100,99 €
A comprehensive and approachable introduction to 5G and 5G-Advanced
Written by a noted expert on the subject, this Second Edition of An Introduction to 5G delivers a comprehensive, system-level guide to 5G and 5G-Advanced.
Building on the foundations laid in the First Edition, the topics explored include the market and use cases for 5G-Advanced; the architectures of the next generation radio access network, open radio access networks and the 5G core; the principles of radio transmission, millimeter waves and MIMO antennas; the architecture and operation of the 5G New Radio; the implementation of network function services by means of HTTP/2; and the signaling procedures that govern the end-to-end operation of the system.
This Second Edition has been thoroughly expanded and updated for 3GPP Release 18, to cover the new capabilities introduced under the name of 5G-Advanced. There are new chapters on:
An Introduction to 5G is written for engineering professionals in mobile telecommunications, for those in non-technical roles such as management, marketing and intellectual property, and for students. It requires no more than a basic understanding of mobile communications, and includes detailed references to the underlying 3GPP specifications for 5G. The book’s approach provides a comprehensive, end-to-end overview of the 5G standard, which enables readers to move on with confidence to the more specialized texts and to the specifications themselves.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 1047
Veröffentlichungsjahr: 2025
Cover
Table of Contents
Title Page
Copyright Page
Dedication Page
Preface
Acknowledgements
List of Abbreviations
1 Introduction
1.1 Architecture of a Mobile Telecommunication System
1.2 History of Mobile Telecommunications
1.3 Technologies for 5G
1.4 The 3GPP 5G System
1.5 Enhanced Mobile Broadband
1.6 Massive Machine-type Communications
1.7 Ultra-reliable Low-latency Communication
References
2 Architecture of the Core Network
2.1 The Evolved Packet Core
2.2 The 5G Core Network
2.3 Network Areas and Identities
2.4 State Diagrams
2.5 Network Slicing
2.6 Non-3GPP Access to the 5G Core
2.7 Signalling Protocols
2.8 The Hypertext Transfer Protocol
2.9 Example Network Function Services
References
3 Architecture of the Radio Access Network
3.1 The Evolved UMTS Terrestrial Radio Access Network
3.2 The Next-generation Node B
3.3 Architectural Options
3.4 Network Areas and Identities
3.5 RRC State Diagram
3.6 Signalling Protocols
3.7 Open Radio Access Networks
References
4 Spectrum, Antennas and Propagation
4.1 Radio Spectrum
4.2 Antennas and Propagation
4.3 Radio Propagation Issues for Millimetre Waves
4.4 Multipath, Fading and Coherence
References
5 Digital Signal Processing
5.1 Modulation and Demodulation
5.2 Radio Transmission in a Mobile Cellular Network
5.3 Orthogonal Frequency Division Multiple Access
5.4 Other Features of OFDMA
5.5 Signal-processing Issues for 5G
5.6 Error Management
References
6 Multiple-antenna Techniques
6.1 Beamforming
6.2 Beamforming at the gNB
6.3 Beamforming at the Mobile
6.4 Beam Management
6.5 Spatial Multiplexing
6.6 Multiple-user MIMO
6.7 Massive MIMO
6.8 Single-user MIMO
6.9 Multipoint Transmission and Reception
References
7 Architecture of the 5G New Radio
7.1 Air Interface Protocol Stack
7.2 Frequency Bands and Combinations
7.3 Frequency Domain Structure
7.4 Time Domain Structure
7.5 Multiple Antennas
7.6 Data Transmission
References
8 Cell Acquisition
8.1 Acquisition Procedure
8.2 Resource Mapping
8.3 Acquisition of the SS/PBCH Block
8.4 System Information
References
9 Random Access
9.1 Physical Random Access Channel
9.2 Random Access Procedure
9.3 Variations on the Random Access Procedure
References
10 Link Adaptation
10.1 CSI Reference Signals
10.2 Channel State Information
10.3 Physical Uplink Control Channel
10.4 Sounding
References
11 Data Transmission and Reception
11.1 Introduction
11.2 Transmission and Reception of the PDCCH
11.3 Scheduling Messages
11.4 Transmission and Reception of the PUSCH and PDSCH
11.5 Reference Signals
11.6 Hybrid ARQ Acknowledgements
11.7 Related Procedures
11.8 Performance of 5G
References
12 Air Interface Layer 2
12.1 Medium Access Control
12.2 Radio Link Control
12.3 Packet Data Convergence Protocol
12.4 Service Data Adaptation Protocol
References
13 Registration Procedures
13.1 Power-on Sequence
13.2 Network and Cell Selection
13.3 RRC Connection Establishment
13.4 Registration Procedure
13.5 Deregistration Procedure
References
14 Security
14.1 Security Principles
14.2 Network Access Security
14.3 Network Access Security Procedures
14.4 Network Domain Security
14.5 Service-based Architecture Domain Security
References
15 Session Management, Policy and Charging
15.1 Types of PDU Session
15.2 Quality of Service
15.3 Implementation of PDU Sessions
15.4 Policy and Charging Control Architecture
15.5 PDU Session Management Procedures
References
16 Mobility Management in RRC_CONNECTED
16.1 Introduction to RRC_CONNECTED
16.2 Measurement Configuration and Reporting
16.3 Handover Procedures
16.4 Dual Connectivity Procedures
16.5 State Transitions out of RRC_CONNECTED
References
17 Mobility Management in RRC_IDLE
17.1 Introduction to RRC_IDLE
17.2 Cell Reselection Procedures
17.3 Registration Updating
17.4 State Transitions out of RRC_IDLE
References
18 Mobility Management in RRC_INACTIVE
18.1 Introduction to RRC_INACTIVE
18.2 Mobility Management
18.3 State Transitions
18.4 Small Data Transmission in RRC_INACTIVE
References
19 Inter-operation with the Evolved Packet Core
19.1 Inter-operation Architectures
19.2 Registration Modes
19.3 Use of the Migration Architecture
19.4 Interworking Without N26
19.5 Interworking with N26
References
20 Foundations of 5G-Advanced
20.1 Location Services
20.2 Integrated Access and Backhaul
20.3 Use of Unlicensed Spectrum
20.4 Multicast and Broadcast Services
20.5 Non-terrestrial Networks
20.6 Network Automation, Artificial Intelligence and Machine Learning
20.7 Service Enabler Architecture Layer
References
21 The Internet of Things
21.1 Time-sensitive Communications
21.2 Non-public Networks
21.3 5G Virtual Networks
21.4 Edge Computing
21.5 Massive Machine-type Communications
21.6 Messaging Services
References
22 Vehicle Communications and the Sidelink
22.1 Vehicle-to-Everything (V2X) Communications
22.2 Uncrewed Aerial Vehicles
22.3 Proximity-based Services
22.4 Architecture of the Sidelink
22.5 Sidelink Timing Synchronization
22.6 Sidelink Transmission and Reception
22.7 Access Stratum Procedures for the Sidelink
22.8 Operation of Sidelink Communication
22.9 Operation of ProSe Direct Discovery
References
23 From 5G-Advanced to 6G
23.1 Release 19
23.2 6G
References
Further Reading
Index
End User License Agreement
Chapter 1
Table 1.1 3GPP specification releases for UMTS, LTE and 5G.
Table 1.2 3GPP specification series used by UMTS, LTE and 5G.
Table 1.3 Technical performance requirements for 5G.
