSS

Global navigation satellite system

GP

Guard period

GPRS

General Packet Radio Service

GPS

Global Positioning System

GPSI

Generic public subscription identifier

gPTP

Generalized precision time protocol

GSA

Global Mobile Suppliers Association

GSCN

Global synchronization channel number

GSM

Global System for Mobile Communications

GSMA

GSM Association

GTP

GPRS tunnelling protocol

GTP-C

GPRS tunnelling protocol control part

GTP-U

GPRS tunnelling protocol user part

GUAMI

Globally unique AMF identifier

GUTI

Globally unique temporary identity

HAPS

High altitude platform station

HARQ

Hybrid ARQ

HARQ-ACK

Hybrid ARQ acknowledgement

HD

Half duplex

HDLLC

High data rate low-latency communication

HF

High frequency

HLR

Home location register

HMTC

High-performance machine-type communication

HRES

Hashed response

HRNN

Human readable network name

HSDPA

High-speed downlink packet access

HSPA

High-speed packet access

HSS

Home subscriber server

HSUPA

High-speed uplink packet access

HTML

Hypertext Markup Language

HTTP

Hypertext Transfer Protocol

HXRES

Hashed expected response

IAB

Integrated access and backhaul

IAB-DU

IAB distributed unit

IAB-MT

IAB mobile termination

IEEE

Institute of Electrical and Electronics Engineers

IETF

Internet Engineering Task Force

IF

Intermediate frequency

IIoT

Industrial internet of things

IKE

Internet Key Exchange

IMEI

International mobile equipment identity

IMEISV

IMEI and software version number

IMS

IP multimedia subsystem

IMSI

International mobile subscriber identity

IMT

International Mobile Telecommunications

INT-RNTI

Interruption RNTI

IoT

Internet of things

IP

Internet Protocol

IPSec

IP security

IPv4

IP version 4

IPv6

IP version 6

IPX

IP packet exchange

I-RNTI

Inactive RNTI

ISI

Inter-symbol interference

ISO

International Organization for Standardization

ITS

Intelligent transport system

ITS-AID

ITS application identifier

ITU

International Telecommunication Union

I-UPF

Intermediate UPF

JOSE

JSON object signing and encryption

JSON

JavaScript Object Notation

JT

Joint transmission

JWE

JSON web encryption

JWS

JSON web signature

L1-RSRP

Layer 1 reference signal received power

L1-SINR

Layer 1 signal-to-interference plus noise ratio

LAA

Licence-assisted access

LAN

Local area network

LBT

Listen before talk

LCID

Logical channel identity

LCS

Location service

LDPC

Low-density parity check

LEO

Low earth orbit

LI

Layer indicator

LMF

Location management function

LoRaWAN

Long-range Wide-area Network

LOS

Line of sight

LPP

LTE positioning protocol

LSB

Least significant bit

LTE

Long-term Evolution

LTE-M

LTE machine-type communication

LTM

Layer 1/layer 2 triggered mobility

LPWA

Low power wide area

LWA

LTE WLAN aggregation

MAC

Medium access control

or

Message authentication code

MBMS-GW

Multimedia broadcast/multicast service gateway

MBR

Maximum bit rate

MBS

Multicast/broadcast service

MBSF

Multicast/broadcast service function

MBSFN

Multicast/broadcast over a single frequency network

MB-SMF

Multicast/broadcast session management function

MBSTF

Multicast/broadcast service transport function

MB-UPF

Multicast/broadcast user plane function

MC

Mission critical

MCC

Mission-critical communication

or

Mobile country code

MCCH

MBS control channel

MCG

Master cell group

MCPTT

Mission-critical push to talk

MCS

Modulation and coding scheme

MCS-C-RNTI

Modulation and coding scheme cell RNTI

MDT

Minimization of drive tests

ME

Mobile equipment

MEC

Mobile edge computing

or

Multi-access edge computing

MeNB

Master eNB

MEO

Medium earth orbit

MFAF

Messaging framework adaptor function

