0% found this document useful (0 votes)
2 views

Zigbee Protocol Overview - Copy

Uploaded by

sharransri1122
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Zigbee Protocol Overview - Copy

Uploaded by

sharransri1122
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Zigbee Protocol Overview

• AnIEEE 802.15.4 based specification for a suite of high-level communication protocols


• used to create personal area networks with small, low-power digital radios, such as for home
automation, medical device data collection, and other low-power low-bandwidth needs, designed
for small scale projects which need wireless connection
• A low-power, low data rate, and close proximity (i.e., personal area) wireless ad hoc
network
• Its low power consumption limits transmission distances to 10–100 meters line-of-sight,
depending on power output and environmental characteristics
• Zigbee devices can transmit data over long distances by passing data through a mesh
network of intermediate devices to reach more distant ones
• Zigbee is typically used in low data rate applications that require long battery life and
secure networking
• Zigbee networks are secured by 128 bit symmetric encryption keys
• Zigbee has a defined rate of up to 250 kbit/s, best suited for intermittent data
transmissions from a sensor or input device
Radio hardware
• The radio design used by Zigbee has few analog stages and uses digital
circuits wherever possible
• Specifies operation in the unlicensed 2.4 to 2.4835 GHz (worldwide), 902 to
928 MHz(Americas and Australia) and 868 to 868.6 MHz (Europe) ISM bands
• Sixteen channels are allocated in the 2.4 GHz band, spaced 5 MHz apart, though
using only 2 MHz of bandwidth each
• The radios use direct-sequence spread spectrum coding, which is managed by the
digital stream into the modulator
• Binary phase-shift keying (BPSK) is used in the 868 and 915 MHz bands,
and offset quadrature phase-shift keying (OQPSK) that transmits two bits per
symbol is used in the 2.4 GHz band
• The raw, over-the-air data rate is 250 kbit/s per channel in the 2.4 GHz band,
40 kbit/s per channel in the 915 MHz band, and 20 kbit/s in the 868 MHz band
• The actual data throughput will be less than the maximum specified bit rate due to the packet
overhead and processing delays
• For indoor applications at 2.4 GHz, transmission distance is 10–20 m, depending
on the construction materials, the number of walls to be penetrated and the output
power permitted in that geographical location
• The output power of the radios is generally 0–20 dBm (1–100 mW)
Architecture
Physical Layer
MAC Layer
Network Layer
Application Layer
Device types
• Zigbee coordinator (ZC)
• The most capable device, the coordinator forms the root of the network tree and may bridge to
other networks
• There is precisely one Zigbee coordinator in each network since it is the device that started the
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 1/19
network originally
• It stores information about the network, including acting as the trust center and repository for
security keys
• Zigbee router (ZR)
• As well as running an application function, a router can act as an intermediate router, passing
data
on from other devices
• Zigbee end device (ZED)
• Contains just enough functionality to talk to the parent node (either the coordinator or a
router)
• Cannot relay data from other devices
• This relationship allows the node to be asleep a significant amount of the time thereby giving
long
battery life
• A ZED requires the least amount of memory and thus can be less expensive to
manufacture than a ZR or ZC

Architecture
Application Layer (APL)
Application Framework
ZigBee Device Object
Application Support Sub-layer
Network Layer (NWK)
Security Managem.
Message Broker
Routing Managem.
Network Managem.
Medium Access Control (MAC)
Beacon mode
Slotted CSMA/CA
GTS allocation
Non-beacon mode
Non slotted CSMA/CA
Defined in zigbee specification
Defined in 802.15.4 standard
Physical Layer (PHY)
2.4 GHz/ 250 kbps
915 MHz/ 40 kbps
868 MHz/ 20 kbps

Physical Layer
Activation and deactivation of the radio transceiver
Receiver Energy Detection
Link Quality Indication
Clear Channel Assessment
Channel Frequency Selection
• Transmitting
• Receiving
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 2/19
Sleeping
Estimating received signal power
Quality of a received signal
Tune its transceiver in to specific channel
Energy Detection mode
• Carrier Sense mode
Carrier Sense with Energy Detection mode
Tune its transceiver in to specific channel