Table 1.4 Mapping between the 5G architectural options and the contents of t...
Chapter 2
Table 2.1 Standardized values of the slice/service type.
Table 2.2 HTTP/2 methods used by the 5G core network.
Chapter 3
Table 3.1 Signalling radio bearers.
Chapter 7
Table 7.1 Logical channels.
Table 7.2 Transport channels.
Table 7.3 Control information.
Table 7.4 Physical channels.
Table 7.5 Physical signals.
Table 7.6 Frequency bands in frequency range 1.
Table 7.7 Frequency bands in frequency range 2.
Table 7.8 Numerologies.
Table 7.9 Maximum transmission bandwidth configurations in frequency range 1...
Table 7.10 Maximum transmission bandwidth configurations in frequency range ...
Table 7.11 Values of the global frequency raster and the channel raster.
Table 7.12 Details of the frame structure for the different numerologies.
Table 7.13 Uplink antenna ports.
Table 7.14 Downlink antenna ports.
Chapter 8
Table 8.1 Summary of the acquisition procedure.
Table 8.2 Values of the global synchronization raster.
Table 8.3 Organization of the system information in Release 15.
Table 8.4 Additional system information blocks in Releases 16–18.
Chapter 9
Table 9.1 Number of PUSCH resource blocks occupied by the PRACH.
Chapter 10
Table 10.1 Interpretation of the channel quality indicator.
Table 10.2 Valid combinations of time domain behaviour for the measurement a...
Table 10.3 PUCCH formats.
Chapter 11
Table 11.1 DCI formats.
Table 11.2 Radio network temporary identifiers in Release 15.
Table 11.3 Types of PDCCH search space.
Table 11.4 Contents of DCI formats 0_0 and 1_0.
Table 11.5 Valid choices for the start and length indicator value
Table 11.6 Minimum PUSCH preparation time.
Table 11.7 Minimum PDSCH processing time.
Table 11.8 Peak spectral efficiency of 5G.
Table 11.9 Test conditions for the 3GPP simulations of 5G and LTE.
Chapter 12
Table 12.1 MAC control elements in Release 15.
Chapter 15
Table 15.1 Quality-of-service (QoS) parameters.
Table 15.2 Standardized values of the 5G QoS identifier: (1) GBR QoS flows....
Table 15.3 Standardized values of the 5G QoS identifier: (2) non-GBR QoS flo...
Table 15.4 Standardized values of the 5G QoS identifier: (3) delay-critical ...
Table 15.5 Minimum set of 5G QoS identifiers that expected for each standard...
Chapter 16
Table 16.1 Measurement events involving 5G cells alone.
Table 16.2 Measurement events involving other radio access technologies.
Chapter 20
Table 20.1 Channel access priority class.
Table 20.2 Example parameters for terrestrial and non-terrestrial platforms....
Table 20.3 Satellite bands in frequency range 1.
Table 20.4 Satellite bands in frequency range 2.
Chapter 21
Table 21.1 Capabilities of eMTC and NB-IoT devices.
Table 21.2 Capabilities of RedCap and eRedCap devices.
Chapter 22
Table 22.1 PC5 quality-of-service parameters.
Table 22.2 Standardized PQI values for vehicle communications.
Table 22.3 Standardized PQI values for aircraft communications.
Table 22.4 Standardized PQI values for proximity-based services.
Table 22.5 Sidelink signalling radio bearers.
Table 22.6 Sidelink logical channels.
Table 22.7 Sidelink transport channels.
Table 22.8 Sidelink control information.
Table 22.9 Sidelink physical channels.
Table 22.10 Sidelink physical signals.
Table 22.11 Sidelink frequency bands.
Table 22.12 Sidelink antenna ports.
Table 22.13 SCI formats.
Table 22.14 Contents of SCI format 1-A in licensed spectrum.
Table 22.15 Contents of SCI formats 2-A and 2-B in licensed spectrum.
Table 22.16 Sidelink channel access priority class.
Chapter 23
Table 23.1 Estimated performance targets for IMT-2030.
Chapter 1
Figure 1.1 Architecture of a mobile telecommunication system.
Figure 1.2 Example of base stations with two carrier frequencies and three s...
Figure 1.3 Examples of the communication protocols used by the internet.
Figure 1.4 High-level architectures of GSM, UMTS and LTE.
Figure 1.5 Architecture of a telecommunication network using software-define...
Figure 1.6 High-level architectures of LTE and 5G.
Figure 1.7 Architectural options for 5G.
Figure 1.8 Monthly traffic due to different mobile telecommunication applica...
Figure 1.9 Numbers of subscriptions to different mobile telecommunication te...
Figure 1.10 Quarterly revenue earned by UK mobile network operators up to th...
Figure 1.11 Numbers of cellular IoT devices using different mobile telecommu...
Chapter 2
Figure 2.1 Architecture of the evolved packet core.
Figure 2.2 Representation of the 5G core network using reference points.
Figure 2.3 Representation of the 5G core network using service-based interfa...
Figure 2.4 PDU sessions and QoS flows.
Figure 2.5 Roaming architecture using home-routed traffic.
Figure 2.6 Roaming architecture using local breakout.
Figure 2.7 Data storage architectures.
Figure 2.8 Registration management state diagram.
Figure 2.9 Connection management state diagram.
Figure 2.10 Network slicing architecture.
Figure 2.11 Architecture for untrusted non-3GPP access to the 5G core networ...
Figure 2.12 Signalling protocols used by the 5G core network.
Figure 2.13 PFCP association setup procedure.
Figure 2.14 Example of an HTTP/2 request and response.
Figure 2.15 Example of a JSON object.
Figure 2.16 Network function service registration procedure.
Figure 2.17 Network function service discovery procedure.
Figure 2.18 Procedures for network function service subscription and notific...
Figure 2.19 Procedure for delegated network function service discovery.
Chapter 3
Figure 3.1 Architecture of the evolved UMTS terrestrial radio access network...
Figure 3.2 Carrier aggregation.
Figure 3.3 Dual connectivity.
Figure 3.4 Internal architecture of the gNB.
Figure 3.5 Example architecture for the deployment of the gNB. AMF, access a...
Figure 3.6 Architectural options 1 and 3.
Figure 3.7 Architectural options 5 and 7.
Figure 3.8 Architectural options 2 and 4.
Figure 3.9 Data radio bearers.
Figure 3.10 5G radio resource control state diagram, for a mobile served by ...
Figure 3.11 Relationship between the 4G and 5G RRC state diagrams for a mobi...
Figure 3.12 Signalling protocols used by the next-generation radio access ne...
Figure 3.13 High-level O-RAN architecture.
Chapter 4
Figure 4.1 The electromagnetic spectrum.
Figure 4.2 Radiation pattern of a parabolic reflector antenna, with a diamet...
Figure 4.3 Benefit of using a base station antenna array in a high-frequency...
Figure 4.4 Non-line-of-sight communications using (a) diffraction and (b) re...
Figure 4.5 Example measurements of penetration loss at frequencies from 1 to...
Figure 4.6 Estimates of foliage losses due to different depths of vegetation...
Figure 4.7 Estimates of atmospheric losses due to absorption by the air.
Figure 4.8 Estimates of atmospheric losses due to rainfall.
Figure 4.9 Generation of constructive interference, destructive interference...
Figure 4.10 Examples of fading as a function of (a) position and (b) frequen...