MFBR

Maximum flow bit rate

MgNB

Master gNB

MIB

Master information block

MICO

Mobile-initiated connection only

MIMO

Multiple-input multiple-output

mIoT

Massive internet of things

ML

Machine learning

MME

Mobility management entity

mMIMO

Massive MIMO

MMS

Multimedia Messaging Service

MMSE

Minimum mean square error

mMTC

Massive machine-type communications

MN

Master node

MNC

Mobile network code

MPLS

Multi-protocol label switching

MR

Maximum ratio

or

Mixed reality

MRB

Multicast radio bearer

MR-DC

Multi-radio dual connectivity

MSB

Most significant bit

MSGB-RNTI

Message B RNTI

MSGin5G

Messaging in 5G

MSISDN

Mobile station international subscriber directory number

MT

Mobile termination

MTBF

Mean time between failures

MTC

Machine-type communications

MTCH

MBS traffic channel

MTLF

Model training logical function

MU-MIMO

Multiple-user MIMO

MVNO

Mobile virtual network operator

N3IWF

Non-3GPP interworking function

NAI

Network access identifier

NAS

Non-access stratum

NAT

Network address translation

NB-IoT

Narrowband internet of things

NCC

Next-hop chaining counter

NCGI

New Radio cell global identity

NCI

New Radio cell identity

NCJT

Non-coherent joint transmission

NCR

Network-controlled repeater

NCR-FwD

NCR forwarding

NCR-MT

NCR mobile termination

NDS

Network domain security

NE-DC

NR–EUTRA dual connectivity

NEA

Encryption algorithm for 5G

NEF

Network exposure function

NEO

Network operation

NF

Network function

NFV

Network function virtualization

NG-AP

Next-generation application protocol

ng-eNB

Next-generation evolved Node B

NGEN-DC

NG-RAN–EUTRA–NR dual connectivity

ngKSI

Key set identifier for 5G

NG-RAN

Next-generation radio access network

NH

Next hop

NIA

Integrity algorithm for 5G

NID

Network identifier

NLOS

Non-line of sight

NMT

Nordic Mobile Telephone

NPN

Non-public network

NR

New Radio

NR-ARFCN

New Radio absolute radio frequency channel number

NR-DC

NR–NR dual connectivity

NRF

Network repository function

NRPPa

New Radio positioning protocol A

NR-U

New Radio unlicensed

NSA

Non-standalone

NSACF

Network slice admission control function

NSAG

Network slice access stratum group

NSI-ID

Network slice instance identifier

NSSAAF

Network slice-specific and SNPN authentication and authorization function

NSSAI

Network slice selection assistance information

NSSF

Network slice selection function

NTN

Non-terrestrial network

NWDAF

Network data analytics function

NW-TT

Network side TSN translator

NZP

Non-zero power

OFDM

Orthogonal frequency division multiplexing

OFDMA

Orthogonal frequency division multiple access

O-CU

O-RAN central unit

O-DU

O-RAN distributed unit

O-RAN

Open RAN

OSA

Open service access

OSI

Open Systems Interconnection

P25

Project 25

PAnF

ProSe anchor function

PBCH

Physical broadcast channel

PC5-D

PC5 discovery

PC5-S

PC5 signalling

PC5-LINK-AMBR

PC5 link aggregate maximum bit rate

PCC

Policy and charging control

PCCH

Paging control channel

PCell

Primary cell

PCF

Policy control function

PCH

Paging channel

PCI

Physical cell identity

PCRF

Policy and charging rules function

P-CSCF

Proxy call session control function

PDB

Packet delay budget

PDCCH

Physical downlink control channel

PDCP

Packet data convergence protocol

PDF

Portable document format

PDN

Packet data network

PDN-GW

Packet data network gateway

PDP

Packet data protocol

PDR

Packet detection rule

PDSCH

Physical downlink shared channel

PDU

Protocol data unit

PEI

Permanent equipment identifier

or

Paging early indication

PER

Packet error rate

PF

Paging frame

PFCP

