Abstract
The 5G network was developed to push the capabilities of wireless networks to previously unseen performance limits, e.g., transmission rates of several gigabits per second, latency of less than a millisecond, and millions of devices connected at the same time. To meet these requirements, it is necessary to access new spectrum (the so-called millimeter waves) and use techniques such as Massive MIMO (Multiple-Input Multiple-Output) and beamforming. This required the design of a new radio interface, known as 5G NR, that includes improvements to its physical components and new protocols. The performance of the 5G network will depend heavily on the behavior of these new protocols under certain configuration parameters, traffic conditions, device density, and network architecture. This paper introduces an analytical model for the performance evaluation of 5G NR. The developed model describes the behavior of the different layer 1 and 2 protocols involved in 5G radio communication. Using the model, it is possible to evaluate the performance of 5G NR in terms of throughput and latency, two key performance metrics used to describe QoS (Quality of Service) thresholds of different applications. The protocol layer approach gives the model sufficient granularity to identify critical behaviors that significantly impact performance. This can help focus efforts on improving these key points or propose improvements/modifications to the operation of network protocols or devices. The use of this model for performance evaluation is exemplified by studying a Remote Driving scenario operated over 5G. This scenario has very stringent delay requirements, which, according to the model’s results, can be satisfied if the network conditions are adequate. This model and its results can be used as a starting point for performance evaluations of application involving end-to-end (E2E) communications.
Figures
Citation: Horta J, Siller M, Villarreal-Reyes S (2025) Cross-layer latency analysis for 5G NR in V2X communications. PLoS ONE 20(1): e0313772. https://doi.org/10.1371/journal.pone.0313772
Editor: Muhammad Faheem, University of Vaasa: Vaasan Yliopisto, FINLAND
Received: May 7, 2024; Accepted: October 31, 2024; Published: January 9, 2025
Copyright: © 2025 Horta et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: The simulation results presented in this article are generated with a custom developed simulator. Code is available on Github at https://github.com/JorgeHSa/5GNRSimulation.
Funding: This research was partially supported by a grant from the Consejo Nacional de Humanidades, Ciencias y Tecnologías (CONAHCYT), awarded to Jorge Horta (CVU No. 854262). The funder had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
The fifth-generation (5G) of mobile networks aim to provide performance that significantly exceeds the one offered by fourth-generation (4G) networks. For instance, provisioning of peak data rates of 20 Gbps, latencies of 1ms, successful transmission probabilities above 99.999%, high density of connected devices (up to 1000000 devices/km2), and improved network performance (Table 1.1 in [1]), should be feasible with 5G deployments. Different organizations used these new performance limits to define use cases to guide the development of 5G technology. For instance, IMT-2020 defines three key use cases available for 5G. These cases, shown in Fig 1, are Enhanced Mobile Bandwidth (eMBB), Massive Machine Type Communications (mMTC), and Ultra Reliable Low Latency Communications (URLLC).
The IMT-2020 classification represents these use cases as a triangle, with each vertex representing a case with different requirements. The eMBB case focuses on improving the transmission rate, mMTC increasing the number of connected devices, and URLLC reducing latency. Different applications can be placed in this triangle depending on the combination of their specific requirements. Consider the mission-critical and self-driving car applications, both of which require a low delay time, thus they are located near the URLLC vertex. The Smart City application favors connecting more devices simultaneously, hence it is located close to the URLLC vertex. On the other hand, video applications, remote work, or augmented reality require higher bandwidth. To achieve these performance goals, 5G standardization bodies have defined a New Radio (NR) interface which comprises access to new spectrum, massive multi-input multi-output beamforming, network slicing, dual connectivity with 4G, and cloud and edge computing support [2]. Thus, compared to 4G, the introduction of 5G NR required the development of a new protocol stack (layers 1 and 2) to integrate and access these technologies. In addition, in 5G, there is the possibility of enabling edge computing deployments, which brings the processing closer to the user and allows the most demanding performance limits (such as URLLC [3]) to be met. Although protocols and deployment scenarios are designed to ensure that applications meet specific Quality of Service (QoS) metrics, varying network conditions may make this unsatisfactory. It is necessary to evaluate the network configuration under different conditions to foresee behavior and make adjustments to solve it. Analytical models are attractive tools for this.