Figure 4.11 Example used to estimate the relationship between angular spread...
Figure 4.12 Example used to estimate the relationship between delay spread a...
Chapter 5
Figure 5.1 Quadrature phase shift keying (QPSK). (a) Example QPSK waveform. ...
Figure 5.2 Example modulation schemes used by 5G.
Figure 5.3 Block diagram of the modulator in a wireless communication system...
Figure 5.4 Block diagram of the demodulator in a wireless communication syst...
Figure 5.5 Operation of FDD and TDD modes.
Figure 5.6 Division of the frequency band into subcarriers using OFDM.
Figure 5.7 Processing steps in an OFDM transmitter.
Figure 5.8 Processing steps in an OFDM receiver.
Figure 5.9 Block diagram of the OFDMA downlink.
Figure 5.10 Block diagram of the OFDMA uplink.
Figure 5.11 Frequency-specific scheduling in 5G.
Figure 5.12 Processing steps in an OFDM receiver, in which the information a...
Figure 5.13 Inter-symbol interference (ISI). (a) Creation of ISI in a multip...
Figure 5.14 Operation of the cyclic prefix on a single subcarrier.
Figure 5.15 Block diagram of a transmitter and receiver using hybrid ARQ wit...
Figure 5.16 Operation of a stop-and-wait re-transmission scheme using multip...
Figure 5.17 Operation of a selective re-transmission scheme.
Chapter 6
Figure 6.1 Constructive and destructive interference from a base station arr...
Figure 6.2 Radiation pattern from an array of (a) two, (b) four, (c) eight a...
Figure 6.3 Beam steering by means of a phase ramp.
Figure 6.4 Radiation pattern from an array of four antennas, with a spacing ...
Figure 6.5 Analogue spatial filtering by means of a phase ramp: (a) transmis...
Figure 6.6 Digital beamforming by means of antenna-specific amplitude scalin...
Figure 6.7 Example radiation patterns from an array of four antennas using d...
Figure 6.8 Partly connected architecture for hybrid beamforming.
Figure 6.9 Example radiation patterns from a hybrid antenna array: (a) spati...
Figure 6.10 Example deployments and antenna configurations. (a) Traditional ...
Figure 6.11 Digital precoding and analogue spatial filtering at the mobile....
Figure 6.12 Reference signal transmission for beam management, if the CSI-RS...
Figure 6.13 Beam pair selection.
Figure 6.14 Principles of spatial multiplexing.
Figure 6.15 Uplink multiple-user MIMO.
Figure 6.16 Example radiation patterns from an array of four antennas using ...
Figure 6.17 Downlink multiple-user MIMO.
Figure 6.18 Massive MIMO.
Figure 6.19 Single-user MIMO.
Figure 6.20 Single-user MIMO in a sparse multipath environment.
Chapter 7
Figure 7.1 Air interface protocol stack for architectural option 2.
Figure 7.2 Air interface protocol stack in cases of dual connectivity.
Figure 7.3 Uplink information flows.
Figure 7.4 Downlink information flows.
Figure 7.5 Frequency bands used by operational and planned 5G networks in Ma...
Figure 7.6 Example common resource blocks in a channel bandwidth of 10 MHz....
Figure 7.7 Frames, subframes and slots.
Figure 7.8 Slots and symbols when using the (a) normal and (b) extended cycl...
Figure 7.9 Example of a TDD configuration.
Figure 7.10 Transport channel processing: (a) transmission and (b) reception...
Figure 7.11 Physical channel processing: (a) transmission and (b) reception....
Figure 7.12 Analogue processing: (a) transmission and (b) reception.
Chapter 8
Figure 8.1 Analogue beam selection during the acquisition procedure.
Figure 8.2 Internal structure of an SS/PBCH block, using a physical cell ide...
Figure 8.3 Timing patterns for the SS/PBCH blocks when using licensed spectr...
Figure 8.4 Timing patterns for the SS/PBCH blocks when using licensed spectr...
Chapter 9
Figure 9.1 Durations of the long PRACH formats.
Figure 9.2 Durations of the short PRACH formats.
Figure 9.3 Four-step contention-based random access procedure.
Figure 9.4 Two-step contention-based random access procedure.
Chapter 10
Figure 10.1 Physical channel processing for the CSI reference signal: (a) tr...
Figure 10.2 Example resource mappings for the CSI reference signal on port 3...
Figure 10.3 Interpretations of the CSI reference signal.
Figure 10.4 Non-repeated and repeated transmissions of the resources in a no...
Figure 10.5 Types of PMI codebook in Release 15.
Figure 10.6 Transmission of uplink control information on the PUCCH.
Figure 10.7 Physical channel processing for the sounding reference signal: (...
Figure 10.8 Example resource mapping for the sounding reference signal, usin...
Figure 10.9 Interpretations of the sounding reference signal.
Chapter 11
Figure 11.1 Data transmission procedures for the downlink and uplink.
Figure 11.2 Transmission of downlink control information (DCI) on the PDCCH:...
Figure 11.3 Example of a control resource set.
Figure 11.4 Example time domain resource assignments for the uplink. (a) Slo...
Figure 11.5 Transport channel processing for the (a) DL-SCH and (b) UL-SCH....
Figure 11.6 Physical channel processing for the (a) PDSCH and (b) PUSCH.
Figure 11.7 Example resource mappings for the DM-RS using downlink port 1000...
Figure 11.8 Example resource mappings for the PDSCH and PUSCH using mapping ...
Figure 11.9 Example time domain resource assignments for the downlink. (a) S...
Figure 11.10 Peak spectral efficiencies of LTE and 5G.
Figure 11.11 Average spectral efficiencies of LTE and 5G.
Chapter 12
Figure 12.1 Architecture of the mobile's medium access control protocol. BCH...
Figure 12.2 Structure of a MAC PDU.
Figure 12.3 Radio link control protocol.
Figure 12.4 Architecture of the RLC protocol in transparent mode.
Figure 12.5 Architecture of the RLC protocol in unacknowledged mode.
Figure 12.6 Structure of an RLC data PDU in unacknowledged mode.
Figure 12.7 Structure of an RLC data PDU in acknowledged mode.
Figure 12.8 Architecture of the RLC protocol in acknowledged mode.
Figure 12.9 Architecture of the packet data convergence protocol.
Figure 12.10 PDCP status reporting and re-transmission procedures.
Figure 12.11 Architecture of the service data adaptation protocol.
Chapter 13
Figure 13.1 Overview of the power-on procedures in architectural option 2.
Figure 13.2 RRC connection establishment procedure.
Figure 13.3 Initial UE message procedure.
Figure 13.4 Registration procedure if the AMF is unchanged.
Figure 13.5 Registration procedure if the new AMF is different from the old ...
Figure 13.6 Registration procedure, including re-allocation of the AMF.
Figure 13.7 Mobile-initiated deregistration procedure.
Chapter 14
Figure 14.1 Network access security architecture.
Figure 14.2 Network access security keys.
Figure 14.3 5G authentication and key agreement procedure.
Figure 14.4 Non-access stratum security mode command procedure.
Figure 14.5 Access stratum security mode command procedure.
Figure 14.6 Ciphering.
Figure 14.7 Integrity protection.
Figure 14.8 Network domain security architecture.
Figure 14.9 Service-based interface security architecture.
Figure 14.10 Principles of secure message delivery over N32-f.