Packet forwarding control protocol

PFD

Packet flow description

PFI

PC5 QoS flow identifier

PGW

Packet data network gateway

PGW-C

Packet data network gateway control plane

PGW-U

Packet data network gateway user plane

PHR

Power headroom report

PHY

Physical layer

pIPX

Producer’s IPX

PKMF

ProSe key management function

PLMN

Public land mobile network

PLMN-ID

Public land mobile network identity

PMI

Pre-coding matrix indicator

pNF

Producer’s network function

PNI-NPN

Public network integrated non-public network

PO

Paging occasion

PQI

PC5 5G QoS identifier

PRACH

Physical random access channel

PRB

Physical resource block

P-RNTI

Paging RNTI

ProSe

Proximity-based services

PRS

Positioning reference signal

PRU

Positioning reference unit

PS

Packet switched

PSA

PDU session anchor

PSBCH

Physical sidelink broadcast channel

PSCCH

Physical sidelink control channel

PSCell

Primary SCG cell

PSDB

PDU set delay budget

pSEPP

Producer’s SEPP

PSER

PDU set error rate

PSFCH

Physical sidelink feedback channel

PSIHI

PDU set integrated handling information

PSS

Primary synchronization signal

PSSCH

Physical sidelink shared channel

PSTN

Public-switched telephone network

PTM

Point-to-multipoint

PTP

Point-to-point

or

Precision time protocol

PT-RS

Phase-tracking reference signal

PTT

Push-to-talk

PUCCH

Physical uplink control channel

PUSCH

Physical uplink shared channel

QAM

Quadrature amplitude modulation

QCI

QoS class identifier

QCL

Quasi co-location

QFI

QoS flow identifier

QNC

QoS notification control

QoS

Quality of service

QPSK

Quadrature phase shift keying

RACH

Random access channel

RAN

Radio access network

RAND

Random number

RAPID

Random access preamble identifier

RA-RNTI

Random access RNTI

RAT

Radio access technology

RB

Resource block

RBG

Resource block group

RE

Resource element

RedCap

Reduced capability

REG

Resource element group

RES

Response

REST

Representational state transfer

RF

Radio frequency

or

Rating function

RFSP

RAT/frequency selection priority

RI

Rank indication

RIC

RAN intelligent controller

RIM-RS

Remote interference management reference signal

RIS

Reconfigurable intelligent surface

RLC

Radio link control

RM

Registration management

RNA

RAN-based notification area

RNTI

Radio network temporary identifier

ROHC

Robust header compression

RPAUID

Restricted ProSe application user identifier

RQA

Reflective QoS attribute

RRC

Radio resource control

RRH

Remote radio head

RSCP

Reference signal carrier phase

RSRP

Reference signal received power

RSRQ

Reference signal received quality

RSSI

Received signal strength indicator

RSU

Roadside unit

RT

Real-time

RTP

Real-time transport protocol

RTT

Round trip time

RV

Redundancy version

S1-AP

S1 application protocol

SA

Standalone

SBCCH

Sidelink broadcast control channel

SBFD

Sub-band non-overlapping full duplex

SCCH

Sidelink control channel

SCEF

Service capability exposure function

SCell

Secondary cell

SC-FDMA

Single-carrier frequency division multiple access

SCG

Secondary cell group

SCH

Shared channel

SCI

Sidelink control information

SCP

Service communication proxy

SCTP

Stream control transmission protocol

SD

Slice differentiator

SDAP

Service data adaptation protocol

SDF

Service data flow

SDL

Supplementary downlink

SDN

Software-defined networking

SDU

Service data unit

SEAF

Security anchor function

SEAL

Service enabler architecture layer

SEG

Security gateway

SeNB

Secondary eNB

SEPP

Security edge protection proxy

SFCI

Sidelink feedback control information

SFI

Slot format indication

SFI-RNTI

Slot format indication RNTI

SFN