MAC Layer
Contention access period(without GTS)
Slotted CSMA/CA
Slotted CSMA/CA/slot allocations
Unslotted CSMA/CA
Super frame
BEACON- ENABLED MODE
802.15.4 MAC
NON BEACON- ENABLED MODE
Contention Free Period(with GTS)

Network Layer
NETWORK DATA SERVICE
Generates NPDU
Topology specific routing
NETWORK MANAGEMENT SERVICE
Configuring a new device
Starting a network
Joining or leaving a network
Addressing
Neighbor discovery
Route discovery
Reception control

Application Layer
APPLICATION SUPPORT SUB-LAYER
THE APPLICATION FRAMEWORK
APPLICATION OBJECTS
ZIGBEE DEVICE OBJECT
Maintaining tables for binding
Message forwarding between bound end devices
• Providing services
Key Value Pair service
Generic Message service
Manufacturer defined component
Holds key-value attributes
Role of the device
Responsible for Discovery

give full explanation


Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 3/19
The Zigbee protocol is a specification developed under IEEE 802.15.4 for creating low-power, low-
bandwidth wireless personal area networks (WPANs). It is optimized for applications requiring efficient
and secure wireless connectivity, such as home automation, medical device data collection, and other
scenarios where long battery life and minimal data transmission are essential. Let’s explore the
technical details and architecture of Zigbee.

Key Features of Zigbee

1. Low Power & Data Rate: Zigbee is designed for applications that require low power, which
makes it suitable for battery-powered devices. It provides a data rate of up to 250 kbit/s, ideal for
intermittent data transmissions.
2. Short Transmission Range: Transmission distances typically range from 10–100 meters,
depending on environmental factors and power output. Zigbee devices use mesh networking to
extend range.
3. Mesh Networking: Zigbee can pass data through intermediate devices in a mesh network,
allowing data to reach distant nodes by hopping through other devices in the network.
4. Security: Zigbee employs 128-bit symmetric encryption keys, which provides a level of security
suitable for low-power applications.

Radio Hardware and Specifications

Zigbee operates within the unlicensed ISM frequency bands:

2.4 GHz Band: Used worldwide, offering a data rate of 250 kbit/s. Sixteen channels are available,
each spaced 5 MHz apart but using only 2 MHz of bandwidth.
915 MHz Band: Used in the Americas and Australia, with a data rate of 40 kbit/s.
868 MHz Band: Used in Europe, offering a data rate of 20 kbit/s.

Zigbee’s radio hardware is designed with minimal analog circuitry, maximizing the use of digital
components to reduce power consumption and cost. It employs Binary Phase-Shift Keying (BPSK) in
the 868 and 915 MHz bands, while Offset Quadrature Phase-Shift Keying (OQPSK) is used in the 2.4
GHz band.

Zigbee Architecture

The Zigbee stack consists of several layers based on the OSI model, each responsible for specific
functions:

1. Physical Layer (PHY)

Manages activation and deactivation of the radio transceiver.


Channel Frequency Selection and Clear Channel Assessment for reliable communication.
Link Quality Indication (LQI) and Receiver Energy Detection for assessing the quality of
received signals.
Operates in three frequency bands: 2.4 GHz, 915 MHz, and 868 MHz.

2. Medium Access Control (MAC) Layer


Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 4/19
Implements Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) to avoid
collisions.
Beacon-enabled Mode (with slotted CSMA/CA and Guaranteed Time Slots) and Non-beacon
Mode (using unslotted CSMA/CA).
Defines the superframe structure in beacon-enabled mode, where devices can communicate
during designated slots.

3. Network Layer (NWK)

Network Data Service: Generates NPDU (Network Protocol Data Units) and provides topology-
specific routing.
Network Management Service: Manages device configuration, network initiation, joining, or
leaving a network.
Provides Neighbor and Route Discovery functions to support efficient routing.
Reception Control and addressing for device communication within the network.

4. Application Layer (APL)

Application Support Sub-layer: Provides binding and messaging services for data exchange
between devices.
Application Framework: Defines application objects and the Zigbee Device Object (ZDO),
which maintains device roles, binding tables, and services.
Zigbee Device Object (ZDO): Handles device discovery, network joining, and key-value services
to facilitate communication and device roles.
Provides generic message services and device functionality based on the application.

