The fifth-generation (5G) network is presented as one of the main options for Industry 4.0 connectivity. Ultra-Reliable and Low Latency Communications (URLLC) is the 5G service category used by critical mechanisms, with a millisecond end-to-end delay and reduced probability of failure. 5G defines new numerologies, together with mini-slots for a faster scheduling. The main challenge of this is to select the appropriate numerology according to radio conditions. This fact is very important in industrial scenarios, where the fundamental problems are interference and multipath propagation, due to the presence of concrete walls and large metallic machinery and structures. Therefore, this paper is focused on analyzing the impact of the numerology selection on the delay experienced at radio link level for a remote-control service. The study, which has been carried out in a simulated cellular factory environment, has been performed for different packet sizes and channel conditions, focusing on outliers. Evaluation results show that not always a higher numerology, with a shorter slot duration, is appropriate for this type of service, particularly under Non-Line-of-Sight (NLOS) conditions.
The fifth-generation (5G) network is presented as one of the main options for Industry 4.0 connectivity. To comply with critical messages, 5G offers the Ultra-Reliable and Low latency Communications (URLLC) service category with a millisecond end-to-end delay and reduced probability of failure. There are several approaches to achieve these requirements; however, these come at a cost in terms of redundancy, particularly the solutions based on multi-connectivity, such as Packet Duplication (PD). Specifically, this paper proposes a Machine Learning (ML) method to predict whether PD is required at a specific data transmission to successfully send a URLLC message. This paper is focused on reducing the resource usage with respect to pure static PD. The concept was evaluated on a 5G simulator, comparing between single connection, static PD and PD with the proposed prediction model. The evaluation results show that the prediction model reduced the number of packets sent with PD by 81% while maintaining the same level of latency as a static PD technique, which derives from a more efficient usage of the network resources.
In the 3GPP LTE Release 13, NB-IoT was standardized to provide wide-area connectivity for IoT. To optimize network signaling and power consumption, control plane (CP) optimization was introduced. In Release 15, to support infrequent small data transmissions, Early Data Transmission (EDT) was also included, in which the data are sent during the random access procedure. Thus, this paper analyses the latency performance of the different NB-IoT optimizations for the CP. The study, carried out in a real device, has been performed for different packet sizes and coverage levels. Evaluation results show lower latencies for EDT, particularly with small packets, where a reduced transport block is used, being more efficient from a network point of view. Additionally, we verify that EDT, unlike Release 13 optimization, fulfills 3GPP latency requirement for extreme coverage.
The fifth-generation technology is called to support the next generation of wireless services and realize the "Internet of Everything" through Machine-Type Communications and Cellular Internet of Things optimizations. As part of these optimizations, Release 15 introduced a new mechanism, known as Early Data Transmission (EDT), that allows the transmission of data during the Random Access procedure. This feature, intended particularly for infrequent and small data transmissions, aims to reduce the latency and the power consumption of user equipments. Nonetheless, despite the importance of this novelty and the general agreement about its effectiveness, there are few papers in the literature that provide insight into its implementation and analyze the advantages and disadvantages of its two different implementation options (Control and User Plane). Moreover, although security is recognized as a crucial aspect for the correct deployment of this technology, we have not found any paper that reviews the security issues and features of this mechanism. As a consequence of such a lack of papers and the complexity of mobile network protocols, there is a divide between security experts and EDT researchers, that prevents the easy development of security schemes. To overcome this important gap, this paper offers a tutorial of EDT and its security, analyzing its main vulnerabilities and concluding with a set of recommendations for researchers and manufacturers. In particular, due to the simplifications in the protocols done by EDT, vulnerabilities such as packet injection, replay attacks and injection of fake values to disable EDT have been found.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.