Figure 14.11 Procedure for secure message delivery over N32-f.
Chapter 15
Figure 15.1 Packet flows, service data flows and QoS flows.
Figure 15.2 Example implementation of a PDU session using QoS flows, bearers...
Figure 15.3 User plane protocols.
Figure 15.4 End-to-end user plane protocol stack.
Figure 15.5 Multiple PDU session anchors.
Figure 15.6 Representation of the policy and charging control architecture u...
Figure 15.7 Representation of the policy and charging control architecture u...
Figure 15.8 Converged architecture for charging and billing.
Figure 15.9 PDU session establishment procedure. (1) Initiation.
Figure 15.10 PDU session establishment procedure. (2) Completion.
Figure 15.11 Interactions with the policy control function during PDU sessio...
Figure 15.12 Request for a packet flow with a specific quality of service....
Figure 15.13 Addition of a PDU session anchor.
Chapter 16
Figure 16.1 Measurement configuration and reporting procedure.
Figure 16.2 Forwarding of measurement configuration and reporting messages b...
Figure 16.3 Xn-based handover procedure in the absence of dual connectivity....
Figure 16.4 Path switch procedure.
Figure 16.5 Addition of a secondary node.
Figure 16.6 QoS flow mobility procedure.
Figure 16.7 Access network release procedure.
Figure 16.8 Suspension of the RRC connection.
Chapter 17
Figure 17.1 Example of an inactive PDU session.
Figure 17.2 Registration update procedure if the AMF is unchanged.
Figure 17.3 Mobile-triggered service request procedure for a mobile initiall...
Figure 17.4 Network-triggered service request procedure, for a mobile initia...
Chapter 18
Figure 18.1 Example of a suspended PDU session.
Figure 18.2 RAN-based notification area update procedure.
Figure 18.3 Access network release procedure for a mobile initially in RRC_I...
Figure 18.4 Mobile-triggered resumption of the RRC connection. (1) Initiatio...
Figure 18.5 Mobile-triggered resumption of the RRC connection. (2) Completio...
Figure 18.6 Network-triggered resumption of the RRC connection.
Chapter 19
Figure 19.1 Architecture for migration from the evolved packet core.
Figure 19.2 Architecture for interworking with the evolved packet core.
Figure 19.3 Architecture for direct interworking between the UDM and the HSS...
Figure 19.4 Mobility to the evolved packet core using the migration architec...
Figure 19.5 RRC release with redirection using the migration architecture fo...
Figure 19.6 Mobility to the evolved packet core using the interworking archi...
Figure 19.7 Mobility to the evolved packet core using the N26 reference poin...
Figure 19.8 Mobility to the evolved packet core using the N26 reference poin...
Figure 19.9 Handover to the evolved packet core using the N26 reference poin...
Figure 19.10 Handover to the evolved packet core using the N26 reference poi...
Chapter 20
Figure 20.1 Representation of the location service architecture using servic...
Figure 20.2 Underlying architecture for integrated access and backhaul.
Figure 20.3 Example IAB architecture involving NR dual connectivity and a mu...
Figure 20.4 Mobile's access stratum protocol stack for the case of a single-...
Figure 20.5 Sources of interference for an in-band backhaul.
Figure 20.6 Network-controlled repeater architecture.
Figure 20.7 Example of uplink resource allocation type 2 for transmission on...
Figure 20.8 Example of dynamic channel access type 1 using a defer duration ...
Figure 20.9 Example of a location-dependent multicast MBS session.
Figure 20.10 Representation of the MBS architecture using service-based inte...
Figure 20.11 Satellite access architecture.
Figure 20.12 Delay and Doppler compensation during non-terrestrial radio acc...
Figure 20.13 Types of satellite beam.
Figure 20.14 Satellite backhaul architecture.
Figure 20.15 Representation of the network data analytics architecture using...
Figure 20.16 Representation of the SEAL architecture using reference points....
Chapter 21
Figure 21.1 Illustration of a real-time closed-loop wireless control system....
Figure 21.2 Architecture for time synchronization in 5G.
Figure 21.3 Integration of the 5G system with an IEEE time-sensitive network...
Figure 21.4 Architecture of a standalone NPN.
Figure 21.5 Example architecture of a public network integrated NPN.
Figure 21.6 Example of packet forwarding in a 5G virtual network.
Figure 21.7 Architecture for edge computing using session breakout.
Figure 21.8 Example procedure for edge application server discovery.
Figure 21.9 Example procedure for edge application server relocation.
Figure 21.10 Architecture of the edge enabler layer.
Figure 21.11 Architecture for SMS over the non-access stratum.
Chapter 22
Figure 22.1 Architecture for vehicle-to-everything (V2X) communications.
Figure 22.2 Example of PC5 unicast links.
Figure 22.3 Scope of the V2X layer.
Figure 22.4 Architecture for uncrewed aerial vehicles and aircraft-to-everyt...
Figure 22.5 Architecture for proximity-based services.
Figure 22.6 Scope of the ProSe layer.
Figure 22.7 Architectures for (a) ProSe UE-to-network relays and (b) ProSe U...
Figure 22.8 Sidelink protocol stack.
Figure 22.9 Sidelink information flows.
Figure 22.10 Propagation of timing synchronization information on the sideli...
Figure 22.11 Internal structure of a sidelink synchronization block using a ...
Figure 22.12 Procedure for sidelink transmission and reception.
Figure 22.13 Example sidelink resource mapping using the normal cyclic prefi...
Figure 22.14 Example sidelink resource mapping using the normal cyclic prefi...
Figure 22.15 Sidelink resource allocation mode 1.
Figure 22.16 Establishment of groupcast communications over PC5.
Figure 22.17 Establishment of a PC5 unicast link.
Figure 22.18 Open ProSe direct discovery using Model A.
Chapter 23
Figure 23.1 Intended 3GPP timeline for 6G, as published in March 2025.
Cover Page
Table of Contents
Title Page
Copyright Page
Dedication
Preface
Acknowledgements
List of Abbreviations
Begin Reading
Further Reading
Index
WILEY END USER LICENSE AGREEMENT
iii
iv
v
xxiii
xxiv
xxv
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
xxxix
xl
xli
xlii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
Second Edition
Christopher Cox
Chris Cox Communications LtdCambridge, UK
This edition first published 2025© 2025 John Wiley & Sons Ltd
Edition HistoryJohn Wiley & Sons Ltd (1e, 2021)
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
The right of Christopher Cox to be identified as the author of this work has been asserted in accordance with law.
Registered OfficesJohn Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USAJohn Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
The manufacturer’s authorized representative according to the EU General Product Safety Regulation is Wiley-VCH GmbH, Boschstr. 12, 69469 Weinheim, Germany, e-mail: [email protected].
Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats.
Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
Limit of Liability/Disclaimer of WarrantyWhile the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
Library of Congress Cataloging-in-Publication Data applied for
Hardback ISBN: 9781394284726
Cover design by WileyCover image: © Weiquan Lin/Getty Images
To Susie
This book is an introduction to fifth-generation (5G) mobile telecommunication systems and to the enhancements that have been made to those systems under the name of 5G-Advanced.