Device Types in Zigbee

1. Zigbee Coordinator (ZC): The central device in a Zigbee network that forms the root of the
network tree and manages security keys. It acts as the trust center and can bridge to other
networks.
2. Zigbee Router (ZR): An intermediary device that can forward data between devices, extending
the range of the network.
3. Zigbee End Device (ZED): A simple device that communicates with its parent node (coordinator
or router) and remains asleep for extended periods to conserve power. This is the least
expensive device type due to minimal memory requirements.

Operating Modes

Beacon-Enabled Mode: Utilizes slotted CSMA/CA with guaranteed time slots, where the
coordinator periodically sends beacons to synchronize devices.
Non-Beacon Mode: Uses unslotted CSMA/CA, where devices compete for access to the medium
without synchronization.

Summary of Key Components in Zigbee

Layer Key Functions Zigbee Specification


Physical Frequency selection, energy detection, LQI IEEE 802.15.4
MAC CSMA/CA, superframe structure, beacon management IEEE 802.15.4

Network Routing, addressing, device configuration Zigbee Specification

Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 5/19
Layer Key Functions Zigbee Specification
Application Binding, messaging, device discovery, ZDO Zigbee Specification

Zigbee is ideal for small-scale, battery-efficient, secure, and low-bandwidth applications, such as
sensors in a smart home or medical monitoring, where continuous high-speed data transmission is
not required. Its robust mesh networking allows it to operate effectively even in challenging wireless
environments, making it a popular choice for IoT applications.

explian the 4 layer in a further. i cant understand

Certainly! Let’s go deeper into each of the four layers in the Zigbee architecture—Physical (PHY),
Medium Access Control (MAC), Network (NWK), and Application (APL)—and their roles in enabling
communication within a Zigbee network.

1. Physical Layer (PHY)

The Physical Layer (PHY) is the foundation of the Zigbee communication stack, responsible for directly
interfacing with the radio hardware. It handles everything related to the actual sending and receiving
of signals over the air.

Key Functions:

Activation and Deactivation of the Radio Transceiver: This layer turns the radio on or off,
which helps manage power consumption. The radio is activated when sending or receiving data
and deactivated during idle times to save battery.
Channel Frequency Selection: It selects the appropriate frequency channel for communication.
Zigbee uses specific frequencies in the ISM bands, such as 2.4 GHz, to operate globally without
requiring licenses.
Clear Channel Assessment (CCA): Before transmitting, the PHY layer checks if the channel is
free. This helps avoid interference with other devices that may be using the same frequency.
Receiver Energy Detection (RED) and Link Quality Indication (LQI): These functions help
assess the quality of received signals and measure signal strength, enabling better decisions
about routing and device placement.
Modulation: For encoding data, Zigbee uses Binary Phase-Shift Keying (BPSK) in the 868 and 915
MHz bands and Offset Quadrature Phase-Shift Keying (OQPSK) in the 2.4 GHz band.

In essence, the PHY layer focuses on getting data bits onto the airwaves reliably and efficiently,
managing signal strength, and ensuring data transmission integrity.

2. Medium Access Control (MAC) Layer

The MAC Layer operates right above the PHY layer and is responsible for coordinating how devices
share access to the communication channel. This is especially important in wireless networks to avoid

Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 6/19
data collisions.

Key Functions:

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): This protocol listens to the
channel before sending data to avoid interference. If the channel is busy, the device waits and
tries again.
Beacon-Enabled Mode: In this mode, a coordinator sends regular beacon signals to synchronize
network devices. These beacons help organize when devices should communicate and are part
of the superframe structure.
Slotted CSMA/CA: When using beacons, communication is organized into time slots.
Devices only transmit during their designated slot, reducing collision risk.
Non-Beacon Mode: In networks without beacons, Zigbee devices use unslotted CSMA/CA.
Devices transmit data without a structured time slot, suitable for simpler applications without
tight synchronization.
Guaranteed Time Slots (GTS): Certain devices can reserve specific time slots for communication,
ensuring they can transmit without waiting, which is useful for critical data.

The MAC layer’s primary job is to control when devices can access the shared communication medium,
preventing data collisions and ensuring orderly communication in the network.

3. Network Layer (NWK)

The Network Layer (NWK) provides Zigbee’s routing and network management capabilities. This layer
allows devices to join and leave the network and ensures data reaches the correct destination, even if
it needs to pass through multiple devices in a mesh network.