System frame number

SgNB

Secondary gNB

SGW

Serving gateway

SHF

Super high frequency

SI

Segmentation information

SIB

System information block

SIDF

Subscription identifier de-concealing function

SIM

Subscriber identity module

SINR

Signal-to-interference plus noise ratio

SIR

Signal-to-interference ratio

SI-RNTI

System information RNTI

SL

Sidelink

SL-BCH

Sidelink broadcast channel

SL-BSR

Sidelink buffer status report

SL-CAPC

Sidelink channel access priority class

SL-MIB

Sidelink master information block

SLPP

Sidelink positioning protocol

SL-PRS

Sidelink positioning reference signal

SL-RSRP

Sidelink reference signal received power

SL-SCH

Sidelink shared channel

SL-SRB

Sidelink signalling radio bearer

SLSSID

Sidelink synchronization signal identity

SLIV

Start and length indicator value

SMF

Session management function

SMS

Short Message Service

SMSF

SMS function

SMS-GMSC

SMS gateway mobile switching centre

SMS-IWMSC

SMS interworking mobile switching centre

SMS-SC

SMS service centre

SN

Secondary node

or

Sequence number

SNPN

Standalone non-public network

SNR

Signal-to-noise ratio

S-NSSAI

Single network slice selection assistance information

SO

Segment offset

SON

Self-optimizing network

or

Self-organizing network

SpCell

Special cell

SP-CSI-RNTI

Semi-persistent CSI RNTI

SPS

Semi-persistent scheduling

S-PSS

Sidelink primary synchronization signal

SR

Scheduling request

SRB

Signalling radio bearer

SRI

SRS resource indicator

SRS

Sounding reference signal

SRS-RSRP

SRS reference signal received power

SRVCC

Single radio voice call continuity

SS

Synchronization signal

SSB

SS/PBCH block

SSBRI

SS/PBCH block resource indicator

SSC

Session and service continuity

SS-RSRP

Synchronization signal reference signal received power

SS-RSRQ

Synchronization signal reference signal received quality

SSS

Secondary synchronization signal

S-SSS

Sidelink secondary synchronization signal

SST

Slice/service type

STCH

Sidelink traffic channel

SUCI

Subscription concealed identifier

SUL

Supplementary uplink

SU-MIMO

Single-user MIMO

SUPI

Subscription permanent identifier

SVD

Singular value decomposition

TA

Timing advance

or

Tracking area

TAC

Tracking area code

TACS

Total Access Communication System

TAG

Timing advance group

TAI

Tracking area identity

TCI

Transmission configuration indicator

TCP

Transmission Control Protocol

TC-RNTI

Temporary cell RNTI

TDCP

Time domain channel property

TDD

Time division duplex

TDMA

Time division multiple access

TDOA

Time difference of arrival

TD-SCDMA

Time division synchronous code division multiple access

TE

Terminal equipment

TEID

Tunnel endpoint identifier

TETRA

Terrestrial Trunked Radio

TLS

Transport Layer Security

TM

Transparent mode

TMGI

Temporary mobile group identity

TMSI

Temporary mobile subscriber identity

TNGF

Trusted non-3GPP gateway function

TPC

Transmit power control

TPC-PUCCH-RNTI

Transmit power control PUCCH RNTI

TPC-PUSCH-RNTI

Transmit power control PUSCH RNTI

TPC-SRS-RNTI

Transmit power control SRS RNTI

TR

Technical report

TRP

Transmit/receive point

TRS

Tracking reference signal

TS

Technical specification

TSC

Time-sensitive communication

TSCAC

Time-sensitive communication assistance container

TSCAI

Time-sensitive communication assistance information

TSCTSF

Time-sensitive communication and time synchronization function

TSDSI

Telecommunications Standards Development Society, India

TSN

Time-sensitive networking

TSN AF

Time-sensitive networking application function

TTA

Telecommunications Technology Association

TTC

Telecommunication Technology Committee