5G builds on earlier generations of mobile telecommunications, but it differs in several ways. It is designed for a wider range of applications than before: not only consumer applications such as voice, video and data, but also industrial applications such as machine-type communications. In turn, those applications have a wider range of requirements than before: some require a peak data rate of several gigabits per second, others require the delivery of data packets with delays as low as a few milliseconds, while others require a battery life of several years. To help meet those requirements, the network uses technologies such as network function virtualization, software-defined networking and network slicing to provide a flexible, underlying resource that can be easily reconfigured to support new requirements as they arise. In pursuit of higher data rates and higher system capacities, the air interface supports higher radio frequencies than previous generations have done and makes extensive use of multiple antennas.
There are many other books on 5G which contain detailed accounts of the underlying technologies, the likely applications, the system architecture and the air interface. The aim of this book is to complement them by offering an end-to-end, system-level perspective. It contains fewer details about individual topics than many of the others, but it is broader in scope, covering the requirements and architecture of 5G, the principles and implementation of the air interface, the signalling procedures within the network, and the new capabilities that have been added in 5G-Advanced. It is aimed at mobile telecommunication engineers who want an introduction to the architecture and operation of 5G, at those who are experts in one part of the system but who want to understand what is taking place elsewhere, and as a technical foundation for those in related roles such as management, marketing, intellectual property and consultancy.
The first few chapters cover the foundations. Chapter 1 reviews the history of mobile telecommunications and introduces the applications, requirements and key technical features of 5G. Chapter 2 covers the architecture of the core network and the signalling protocols that it uses, while Chapter 3 covers similar ground in the case of the radio access network.
The next three chapters address the underlying technologies that are used by the air interface. Chapter 4 reviews the use of radio spectrum and discusses the coverage issues that appear when operating at high radio frequencies. Chapter 5 reviews the techniques that are used for digital signal processing, for example modulation, demodulation, orthogonal frequency division multiple access and error correction. (Much of that chapter has been condensed from the author’s previous work, An Introduction to LTE.) Chapter 6 explains how 5G uses multiple antennas to compensate for the coverage problems that appear at high radio frequencies and to improve the system capacity when the radio frequency is low.
The next six chapters describe how the air interface is actually implemented. Chapter 7 is an introduction to the air interface, Chapter 8 describes the acquisition procedure in which a mobile discovers a nearby cell and Chapter 9 describes the random access procedure in which the mobile makes its initial communication. Chapter 10 covers the procedures for link adaptation, which compensate for changes in the amplitude and phase of the incoming radio signal, and help to control the use of multiple antennas. Chapter 11 addresses the procedures that are used for scheduling and data transmission, while Chapter 12 explains how the air interface’s higher-level protocols handle tasks such as scheduling and re-transmission.
We then move on to the end-to-end operation of 5G. Chapter 13 covers the procedures that a mobile runs when it switches on to discover a nearby cell and register with its chosen network. Chapter 14 addresses the security procedures in 5G, while Chapter 15 covers the procedures which connect a mobile to an external data network and which allow an external application server to monitor and influence its behaviour.
The next four chapters address different aspects of mobility management, in which the network keeps track of the mobile’s location and controls the cells with which it is communicating. Chapter 16 covers the procedures in a state known as RRC_CONNECTED, in which the mobile is carrying out normal communications with the network. Chapter 17 addresses the state of RRC_IDLE, in which the mobile is on standby, while Chapter 18 deals with the new state of RRC_INACTIVE, which is an optimization for low data rate communications. Chapter 19 covers the procedures used for inter-operation between the core networks of 4G and 5G.
The last four chapters address the enhancements that have been made to 5G in later releases of the specifications. Chapter 20 covers the general-purpose capabilities that form the foundations of 5G-Advanced, including location services, unlicensed spectrum, non-terrestrial networks, and artificial intelligence and machine learning. Chapter 21 focuses on system enhancements for the industrial internet of things and for massive machine-type communications. Chapter 22 addresses device-to-device communications on the 5G sidelink, as well as the vehicle, aircraft and proximity-based services that the sidelink helps to support. As the final topic, Chapter 23 reviews the enhancements that are planned for future releases of 5G and looks ahead to the introduction of a sixth generation of mobile telecommunications.
Like any technical subject, 5G uses a large number of acronyms and abbreviations. To help make the text readable, I have tried to strike a balance between the uses of abbreviations and text, for example by using ‘downlink’ in place of DL, but AMF in place of ‘access and mobility management function’. New terms are highlighted in italics throughout the text, and there is a full list of abbreviations at the start of the book.
Unavoidably, some of the topics are mathematical ones. Some previous knowledge of Fourier transforms would help the reader understand the discussion of orthogonal frequency division multiple access in Chapter 5. Similarly, some previous knowledge of matrices would help with the discussion of multiple antennas in Chapter 6, while familiarity with complex numbers would be helpful for both. However, I have attempted to make the maths as lightweight as possible and to explain the important concepts using English instead. The Bibliography contains some references for further reading.
My first acknowledgement is to the team at Wiley, for taking on the publication of this book and for guiding me through the writing and production process. I am particularly grateful for the support received from my Commissioning Editor, Sandra Grayson, from my Project Editors for the two editions of the book, Steve Fassioms, Kavipriya Ramachandran and Veena Rajendran, from my Production Editors, Juliet Booker and Srinivasan Kandasamy, from my Editorial Assistant, Becky Cowan, from my Copy-editor, Lesley Montford, and from the whole of the production team. I would also like to extend my appreciation to the directors and staff of Wray Castle Limited. My first exposure to 5G was as part of a contract to write training material on their behalf, and I am grateful for the opportunities that the work provided to extend my knowledge and understanding of the subject.
Particular thanks are due to Paul Mason, Jeff Cartwright, Tony Wakefield, Les Granfield and Matt Brenner for many valuable discussions about telecommunications in general and 5G in particular, to Ignacio Rodriguez Larrad, for providing the data on penetration losses underlying Figure 4.5, to David Herbert, for his guidance about the signalling protocols that are used by the internet, and to Arein Zarour and Nurudeen Salau, for highlighting issues with the first edition that I hope to have addressed in the second. I would also like to offer a big thank you to the delegates in my training classes, whose probing questions have so often proved the ideal trigger for learning new aspects of the technology. Nevertheless, the responsibility for any errors and omissions in the text, and for any lack of clarity in the explanations, is entirely my own.
Several diagrams in this book have been reproduced from the technical specifications for 5G, with permission from the European Telecommunications Standards Institute, © 2024. 3GPP™ TSs and TRs are the property of ARIB, ATIS, CCSA, ETSI, TSDSI, TTA and TTC who jointly own the copyright in them. They are subject to further modifications and are therefore provided to you ‘as is’ for information purposes only. Further use is strictly prohibited.
On a lighter note, I would like to thank the creators of the internet blocking application Cold Turkey for removing innumerable opportunities for procrastination and keeping me focused on the task. I would also like to thank the spirits of J.S. Bach and Frédéric Chopin for providing me with some more valuable diversions, and for reminding me that there are more things in life than mobile telecommunications.
My last and greatest thank you is to my beloved wife, Susie. The first edition of this book coincided with our engagement and marriage, while the intervening years have served to demonstrate the wisdom of those events. Her kindness, patience and understanding have been extraordinary throughout, and I dedicate this book to her.