Key Functions:

Topology Management: Manages the network structure, such as star, tree, or mesh topology. In
a mesh topology, data can hop from one device to another, extending the communication range.
Routing: Decides the best path for data to travel across the network. If a direct route isn’t
available, the NWK layer finds an alternative path through other devices.
Addressing: Assigns unique network addresses to devices, ensuring data is routed to the correct
recipient. It handles both short and long addresses for efficient communication.
Device Discovery: Detects and manages devices as they join or leave the network, keeping track
of neighbors and routes.
Network Management: Configures devices and controls joining or leaving processes. This
includes tasks like initiating a network, finding routes, and adjusting routes dynamically if a
device becomes unavailable.

In short, the NWK layer manages the structure, routing, and organization of the Zigbee network,
enabling devices to communicate with one another reliably, even if they are not within direct range.

4. Application Layer (APL)

The Application Layer is the topmost layer, where the actual application logic resides. It supports
various services and ensures that data is correctly passed between applications on different Zigbee
devices. This layer defines the device roles and functions within the network, such as sensors,
controllers, and other user-defined applications.
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 7/19
Key Components:

Application Support Sub-layer (APS): Manages binding tables, which keep track of relationships
between devices. For example, a sensor may be “bound” to an alarm device so that when a
condition is detected, the sensor can trigger the alarm.
Binding: A method for connecting two devices so they can communicate directly. Binding
tables tell devices where to send messages.
Message Forwarding: Directs messages between devices based on the binding.
Zigbee Device Object (ZDO): This component manages device discovery, network roles, and
security. It also assigns device roles (e.g., coordinator, router, end device) and allows devices to
discover and communicate with each other.
Device Discovery: Helps devices find each other on the network.
Role Management: Assigns each device a role, such as coordinator or end device.
Application Framework: Defines the set of application objects and provides communication
between them. Devices can have multiple application objects (like a temperature sensor and a
humidity sensor) that communicate within the application framework.

The Application Layer is where Zigbee’s specific functions, like device control and monitoring, happen.
It enables services and applications that need a secure and efficient communication system within the
Zigbee network.

Summary

Each of the four layers has a specific role:

Physical Layer: Transmits and receives data over the radio.


MAC Layer: Manages access to the shared communication channel.
Network Layer: Provides routing, addressing, and network management.
Application Layer: Enables communication between applications on different devices.

Together, these layers form the Zigbee stack, supporting low-power, low-data-rate wireless
communication ideal for smart homes, medical devices, and industrial automation. Each layer handles
its specialized tasks to ensure data is transmitted efficiently, securely, and with minimal power usage.

what is GTS allocation

Guaranteed Time Slot (GTS) allocation is a mechanism in Zigbee’s MAC layer (Medium Access Control)
that reserves specific time slots for devices to communicate without contention or interference from
other devices. It is particularly useful for applications that need predictable, low-latency
communication, such as real-time data collection from sensors in industrial automation or medical
monitoring systems.

Key Aspects of GTS Allocation

Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 8/19
1. Beacon-Enabled Mode: GTS allocation only operates in networks with a beacon-enabled mode.
In this mode, the network coordinator periodically sends out beacons (signals) to synchronize
the devices in the network.

2. Superframe Structure: In beacon-enabled mode, time is divided into repeating superframes.


Each superframe consists of an active period, when devices can communicate, and an inactive
period, during which devices conserve energy by sleeping. The active period has a Contention
Access Period (CAP) and a Contention-Free Period (CFP):
CAP: During the CAP, devices use CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance) to access the channel, where they compete for transmission opportunities.
CFP: The CFP is the contention-free portion where GTS slots are allocated, meaning only
specific devices can transmit during these slots without competition.

3. Guaranteed Time Slots (GTS): Within the CFP, specific devices are allocated GTSs, allowing them
exclusive access to the network at that time. This ensures that these devices can transmit data
without delay from other devices. Each GTS is dedicated to one device and can be used in either
direction—sending or receiving data.

4. GTS Allocation Process:


A device requests a GTS from the network coordinator, which assesses if there are sufficient
resources to grant it.
The coordinator can allocate up to seven GTS slots in each superframe.
The allocation is dynamic: if the device no longer needs the GTS or leaves the network, the
slot can be reallocated to another device.

