Explore chapters and articles related to this topic
NR: Architecture, Protocol, Challenges, and Applications
Published in Mangesh M. Ghonge, Ramchandra Sharad Mangrulkar, Pradip M. Jawandhiya, Nitin Goje, Future Trends in 5G and 6G, 2021
Virendra A. Uppalwar, Trupti S. Pandilwar
PDCP maintains the PDCP SN number. PDCP offers header compression and decompression using the ROHC protocol. It provides services such as ciphering and deciphering, integrity protection and integrity verification, timer-based SDU discards, duplicate detection and discarding of SDUs and reordering and in-order delivery of SDUs. In the following diagram, PDCP is precisely linked with RLC UM and RLC AM mode only, there is no collaboration with RLC TM mode because there is no path for RLC TM mode with PDCP (Figure 2.16).The upper layer expects the following services from PDCP:The PDCP layer transfer the user plane and control plane data to the above layersThe PDCP layer handles the header compression mechanismThe PDCP layer is also involved in security using ciphering and integrity protection procedures
Packet Data Convergence Protocol Sublayer
Published in Hossam Fattah, 5G LTE Narrowband Internet of Things (NB-IoT), 2018
Ciphering and deciphering refers to the process of encrypting or decrypting the PDCP PDU. Ciphering is activated by RRC sublayer when receiving RRC SecurityModeCommand PDU. The parameters used for ciphering and deciphering include the following [24]: KEY: Both the keys, KRRCenc and KUPenc, are driven by RRC and used for ciphering signalling or data-plane PDU, respectively. Keys are 128 bit long.BEARER: 5-bit bearer ID.COUNT: 32-value that is the concatenation of HFN and PDCP PDU SN.DIRECTION: 0 for uplink and 1 for downlink.
Communication systems and network technologies
Published in Kennis Chan, Future Communication Technology and Engineering, 2015
PDCP entity is located in its sub-layer and an UE can define multiple PDCP entities. PDCP supports the function of Robust Header Compression (ROHC) protocol used for the compression and decompression header of IP data stream for transmitting and receiving entities.
5GSS: a framework for 5G-secure-smart healthcare monitoring
Published in Connection Science, 2022
Jianqiang Hu, Wei Liang, Osama Hosam, Meng-Yen Hsieh, Xin Su
In this architecture, sensors and advanced health services can be connected to the edge cloud through 5G RANs (Radio Access Networks). 5G RAN includes a distributed unit and a central unit, which has a bottom–top protocol stack: Radio Frequency, PHY, MAC, Radio Link Control, and Packet Data Convergence Protocol. Additionally, 5G RANs support a wide range of spectrum bands. SDN and Network Functions Virtualisation Infrastructure (NFV) are important driving forces for 5G network to edge computing. SDN can divide a network into control plane and data plane to improve network flexibility and agility, which helps to deploy new services and simplify network management. As a consequence, 5G SDN is suitable for dynamic sensors and reliable nature of advanced health services. Moreover, NFV performs network functions in virtual machines on edge servers, which can provide flexible and scalable networks to process large amounts of physical data and context information. Context-aware data fusion and health situation identification are constructed in the form of VFVs, which can run as virtual machines. Through SDN and NFV infrastructure, the 5G-IPv6 network architecture (see Figure 3) shows very good flexibility, cost-efficiency, and scalability. Mobility management scheme
Delay Jitter Performance Analysis and Traffic Splitting in Cellular-Based Multi-Access System
Published in IETE Technical Review, 2023
Megha Sahu, Arzad Alam Kherani
Figure 1 emphasizes the LTE protocol stack consists of Radio Link Control (RLC), Packet Data Convergence Protocol (PDCP), Medium Access Control (MAC), and Physical layer. The Service Data Units (SDUs) at the PDCP layer are IP packets and at the MAC layer are Transport Block Sizes (TBS) (see [9] and [10], respectively, for LTE PDCP and MAC specifications). TBS is the amount of allocation (in Bytes) provided by eNB. For a smaller size IP packet, one Transport Block may serve multiple IP packets in the uplink, making the IP traffic coming out of the eNB bursty essentially because the eNB scheduling algorithm typically waits for some number of IP packets to be accumulated at the transmitter PDCP and then schedule it using the ongoing TBS.