1G
First generation
2G
Second generation
3G
Third generation
3GPP
Third Generation Partnership Project
3GPP2
Third Generation Partnership Project 2
4G
Fourth generation
5G
Fifth generation
5G AKA
5G authentication and key agreement
5G-AN
5G access network
5GC
5G core network
5G-EIR
5G equipment identity register
5G-GUTI
5G globally unique temporary identity
5GMM
5G mobility management
5GS
5G system
5GSM
5G session management
5G-S-TMSI
5G S temporary mobile subscriber identity
5G-TMSI
5G temporary mobile subscriber identity
5QI
5G QoS identifier
6G
Sixth generation
A/D
Analogue to digital
A2X
Aircraft to everything
AAA
Authentication, authorization and accounting
AAS
Active antenna system
ABMF
Account balance management function
ADRF
Analytics data repository function
AES
Advanced Encryption Standard
AF
Application function
AGC
Automatic gain control
AI
Artificial intelligence
AI/ML
Artificial intelligence and machine learning
A-IoT
Ambient internet of things
AKA
Authentication and key agreement
AM
Acknowledged mode
AMBR
Aggregate maximum bit rate
AMF
Access and mobility management function
AMFI
AMF identifier
AMPS
Advanced Mobile Phone System
AN
Access network
AnLF
Analytics logical function
AoA
Angle of arrival
AoD
Angle of departure
API
Application programming interface
APN
Access point name
AR
Augmented reality
ARIB
Association of Radio Industries and Businesses
ARP
Allocation and retention priority
ARPF
Authentication credential repository and processing function
ARQ
Automatic repeat request
AS
Access stratum
ATIS
Alliance for Telecommunications Industry Solutions
ATSSS
Access traffic steering, switch and splitting
AuC
Authentication centre
AUSF
Authentication server function
AUTN
Authentication token
BAP
Backhaul adaptation protocol
BCCH
Broadcast control channel
BCH
Broadcast channel
BD
Billing domain
BLER
Block error ratio
BM-SC
Broadcast/multicast service centre
BPSK
Binary phase shift keying
BSF
Binding support function
BSR
Buffer status report
BTS
Base transceiver station
BWP
Bandwidth part
C2
Command and control
CA
Carrier aggregation
CAA
Civil Aviation Administration
CAG
Closed access group
CAPC
Channel access priority class
CBG
Code block group
CCCH
Common control channel
CCE
Control channel element
CCSA
China Communications Standards Association
CDM
Code division multiplexing
CDMA
Code division multiple access
CDR
Charging data record
CE
Control element
CGF
Charging gateway function
CHF
Charging function
CHO
Conditional handover
CIoT
Cellular internet of things
cIPX
Consumer’s IPX
CI-RNTI
Cancellation indication RNTI
CJT
Coherent joint transmission
CLI
Cross-link interference
CLI-RSSI
CLI received signal strength indicator
CM
Connection management
CMAS
Commercial mobile alert system
CN
Core network
CNC
Centralized network configuration
cNF
Consumer’s network function
CoMP
Coordinated multi-point
CORESET
Control resource set
CP
Control plane
or
Cyclic prefix
CPRI
Common Public Radio Interface
CQI
Channel quality indicator
C-RAN
Centralized RAN
or
Cloud RAN
CRB
Common resource block
CRC
Cyclic redundancy check
CRI
CSI-RS resource indicator
CriC
Critical communication
C-RNTI
Cell RNTI
CRUD
Create, read, update and delete
CS
Circuit switched
cSEPP
Consumer’s SEPP
CSFB
Circuit-switched fallback
CSI
Channel state information
CSI-IM
CSI interference measurement
CSI-RS
CSI reference signal
CS-RNTI
Configured scheduling RNTI
CTF
Charging trigger function
CU
Central unit
D/A
Digital to analogue
D2D
Device-to-device
DAPS
Dual active protocol stack
dB
Decibel
dBi
Decibels relative to an isotropic antenna
dBm
Decibels relative to 1 milliwatt
DC
Dual connectivity
DCCF
Data collection coordination function
DCCH
Dedicated control channel
DCI
Downlink control information
DDNMF
Direct discovery name management function
DFT
Discrete Fourier transform
DFT-s-OFDMA
Discrete Fourier transform spread OFDMA
DFS
Dynamic frequency sharing
DHCP
Dynamic host configuration protocol
DiffServ
Differentiated services
DL
Downlink
DL-SCH
Downlink shared channel
DM-RS
Demodulation reference signal
DN
Data network
DNAI
Data network access identifier
DNN
Data network name
DNS
Domain name system
D-RAN
Distributed RAN
DRB
Data radio bearer
DRX
Discontinuous reception
DSCP
Differentiated services code point
DSRC
Dedicated short-range communication
DSS
Dynamic spectrum sharing
DS-TT
Device side TSN translator
DTCH
Dedicated traffic channel
DTLS
Datagram transport layer security
DU
Distributed unit
E1-AP
E1 application protocol
EAC
Edge application client
EAP
Extensible authentication protocol
EAS
Edge application server
EASDF
Edge application server discovery function
ECGI
EUTRA cell global identification
EC-GSM
Extended coverage GSM
ECI
EUTRA cell identity
E-CID
Enhanced cell identity
ECIES
Elliptic curve integrated encryption scheme
ECM
EPS connection management
eCPRI
Evolved Common Public Radio Interface
ECS
Edge configuration server
EDC
Edge DNS client
EDGE
Enhanced Data Rates for GSM Evolution
eDRX
Extended discontinuous reception
EEC
Edge enabler client
EEL
Edge enabler layer
EES
Edge enabler server
EHC
Ethernet header compression
EHF
Extremely high frequency
EIR
Equipment identity register
eMBB
Enhanced mobile broadband
EMM
EPS mobility management
eMTC
Enhanced machine-type communications
eNB
Evolved Node B
EN-DC
EUTRA–NR dual connectivity
EPC
Evolved packet core
EPS
Evolved packet system
eRedCap
Enhanced reduced capability
ESM
EPS session management
ESP
Encapsulating security payload
ETSI
European Telecommunications Standards Institute
ETWS
Earthquake and tsunami warning system
EUTRA
Evolved UMTS terrestrial radio access
E-UTRAN
Evolved UMTS terrestrial radio access network
F1-AP
F1 application protocol
FDD
Frequency division duplex
FDMA
Frequency division multiple access
FFT
Fast Fourier transform
FR
Frequency range
GBR
Guaranteed bit rate
GEO
Geostationary earth orbit
GERAN
GSM EDGE radio access network
GFBR
Guaranteed flow bit rate
GM
Grandmaster
GMLC
Gateway mobile location centre
gNB
Next-generation Node B
gNB-CU
gNB central unit
gNB-CU-CP
gNB central unit control plane
gNB-CU-UP
gNB central unit user plane
gNB-DU
gNB distributed unit
GNSS
Global navigation satellite system
GP
Guard period
GPRS
General Packet Radio Service
GPS
Global Positioning System
GPSI
Generic public subscription identifier
gPTP
Generalized precision time protocol
GSA
Global Mobile Suppliers Association
GSCN
Global synchronization channel number
GSM
Global System for Mobile Communications
GSMA
GSM Association
GTP
GPRS tunnelling protocol
GTP-C
GPRS tunnelling protocol control part
GTP-U
GPRS tunnelling protocol user part
GUAMI
Globally unique AMF identifier
GUTI
Globally unique temporary identity
HAPS
High altitude platform station