Benefits of GTS Allocation

Reduced Latency: Since the device doesn’t need to wait for other devices, GTS allocation reduces
transmission delays.
Predictability: Devices can count on having a dedicated time slot in each superframe, which is
helpful for applications requiring regular data updates.
Power Efficiency: Devices can enter low-power sleep modes when it’s not their turn to transmit,
extending battery life.

Example Use Case

In a Zigbee-based medical monitoring system, a heart rate monitor might require a GTS allocation to
ensure it can send critical data at regular intervals without interference, ensuring reliable and timely
monitoring.

In summary, GTS allocation provides a way to secure specific time slots for devices that need
uninterrupted, predictable communication within a Zigbee network’s beacon-enabled mode.

5G Wireless System: New Radio (NR)


• 5G NR(New Radio) is a newradio access technology (RAT) developed
by 3GPPfor the 5G (fifth generation) mobile network
• Designed to be the global standard for the air interface of 5G networks

Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 9/19
• As with 4G (LTE), it is based on OFDM
• 5G NR uses frequency bands in two frequency ranges:
• Frequency Range 1 (FR1), for bands within 410 MHz – 7125 MHz
• Frequency Range 2 (FR2), for bands within 24250 MHz – 71000 MHz
• Deployment modes
• Non-standalone mode
• Dynamic spectrum sharing
• Standalone mode
5G Protocol Stack
• The mobile is controlled by the 5G core network, the next-generation radio access
network (NG-RAN) and a master next-generation Node B (gNB) alone
• Most of the protocols have the same names and objectives as their 4G equivalents,
but their low-level implementations are different
• In the user plane
• The mobile exchanges packets with an external data network such as the Internet
• Those packets are created by applications in the mobile and the data network, and are
transported over that network using protocols such as TCP and IP
• In the control plane, the mobile
• Exchanges non-access stratum signaling messages with the core network using the 5G
mobility management (5GMM) and 5G session management (5GSM) protocols
• Exchanges access stratum messages with the radio access network using the protocol for radio
resource control (RRC)
• The next four protocols form layer 2 of an OSI protocol stack
• The service data adaptation protocol (SDAP) is new to 5G, and maps the quality of service
(QoS) flows used by the 5G core network onto the data radio bearers used by the NG-RAN
• The packet data convergence protocol (PDCP) secures the air interface’s traffic and signaling
messages, and routes packets through the correct base station in cases of dual connectivity
• The radio link control (RLC) protocol segments any large data packets before transmission,
and handles the high-level re-transmissions
• The medium access control (MAC) protocol schedules transmissions between the mobile and
the base station, and controls the low-level operation of the physical layer. The MAC protocols
in the mobile and network can also communicate with each other by the exchange of MAC
control elements (CEs)
• The physical layer has three main parts:
• The transport channel processor handles the remaining error management tasks
from Chapter 5, including low-level re-transmissions by means of hybrid
automatic repeat request (HARQ)
• The physical channel processor handles the remaining digital signal processing
tasks, notably orthogonal frequency division multiple access (OFDMA) and
multiple antenna processing
• The analogue processor converts the information to analogue form and transmits
it
• The physical layer also handles several procedures for measurement and control
• Inside the core network
• The 5GMM and 5GSM protocols are respectively implemented in the access and mobility
management function (AMF) and the session management function (SMF)
• In the radio access network
• The SDAP is in the gNBcentral unit’s user plane, and the PDCP is split between its user and
control planes
• The RRC protocol lies mainly in the central unit’s control plane, although the distributed unit can
send and receive a small number of unciphered RRC signaling messages as well
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 10/19
• The RLC, MAC and physical layer protocols all lie in the distributed unit
• The information flows between the different protocols are known as channels and signals
• Data and signaling messages travel on
• RLC channels between the PDCP and the RLC
• Logical channels between the RLC and MAC
• Transport channels between the MAC and physical layer
• Physical data channels within the physical layer itself
• Within the physical layer
• The transport channel processors in the mobile and network communicate by exchanging
uplink
and downlink control information, which is delivered by means of physical control channels
• The two physical channel processors communicate by exchanging physical signals
The layer 2/3 protocols in NR protocol stack

5G Protocol Stack
User plane
Control plane
Application
5GMM, 5GSM
TS 24.501
QoS flows
TCP, IP etc.
RRC
TS 38.331
Data radio bearers
SDAP
TS 37.324
Signalling
RLC channels
PDCP
TS 38.323
radio bearers
Logical channels
RLC