This paper presents an analytical model for performance evaluation of the 5G NR protocol stack. This model is developed using a layered approach to consider the individual behavior of all protocols in the stack associated with 5G NR communication. The model focuses on describing in sufficient detail the contribution each of the stack’s protocols has on performance. The developed model is used to evaluate the performance of an application deployed in 5G with demanding delay requirements: Remote Driving. The main objectives of this work are:
- Identify the behavior of 5G NR layer 1 and 2 protocols.
- Develop analytical models for each of these protocols.
- Integrate the models into a 5G NR model that considers all the individual contributions of the protocols.
- Conduct a performance evaluation for the remote driving application deployed in 5G.
The rest of the paper is organized as follows: Section 2 briefly introduces the architecture of a network for Remote Driving applications supported by 5G, and the state-of-the-art works relevant to it. Section 3 presents the development of the model, with a focus on analyzing and modeling the different protocols involved in radio communication. Section 4 reports the performance evaluation results for a remote driving application deployed in 5G NR. Finally, Section 6 discusses the developed model and the results obtained using it and concludes the paper.
2 Background and related work
Remote driving, part of teleoperation systems, allows a driver (either human or an app) to control a vehicle remotely. The 5G Automotive Association (5GAA) describes teleoperated driving as a use case associated with the autonomous driving group. Specifically, teleoperated driving is a Cellular V2X (C-V2X) use case in which a remote driver takes control of a vehicle to drive it efficiently and safely from the current location to its destination [5]. Teleoperated systems are mainly made up of three elements: a robot with sensors and actuators that allow the operator to assess the environment and perform actions, generally with one or more cameras; a communication element, usually a wireless network, that allows the robot and the operator to exchange sensor data and control commands; and a control station, which enables the operator to view and interpret sensing and video data as well as input devices that allow the operator to send control commands [6]. Translating this to the 5G remote driving use case, it follows that:
- Robot: It is a system located within the vehicle that is capable of interfacing with control components (i.e., steering wheel, brake, throttle, etc.), in addition to one or more cameras and sensors that allow it to send information about the vehicle state and its surroundings.
- Communication element: The 5G network establishes a communication link between the robot and the operator.
- Control station: The remote site from which the operator will control the vehicle. It is usually equipped with one or several display elements to show the operator the video and data sensed by the vehicle and input devices that will enable commands to be captured and sent (i.e., keyboard, joystick, racing wheel, etc.).
The architecture for a centralized remote driving application built with the above elements is shown in Fig 2a. Centralized deployment adds delays associated with traversing the 5G core network and the Internet. These delays may compromise fulfilling the stringent requirements of the remote driving application. Thus, the 5GAA proposed deployment options based on edge computing [7]. They aim to bring computing close to the vehicles to reduce the network delay. Based on these deployments, the control station for remote driving can be located on a node in the 5G Core Network or a site adjacent to the 5G gNB (Fig 2b). This can be considered as the baseline scenario for delay evaluation, because if delay requirements are not fulfilled for this case they will not be fulfilled for deployments where the control station is located further away from the 5G gNB. The evaluation requires estimating the 5G NR link delay under different network conditions and configurations. Then, based on the obtained results, it is possible to decide on the location of the control station that meets the delay requirements for remote driving. Thus, to demonstrate its usefulness, the analytical model introduced in this work is used to evaluate the delay for a remote driving application deployed in a Multi-access Edge Computing (MEC) 5G NR deployment where the control station is located next to the gNB (see Fig 2b). However, it is important to note that the use of the model is not limited to remote driving applications.
Several state-of-the-art articles have investigated the application of remote driving, as described below. The authors in [8] present a study of a remote driving application performance and driving experience through an LTE network. The authors develop a prototype of a system to simulate remote driving under different network delay conditions. This prototype driving task is based on video streams transmitted from the prototype vehicle to the remote driving station. LTE network delay conditions are emulated using a probability distribution obtained from field measurements. The objective is to compare the performance and the driving experience for two different scenarios: random delay and constant delay. In the first case, video frames are displayed as soon as they arrive. Thus, they may experience jitter. In the second case, the video frames are delayed to match the maximum delay experienced by the network (358 ms). This is done to eliminate jitter and smooth out the displayed video. The results show that while network delay is the biggest challenge for remote driving, a scenario with high variability (jitter) negatively impacts driver performance. They found that the performance in a scenario with constant high delay (with no jitter) is similar to that observed in a scenario with no delay. Conversely, a variable delay scenario imposes a more significant mental and physical load, frustration, and effort on the driver. This is why it is concluded that reducing the network delay could be helpful, but achieving a stable network delay value might be a preferable enhancement for remote driving.