HARQ
Hybrid ARQ
HARQ-ACK
Hybrid ARQ acknowledgement
HD
Half duplex
HDLLC
High data rate low-latency communication
HF
High frequency
HLR
Home location register
HMTC
High-performance machine-type communication
HRES
Hashed response
HRNN
Human readable network name
HSDPA
High-speed downlink packet access
HSPA
High-speed packet access
HSS
Home subscriber server
HSUPA
High-speed uplink packet access
HTML
Hypertext Markup Language
HTTP
Hypertext Transfer Protocol
HXRES
Hashed expected response
IAB
Integrated access and backhaul
IAB-DU
IAB distributed unit
IAB-MT
IAB mobile termination
IEEE
Institute of Electrical and Electronics Engineers
IETF
Internet Engineering Task Force
IF
Intermediate frequency
IIoT
Industrial internet of things
IKE
Internet Key Exchange
IMEI
International mobile equipment identity
IMEISV
IMEI and software version number
IMS
IP multimedia subsystem
IMSI
International mobile subscriber identity
IMT
International Mobile Telecommunications
INT-RNTI
Interruption RNTI
IoT
Internet of things
IP
Internet Protocol
IPSec
IP security
IPv4
IP version 4
IPv6
IP version 6
IPX
IP packet exchange
I-RNTI
Inactive RNTI
ISI
Inter-symbol interference
ISO
International Organization for Standardization
ITS
Intelligent transport system
ITS-AID
ITS application identifier
ITU
International Telecommunication Union
I-UPF
Intermediate UPF
JOSE
JSON object signing and encryption
JSON
JavaScript Object Notation
JT
Joint transmission
JWE
JSON web encryption
JWS
JSON web signature
L1-RSRP
Layer 1 reference signal received power
L1-SINR
Layer 1 signal-to-interference plus noise ratio
LAA
Licence-assisted access
LAN
Local area network
LBT
Listen before talk
LCID
Logical channel identity
LCS
Location service
LDPC
Low-density parity check
LEO
Low earth orbit
LI
Layer indicator
LMF
Location management function
LoRaWAN
Long-range Wide-area Network
LOS
Line of sight
LPP
LTE positioning protocol
LSB
Least significant bit
LTE
Long-term Evolution
LTE-M
LTE machine-type communication
LTM
Layer 1/layer 2 triggered mobility
LPWA
Low power wide area
LWA
LTE WLAN aggregation
MAC
Medium access control
or
Message authentication code
MBMS-GW
Multimedia broadcast/multicast service gateway
MBR
Maximum bit rate
MBS
Multicast/broadcast service
MBSF
Multicast/broadcast service function
MBSFN
Multicast/broadcast over a single frequency network
MB-SMF
Multicast/broadcast session management function
MBSTF
Multicast/broadcast service transport function
MB-UPF
Multicast/broadcast user plane function
MC
Mission critical
MCC
Mission-critical communication
or
Mobile country code
MCCH
MBS control channel
MCG
Master cell group
MCPTT
Mission-critical push to talk
MCS
Modulation and coding scheme
MCS-C-RNTI
Modulation and coding scheme cell RNTI
MDT
Minimization of drive tests
ME
Mobile equipment
MEC
Mobile edge computing
or
Multi-access edge computing
MeNB
Master eNB
MEO
Medium earth orbit
MFAF
Messaging framework adaptor function
MFBR
Maximum flow bit rate
MgNB
Master gNB
MIB
Master information block
MICO
Mobile-initiated connection only
MIMO
Multiple-input multiple-output
mIoT
Massive internet of things
ML
Machine learning
MME
Mobility management entity
mMIMO
Massive MIMO
MMS
Multimedia Messaging Service
MMSE
Minimum mean square error
mMTC
Massive machine-type communications
MN
Master node
MNC
Mobile network code
MPLS
Multi-protocol label switching
MR
Maximum ratio
or
Mixed reality
MRB
Multicast radio bearer
MR-DC
Multi-radio dual connectivity
MSB
Most significant bit
MSGB-RNTI
Message B RNTI
MSGin5G
Messaging in 5G
MSISDN
Mobile station international subscriber directory number
MT
Mobile termination
MTBF
Mean time between failures
MTC
Machine-type communications
MTCH
MBS traffic channel
MTLF
Model training logical function
MU-MIMO
Multiple-user MIMO
MVNO
Mobile virtual network operator
N3IWF
Non-3GPP interworking function
NAI
Network access identifier
NAS
Non-access stratum
NAT
Network address translation
NB-IoT
Narrowband internet of things
NCC
Next-hop chaining counter
NCGI
New Radio cell global identity
NCI
New Radio cell identity
NCJT
Non-coherent joint transmission
NCR
Network-controlled repeater
NCR-FwD
NCR forwarding
NCR-MT
NCR mobile termination
NDS
Network domain security
NE-DC
NR–EUTRA dual connectivity
NEA
Encryption algorithm for 5G
NEF
Network exposure function
NEO
Network operation
NF
Network function
NFV
Network function virtualization
NG-AP
Next-generation application protocol
ng-eNB
Next-generation evolved Node B
NGEN-DC
NG-RAN–EUTRA–NR dual connectivity
ngKSI
Key set identifier for 5G
NG-RAN
Next-generation radio access network
NH
Next hop
NIA
Integrity algorithm for 5G
NID
Network identifier
NLOS
Non-line of sight
NMT
Nordic Mobile Telephone
NPN
Non-public network
NR
New Radio
NR-ARFCN
New Radio absolute radio frequency channel number
NR-DC
NR–NR dual connectivity
NRF
Network repository function
NRPPa
New Radio positioning protocol A
NR-U
New Radio unlicensed
NSA
Non-standalone
NSACF
Network slice admission control function
NSAG
Network slice access stratum group
NSI-ID
Network slice instance identifier
NSSAAF
Network slice-specific and SNPN authentication and authorization function
NSSAI
Network slice selection assistance information
NSSF
Network slice selection function
NTN
Non-terrestrial network
NWDAF
Network data analytics function
NW-TT
Network side TSN translator
NZP
Non-zero power
OFDM
Orthogonal frequency division multiplexing
OFDMA
Orthogonal frequency division multiple access
O-CU
O-RAN central unit
O-DU
O-RAN distributed unit
O-RAN
Open RAN
OSA
Open service access
OSI
Open Systems Interconnection
P25
Project 25
PAnF
ProSe anchor function
PBCH
Physical broadcast channel
PC5-D
PC5 discovery
PC5-S
PC5 signalling
PC5-LINK-AMBR
PC5 link aggregate maximum bit rate
PCC
Policy and charging control
PCCH
Paging control channel
PCell
Primary cell
PCF
Policy control function
PCH
Paging channel
PCI
Physical cell identity
PCRF
Policy and charging rules function
P-CSCF
Proxy call session control function
PDB
Packet delay budget
PDCCH
Physical downlink control channel
PDCP
Packet data convergence protocol
Portable document format
PDN
Packet data network
PDN-GW
Packet data network gateway
PDP
Packet data protocol
PDR
Packet detection rule
PDSCH
Physical downlink shared channel
PDU
Protocol data unit
PEI
Permanent equipment identifier
or
Paging early indication
PER
Packet error rate
PF
Paging frame
PFCP
Packet forwarding control protocol
PFD
Packet flow description
PFI
PC5 QoS flow identifier
PGW
Packet data network gateway
PGW-C
Packet data network gateway control plane
PGW-U
Packet data network gateway user plane
PHR
Power headroom report
PHY
Physical layer
pIPX
Producer’s IPX
PKMF
ProSe key management function