TS 38.322
Transport channels
MAC
TS 38.321
Physical layer
TS 38.133, 213, 214, 215
Physical data channels
Transport channel processing
TS 38.212
Physical control channels
Physical channel processing
TS 38.211
Physical signals
Analogue processing
TS 38.101-1, 2, 3
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 11/19
TS 38.104

The layer 2/3 protocols in NR protocol stack


NR protocol structure
OSI seven-layer network model
Non-access stratum (NAS)
Internet protocol (IP)
Application layer
Radio resource control (RRC)
Layer 3
Presentation layer
Qos flows
Session layer
Control configuration
Service data adaptation protocol (SDAP)
Transport layer
RRC PDUS
Radio bearers
Network layer
Control/configuration
Packet data convergence protocol (PDCP)
Data-Link layer
RLC channels
Radio link control (RLC)
Layer 2
Physical layer
Controliconfiguration
Logical channels
Control/configuration
Medium access controll (MAC)
Transport channels
Control/configuration) Physical layer measurements
Physical layer (PHY)
Layer 1
Physical channels

NR layer 2 user-plane and control-plane functional mapping and processing


User-plane
Control-plane
IP packets (user data)
QoS flows
SDAP
QoS management
Radio bearers
Paging
NAS messages
RRC messages
RRC
PDCP
Header compression, encryption
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 12/19
RLC
ARQ
RLC channels
Encryption and integrity protection
ARQ
MAC
HARQ
System information
Logical channels
HARQ
PHY Channel coding
Transport channels
Channel coding
Channel coding
Channel coding
Physical channels

The physical layer in NR protocol stack


NR protocol structure
OSI seven-layer network model
Non access stratum (NAS)
Internet protocol (IP)
Application layer
Radio resource control (RRC)
Layer 3
Presentation layer
QoS Flows
Session layer
Contro configuration
Service data adaptation protocol (SDAP)
Transport layer
RRC PDUS
Radio bearers
Network layer
Contoliconfiguration
Packet data convergence protocol (PDCP)
Data-link layer
Controlconfiguration
RLC channels
Layer 2
Physical layer
Radio link control (RLC)
Logical channels
Medium access control (MAC)
Control/configuration
Transport channels
Control/configuration physical layer measurements
Physical layer (PHY)
Layer 1
Physical channels

Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 13/19
The 5G New Radio (NR) protocol stack is structured to enable high-speed, reliable, and low-latency
communication in 5G networks. It builds on concepts from 4G but introduces new protocols and
improvements, such as increased bandwidth, reduced latency, and support for a greater range of
devices and use cases. Here’s an explanation of the components and layers involved in the 5G NR
protocol stack:

Overview of 5G NR

5G NR is a new radio access technology (RAT) designed by 3GPP for 5G networks. It aims to become
the global standard for 5G communication, supporting two frequency ranges:

Frequency Range 1 (FR1): 410 MHz – 7125 MHz


Frequency Range 2 (FR2): 24250 MHz – 71000 MHz

5G can operate in both standalone (SA) and non-standalone (NSA) modes:

NSA mode allows 5G NR to be deployed on top of existing 4G LTE infrastructure.


SA mode uses a full 5G core network, providing independent 5G coverage and services.

5G Protocol Stack

The 5G protocol stack is divided into control plane and user plane functions, enabling
communication between mobile devices and the core network:

1. User Plane: Handles the transmission of data packets (such as internet data) between the
mobile device and an external data network.
2. Control Plane: Manages signaling between the mobile device and the network for session
management, mobility management, and resource allocation.

Layers in the 5G NR Protocol Stack

The 5G NR protocol stack follows the OSI model and includes layers like the physical layer, MAC, RLC,
PDCP, SDAP, and control protocols like RRC and NAS.

Physical Layer (PHY)

The physical layer is responsible for the actual transmission and reception of data over the air
interface, performing tasks like channel coding, modulation, and signal processing:

Transport Channel Processor: Manages error correction using HARQ (Hybrid Automatic Repeat
Request).
Physical Channel Processor: Performs signal processing for orthogonal frequency division
multiplexing (OFDMA) and multi-antenna processing.
Analog Processor: Converts digital signals into analog form for transmission over the air.