In [9], the authors design and evaluate a remote driving system supported by 4G and 5G networks. This work describes an architecture that allows the application of remote driving and implement this architecture in a field test using a Hardware-In-the-Loop (HiL) simulation. Both implementations are used to evaluate remote driving application delay, bandwidth, and reliability using 4G and 5G networks. The following use cases are considered: straight-line driving and slalom. Those cases are evaluated under different latency and packet loss probability conditions. For remote driving, the vehicle must transmit video and some control commands. This data is presented to the remote driver to make decisions and execute actions sent to the vehicle as control commands. After analyzing the results obtained, the authors concluded that 5G offers advantages over 4G in remote driving applications,i.e. 5G latency is half of 4G latency. Furthermore, they did not observe a strong correlation between network delay and driver performance. They conclude that remote driving applications can be feasible with current technology in a low-speed (less than 40 km/h) scenarios.
In [10], the authors propose a framework for driving vehicles remotely and validate this framework through performance evaluation in a real network environment. To implement this framework, they propose an architecture in which the vehicle is connected to the remote driving station via a commercial 4G/5G network. The architecture includes a remote driving station and a vehicle capable of transmitting video and other signals. It also requires a control mechanism capable of implementing the control commands received from the driver into the vehicle. These requirements are met using an Openpilot system in the test vehicle (2019 Toyota Prius Hybrid) as a basis. The authors modified the Openpilot base system to provide the vehicle with all the functions required to be driven by a remote driver. Using this implementation, two different scenarios are tested: a local and a remote scenario. In the first scenario, the driver and the vehicle are connected to the same wireless network, which offers the best case in terms of latency. In the second scenario, driving uses the commercially available 4G/5G network. After carrying out the different tests and analyzing the results, they conclude that control commands (sent from the remote driver to the vehicle) can experience an average delay of up to 32 ms and still allow remote driving in real-time. On the other hand, the average delay for streaming video is 680 ms, which would increase the difficulty of driving the vehicle remotely. In both cases, network performance is the main cause of delay, so the authors conclude that these results can be improved with the next generation of mobile networks.
The work [11] carries out a study on the remote control of a vehicle using video streams through wireless networks. Using a vehicle model and implementing a system based on the Robot Operating System (ROS), remote driving is enabled through a WiFi network that connects the vehicle and the remote driver. Driving tasks are guided by video streamed by the vehicle. The tests use three video-transmission protocols: ROS multi-computer communication, UDP, and TCP. Additionally, an experiment is carried out in which the vehicle is driven based on the direct observation of the driver, which eliminates video delay and allows the impact of network latency to be measured. The different video transmission protocols are evaluated in scenarios with different vehicle speeds. From the results, the authors conclude that remote vehicle operation is feasible if a low vehicle speed is maintained. It was also identified that the UDP-based stream offers the lowest latency for high-resolution video transmission compared to ROS and TCP. Another result found is that driver performance is more affected by delay jumps; thus, achieving a “deterministic delay” with low or no jitter is more important than a low delay with jitter.