PLMN
Public land mobile network
PLMN-ID
Public land mobile network identity
PMI
Pre-coding matrix indicator
pNF
Producer’s network function
PNI-NPN
Public network integrated non-public network
PO
Paging occasion
PQI
PC5 5G QoS identifier
PRACH
Physical random access channel
PRB
Physical resource block
P-RNTI
Paging RNTI
ProSe
Proximity-based services
PRS
Positioning reference signal
PRU
Positioning reference unit
PS
Packet switched
PSA
PDU session anchor
PSBCH
Physical sidelink broadcast channel
PSCCH
Physical sidelink control channel
PSCell
Primary SCG cell
PSDB
PDU set delay budget
pSEPP
Producer’s SEPP
PSER
PDU set error rate
PSFCH
Physical sidelink feedback channel
PSIHI
PDU set integrated handling information
PSS
Primary synchronization signal
PSSCH
Physical sidelink shared channel
PSTN
Public-switched telephone network
PTM
Point-to-multipoint
PTP
Point-to-point
or
Precision time protocol
PT-RS
Phase-tracking reference signal
PTT
Push-to-talk
PUCCH
Physical uplink control channel
PUSCH
Physical uplink shared channel
QAM
Quadrature amplitude modulation
QCI
QoS class identifier
QCL
Quasi co-location
QFI
QoS flow identifier
QNC
QoS notification control
QoS
Quality of service
QPSK
Quadrature phase shift keying
RACH
Random access channel
RAN
Radio access network
RAND
Random number
RAPID
Random access preamble identifier
RA-RNTI
Random access RNTI
RAT
Radio access technology
RB
Resource block
RBG
Resource block group
RE
Resource element
RedCap
Reduced capability
REG
Resource element group
RES
Response
REST
Representational state transfer
RF
Radio frequency
or
Rating function
RFSP
RAT/frequency selection priority
RI
Rank indication
RIC
RAN intelligent controller
RIM-RS
Remote interference management reference signal
RIS
Reconfigurable intelligent surface
RLC
Radio link control
RM
Registration management
RNA
RAN-based notification area
RNTI
Radio network temporary identifier
ROHC
Robust header compression
RPAUID
Restricted ProSe application user identifier
RQA
Reflective QoS attribute
RRC
Radio resource control
RRH
Remote radio head
RSCP
Reference signal carrier phase
RSRP
Reference signal received power
RSRQ
Reference signal received quality
RSSI
Received signal strength indicator
RSU
Roadside unit
RT
Real-time
RTP
Real-time transport protocol
RTT
Round trip time
RV
Redundancy version
S1-AP
S1 application protocol
SA
Standalone
SBCCH
Sidelink broadcast control channel
SBFD
Sub-band non-overlapping full duplex
SCCH
Sidelink control channel
SCEF
Service capability exposure function
SCell
Secondary cell
SC-FDMA
Single-carrier frequency division multiple access
SCG
Secondary cell group
SCH
Shared channel
SCI
Sidelink control information
SCP
Service communication proxy
SCTP
Stream control transmission protocol
SD
Slice differentiator
SDAP
Service data adaptation protocol
SDF
Service data flow
SDL
Supplementary downlink
SDN
Software-defined networking
SDU
Service data unit
SEAF
Security anchor function
SEAL
Service enabler architecture layer
SEG
Security gateway
SeNB
Secondary eNB
SEPP
Security edge protection proxy
SFCI
Sidelink feedback control information
SFI
Slot format indication
SFI-RNTI
Slot format indication RNTI
SFN
System frame number
SgNB
Secondary gNB
SGW
Serving gateway
SHF
Super high frequency
SI
Segmentation information
SIB
System information block
SIDF
Subscription identifier de-concealing function
SIM
Subscriber identity module
SINR
Signal-to-interference plus noise ratio
SIR
Signal-to-interference ratio
SI-RNTI
System information RNTI
SL
Sidelink
SL-BCH
Sidelink broadcast channel
SL-BSR
Sidelink buffer status report
SL-CAPC
Sidelink channel access priority class
SL-MIB
Sidelink master information block
SLPP
Sidelink positioning protocol
SL-PRS
Sidelink positioning reference signal
SL-RSRP
Sidelink reference signal received power
SL-SCH
Sidelink shared channel
SL-SRB
Sidelink signalling radio bearer
SLSSID
Sidelink synchronization signal identity
SLIV
Start and length indicator value
SMF
Session management function
SMS
Short Message Service
SMSF
SMS function
SMS-GMSC
SMS gateway mobile switching centre
SMS-IWMSC
SMS interworking mobile switching centre
SMS-SC
SMS service centre
SN
Secondary node
or
Sequence number
SNPN
Standalone non-public network
SNR
Signal-to-noise ratio
S-NSSAI
Single network slice selection assistance information
SO
Segment offset
SON
Self-optimizing network
or
Self-organizing network
SpCell
Special cell
SP-CSI-RNTI
Semi-persistent CSI RNTI
SPS
Semi-persistent scheduling
S-PSS
Sidelink primary synchronization signal
SR
Scheduling request
SRB
Signalling radio bearer
SRI
SRS resource indicator
SRS
Sounding reference signal
SRS-RSRP
SRS reference signal received power
SRVCC
Single radio voice call continuity
SS
Synchronization signal
SSB
SS/PBCH block
SSBRI
SS/PBCH block resource indicator
SSC
Session and service continuity
SS-RSRP
Synchronization signal reference signal received power
SS-RSRQ
Synchronization signal reference signal received quality
SSS
Secondary synchronization signal
S-SSS
Sidelink secondary synchronization signal
SST
Slice/service type
STCH
Sidelink traffic channel
SUCI
Subscription concealed identifier
SUL
Supplementary uplink
SU-MIMO
Single-user MIMO
SUPI
Subscription permanent identifier
SVD
Singular value decomposition
TA
Timing advance
or
Tracking area
TAC
Tracking area code
TACS
Total Access Communication System
TAG
Timing advance group
TAI
Tracking area identity
TCI
Transmission configuration indicator
TCP
Transmission Control Protocol
TC-RNTI
Temporary cell RNTI
TDCP
Time domain channel property
TDD
Time division duplex
TDMA
Time division multiple access
TDOA
Time difference of arrival
TD-SCDMA
Time division synchronous code division multiple access
TE
Terminal equipment
TEID
Tunnel endpoint identifier
TETRA
Terrestrial Trunked Radio
TLS
Transport Layer Security
TM
Transparent mode
TMGI
Temporary mobile group identity
TMSI
Temporary mobile subscriber identity
TNGF
Trusted non-3GPP gateway function
TPC
Transmit power control
TPC-PUCCH-RNTI
Transmit power control PUCCH RNTI
TPC-PUSCH-RNTI
Transmit power control PUSCH RNTI
TPC-SRS-RNTI
Transmit power control SRS RNTI
TR
Technical report
TRP
Transmit/receive point
TRS
Tracking reference signal
TS
Technical specification
TSC
Time-sensitive communication
TSCAC
Time-sensitive communication assistance container
TSCAI
Time-sensitive communication assistance information
TSCTSF
Time-sensitive communication and time synchronization function
TSDSI
Telecommunications Standards Development Society, India
TSN
Time-sensitive networking
TSN AF
Time-sensitive networking application function
TTA
Telecommunications Technology Association
TTC
Telecommunication Technology Committee