Layer 2 Protocols

Layer 2 in 5G NR includes SDAP, PDCP, RLC, and MAC, each performing a specific role in handling data
packets before transmission over the physical layer.
Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 14/19
1. Service Data Adaptation Protocol (SDAP):
New to 5G, SDAP maps quality of service (QoS) flows from the 5G core network onto data
radio bearers, ensuring that data packets are prioritized and handled based on QoS
requirements.

2. Packet Data Convergence Protocol (PDCP):


Responsible for header compression, encryption, and integrity protection. It also supports
routing packets between base stations for dual connectivity.

3. Radio Link Control (RLC):


Segments large data packets for transmission, handles reassembly, and manages ARQ
(Automatic Repeat Request) for retransmission of lost packets.

4. Medium Access Control (MAC):


Coordinates the transmission of data over the physical layer and schedules uplink and
downlink data. It also manages MAC control elements (CEs) for signaling between the
device and network.

Layer 3 Protocols

Layer 3 in 5G includes the Radio Resource Control (RRC) and Non-Access Stratum (NAS).

1. Radio Resource Control (RRC): manages connection between the network


Manages the configuration and control of the radio bearers and handles signaling between
the mobile device and the radio access network (RAN).
RRC is crucial for session management, security, and mobility procedures.

2. Non-Access Stratum (NAS):


NAS is part of the 5G core network and handles the 5G mobility management (5GMM) and
session management (5GSM) protocols.
5GMM is responsible for managing the device's connection to the network, while 5GSM
manages session establishment and QoS.

Data Flow Through the 5G NR Protocol Stack

1. User Plane Data:


User data packets, such as internet data, move through the SDAP layer, which assigns QoS,
then pass through PDCP (for header compression and encryption), RLC (for segmentation
and reassembly), and MAC (for scheduling) before reaching the physical layer for
transmission.

2. Control Plane Data:


Control messages for managing the connection and resources flow through the RRC and
NAS layers, following a similar path to the physical layer for communication between the
device and network.

Protocol Channels and Information Flow

Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 15/19
Information flows between different layers via channels and signals:

Logical Channels: Carry specific types of information between RLC and MAC.
Transport Channels: Transfer data between MAC and the physical layer.
Physical Channels: Enable communication within the physical layer, including both data and
control channels for managing the transmission process.

Summary

The 5G NR protocol stack is a sophisticated structure designed to support the high-speed, low-latency
requirements of 5G networks. It leverages advanced protocols and processes for data management
and ensures reliable communication across the user plane and control plane, with each layer
performing specific functions to achieve efficient communication across the 5G air interface.

i cant understand

Let's simplify the 5G New Radio (NR) protocol stack step-by-step. This overview will explain the
purpose and roles of each part in plain terms.

1. What is 5G NR?

5G New Radio (NR) is the technology that allows devices (like smartphones) to connect to 5G networks.
It’s designed to provide faster speeds, lower latency (delay), and more reliable connections compared
to previous generations like 4G.

2. Two Key Functions in 5G Networks

User Plane: Deals with data transmission (e.g., your internet browsing or video streaming).
Control Plane: Manages signaling and control functions (e.g., setting up and maintaining
connections, switching towers as you move).

3. How Data Moves Through the 5G Stack (Layers)

Think of the 5G protocol stack as a set of layers that each play a specific role in getting data from your
device to the internet, or vice versa. These layers follow the OSI Model, a standard structure used for
organizing network communications.

Layer 1: Physical Layer (PHY)

What it Does: This layer takes the digital data (like a webpage or video) and prepares it for
transmission as radio signals over the air.
Key Tasks:
Channel coding: Adds error correction codes to data to help recover it if it’s partially lost.
Modulation: Turns digital data into radio waves that can be transmitted.

Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 16/19
Signal Processing: Manages how the signals are spread over the air to reduce interference.

Layer 2: Data Link Layer (Divided into Sub-layers)

1. Service Data Adaptation Protocol (SDAP):


What it Does: SDAP maps data to different "quality of service" (QoS) levels. This is like
assigning "priority lanes" for data depending on whether it’s a video call or a text message.

2. Packet Data Convergence Protocol (PDCP):


What it Does: PDCP is in charge of compressing data (to save bandwidth) and encrypting
it (to secure it from unauthorized access).