Much of the work related to remote driving is oriented towards experimental evaluation of driver performance, and aims to test the feasibility of such applications with current technologies. Regarding analytical modeling, looking at works addressing Vehicle-to-Everything (VX2) scenarios is necessary. For instance, [12] presents an analytical 5G NR latency model in a V2X scenario where Vehicle-to-Network-to-Vehicle (V2N2V) communication is implemented. This model evaluates latency only at the radio level. The model considers different numerologies (sub-carrier spacing or SCS, slot, and symbol duration, and Cyclic Prefixes), modulation and coding schemes, use of slots or mini-slots, dynamic or semi-static scheduling, different re-transmission mechanisms, as well as unicast or broadcast/multicast transmissions under different traffic conditions. The authors use the model to assess the impact of different configurations on 5G delay and identify which ones meet the stringent latency and reliability requirements of V2X. This study is based on a cooperative lane change scenario enabled by V2N2V communication. The evaluation is carried out considering the requirements established by 3GPP associated with Low Level of Automation (LLoA) and High Level of Automation (HLoA) [13]. These requirements are latencies of 25ms with 90% reliability for LLoA and 6ms with 99.99% reliability. From their results, the authors conclude that, at least at the radio level, 5G can be used for V2X services in an LLoA and periodic traffic environment. This is because all the evaluated scenarios had a latency of less than 6 ms in 90% of the cases. To comply with HLoA requirements, HARQ retransmissions are used. It is necessary to select the appropriate parameters (i.e., SCS and mini-slot) so as not to increase the radio latency and the required bandwidth. The impact of scheduling mechanisms on performance was also investigated. It was identified that semi-static scheduling is adequate to transmit periodic messages, while dynamic programming is more spectrum efficient for aperiodic messages. In the latter case, they demonstrated that the required control command exchange significantly affects the delay. Finally, the authors conclude that V2N2V 5G communication is suitable for V2X applications with aperiodic traffic and non-strict latency requirements if the network load is low or medium and a high SCS value is used.
The work [14] presents a model for V2X application delay in 5G. As an extension of [12], different 5G deployment scenarios are considered to enable V2X applications. The authors argue that the delay is affected by the configuration of the 5G network, the traffic load, and the deployment and location of the application server (AS) that hosts the V2X application. In this case, the flexibility of 5G allows different deployment scenarios where the AS can be located in a remote cloud (centralized), or it may be found somewhere in the 5G core or transport networks and even be co-located with the gNB. Deployment scenarios for a cooperative lane change case are evaluated using the traffic and configurations introduced in [12]. Based on the evaluation results, the authors concluded that a centralized scenario (cloud AS) has difficulties meeting the strict delay and reliability requirements of V2X. It was also identified that locating the AS closer to the edge of the cell can reduce delay. Still, the configuration must be chosen carefully, and network dimensioning must be considered. Furthermore, [12] does not address the development of analytical models to calculate the delay introduced by the protocol stack in 5G NR. This paper addresses this issue and thus complements the results presented in [12].
Regarding the handling of different QoS profiles in 5G service we have some works, such as [36]. This paper proposes some Configured Grant (CG) scheduling algorithms that can be adapted to the strict requirements of URLLC. The proposed algorithms, sorted-OFDMA and Best-MatchOFDMA, RB utilization are evaluated under different conditions of packet size, numerology and allocated bandwidth. These algorithms are compared against the traditional 5G algorithm for CG, called SymOFDMA. The results presented seem to indicate that the proposed algorithms have a similar level of efficiency to SymOFDMA.
The work [37] studies the QoS requirements for remote and automated driving in 5G. The author proposes prediction algorithms for adjust the QoS requirements to varying network conditions. These variant conditions depend on background traffic (non-driving related applications) from connected vehicles in the same cell and adjacent cells. This should be reflected in the MAC layer scheduling mechanisms, where traffic can be differentiated. Using the Random Forest algorithm, predictions are generated for different conditions (number of vehicle, positions and network loads) and different prediction windows. By simulation the scenario, it is concluded that the prediction algorithm performs adequately as long as the prediction window is a few seconds and degrades as the window grows.
The authors of [38] propose a parametric model for evaluating the performance of teleoperated driving. Three application scenarios with different requirements are proposed: Driving, Parking and Supervision. An analytical model for QoE based on different KPIs for the main aspects influencing remote driving is developed. These are: Video Coding Quality, Macroblocking and Delay. Using data sets obtained from 4G and 5G networks measured in the corridor between Spain and Portugal, the different KPIs are estimated for different network configurations and conditions. Based on the results obtained, the authors conclude that current networks could hardly meet the requirements of teleoperated driving. However, 5G Stand Alone deployments, dedicated channels (network slicing), and MIMO provided by new chipsets could help meet these requirements.