3. Radio Link Control (RLC):


What it Does: RLC breaks down large data packets into smaller chunks, making it easier to
send them over the network and then reassembles them at the receiving end. It also re-
sends any lost packets.

4. Medium Access Control (MAC):


What it Does: MAC decides when and how much data each device can send or receive,
organizing all devices that need access to the network. It also performs error-checking on
each data transmission.

Layer 3: Network Layer (Control Plane)

Radio Resource Control (RRC):


What it Does: RRC manages the overall communication between your device and the
network, handling things like setting up connections, security, and mobility (moving
between network towers).

4. How It All Fits Together

When you send data (like loading a webpage):

1. The user data starts in SDAP, where it’s mapped to the correct priority level.
2. It moves down to PDCP (for compression and encryption), then to RLC (for segmentation).
3. Finally, MAC schedules it, and the Physical Layer converts it to radio signals that get transmitted.

When the network sends data back (like a webpage response), it goes through the same layers in
reverse order, reaching your device as usable data.

Summary

In simple terms, the 5G NR protocol stack is a set of layers designed to:

Prepare data for transmission.


Prioritize it.
Secure it.
Break it down into manageable parts.
Organize the network to allow multiple devices to communicate efficiently.

Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 17/19
Each layer has a unique role, ensuring that data moves from your device to the network and back,
quickly and reliably. Let me know if there’s a specific part you’d like more detail on!

explain layer 3 i cant understang

Layer 3, known as the Network Layer in the 5G New Radio (NR) protocol stack, is primarily
responsible for controlling and managing the connection between a device (like your smartphone)
and the network. This layer includes a protocol called Radio Resource Control (RRC), which is
essential for managing communication between the device and the 5G network.

Here’s a breakdown of what Layer 3 and RRC do:

1. Radio Resource Control (RRC)

Purpose of RRC: RRC is responsible for managing the connection between your device and the
network. It ensures that the connection is secure, stable, and can handle movement if you’re
traveling (such as switching between cell towers).
Role of RRC in 5G:
Connection Setup and Release: When you start using the network (e.g., when you make a
call or access data), RRC establishes a connection between your device and the network.
When you finish, it releases the connection to save resources.
Mobility Management: RRC helps your device stay connected when you’re moving, like
when you’re in a car or walking. It handles switching from one cell tower to another (known
as handover) to maintain a stable connection.
Security: RRC also manages security by initiating encryption and authentication
procedures, so only authorized devices can access the network.
Configuration of QoS: Quality of Service (QoS) settings ensure that important data, like
video calls, gets priority over less time-sensitive data, like background app updates.

2. Control Plane vs. User Plane

Layer 3 in the 5G protocol stack is part of the Control Plane. This plane is responsible for controlling
and managing connections but doesn’t carry the actual user data (like internet traffic or video).
Instead, the Control Plane is about the communication between the device and network that helps
manage connections and maintain quality.

The User Plane (handled in Layer 2) is where actual data (like your internet or streaming data) flows.

3. Examples of RRC Messages and Functions

To understand better, here are some examples of RRC messages and what they do:

RRC Connection Request: Sent when your device wants to connect to the network. The network
responds, and once the connection is confirmed, data can start flowing.

Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 18/19
RRC Reconfiguration: Sent when the network needs to adjust the connection (like changing QoS
settings if you start a video call).
RRC Handover: If you’re moving between cell towers, this message helps transition your
connection smoothly from one tower to another without dropping the call or data session.
RRC Connection Release: Sent when you no longer need the connection (e.g., you finish your
call). This message tells the network to end the session, freeing up resources.

Summary of Layer 3

In simple terms, Layer 3 in the 5G protocol stack manages the “control” aspects of your connection:

Sets up connections when you need them.


Keeps the connection stable even when you’re moving.
Manages security to keep the connection safe.
Adjusts connection settings as needed for high-quality service.
Releases the connection when it’s no longer needed to save resources.

The RRC protocol in Layer 3 is what makes your device’s connection to the 5G network smart, secure,
and adaptive to changes. Let me know if you need more detail on any specific part!
ChatGPT can make mistakes. Check important info.

Printed using Save ChatGPT as PDF, powered by PDFCrowd HTML to PDF API. 19/19

You might also like