The scheduling and correct use of radio resources are critical to meeting the requirements of 5G applications and use cases. Therefore, the problem of scheduling and resource allocation has been addressed by different works in the state of the art. The work [39] proposes a resource allocation method aimed at jointly optimizing delay and power consumption in LTE-A networks. This allocation uses the DELFBDO (delay and energyaware Levy flight Brownian movement-based dragonfly optimization) algorithm to define a 3-phase process to determine the best allocation of resources. Teh fist stage determine and verify the scheduling parameters. In the second stage a estimate a parameter (α) that is used to rank UE priority. The final stage designates resources based on the priority rank. This algorithm is compared with other state-of-the-art algorithms by simulation. Although this algorithm is outperformed by other single-metric oriented approaches, the authors conclude that in a multi-metric approach the performance of the proposed algorithm is balanced while sustaining the lowest energy consumption.
In [40] the Energy Aware Scheduling Algorithm (EASA) performance for a 5G Green Network is analyzed. The authors propose an energy-aware scheduling model that considers the characteristics of 5G Green Communications. They present an analytical model to describe the optimization problem. A simulation is conducted to evaluate the model performance. The proposed algorithm uses machine learning to allocate real-time resources based on network conditions and user demand. Simulation results show that there is a reduction in energy consumption while maintaining high performance. The authors conclude that using energy-aware models can contribute to a sustainable environment without affecting performance or incurring operational costs to the grid.
Table 1 presents a summary of the state of the art reviewed.
3 5G NR cross-layer analytical modeling
This paper focuses on 5G NR protocols that enable communication between the user device (UE), in this case, the vehicle, and the base station (gNB). The analysis is carried out with a protocol layer approach to identify the relevant behaviors of these protocols that influence the communication performance, mainly throughput and latency. For 5G, the radio link enabling protocols are those of layers 1 and 2 of the OSI reference model. These protocols are shown in Fig 3.
It should be noted that the L2 layer is divided into different sub-layers to abstract and simplify the behavior associated with it. The behavior of each of the protocols shown in Fig 3 is based on the 3GPP specifications used to develop the models in this work. Based on the scenario, the one-way delay (OWD) of the radio link can be defined as follows:
(1)
where delayx represents the delay introduced by layer x with x ∈ {sdap, pdcp, rlc, mac, phy}. Similarly, the performance of the radio link can be defined as:
(2)
with thx, the protocol throughput for x ∈ {sdap, pdcp, rlc, mac, phy}. It is necessary to define the performance of the different protocols to evaluate the models presented in Eqs 1 and 2. The remainder of this section describes the appropriate models for each of the protocols considered in radio communication.
3.1 Service Data Adaptation Protocol (SDAP) sub-layer
The Service Data Adaptation Protocol is the upper sub-layer protocol in L2. The function of SDAP is to manage different levels of QoS through traffic flows associated with each level [15]. This is handled by a QoS Flow Identifier (QFI) field included in the SDAP PDU header. On the transmitter side, the SDAP protocol receives IP packets, identifies the type of traffic by checking the appropriate field, and assigns a suitable identifier for this traffic (Fig 4a). After this, the SDAP PDU is generated, which will be retransmitted to the next layer (PDCP) in a virtual channel (radio bearer) on which packets with similar QoS requirements travel.
On the receiver side, SDAP receives a PDU, from which the header is removed to identify its flow through the QFI field and then forwarded to the upper layer (Fig 4b). In the present model, all the packets transmitted by the device are considered to belong to the same class. Therefore, they are all processed similarly and retransmitted to the same virtual channel. Based on this behavior, SDAP can be identified as a store-and-forward element; thus, analyzing it as a queuing system is possible. For UL (Up-Link) on the transmitter side, video packets are assumed to follow a Poisson process. On the other hand, in DL (Down-Link), the packets from the control station arrive quasi-periodically; therefore, their arrival process is deterministic. In both cases, the processing performed by SDAP is considered to have an exponential distribution. Based on this, the behavior of SDAP transmitter can be defined as an M/M/1 system and a D/M/1 system for UL and DL, respectively. Based on queuing theory, the SDAP performance model for the UL direction can be obtained as follows:
(3)
(4)
where λSDAP is the rate at which video packets arrive at the SDAP layer, and μSDAP is the rate at which SDAP services incoming packets. For the DL direction, the throughput model is:
(5)
here, T is the period between control packets arrivals. The following equation is used to calculate the time that each packet spends in the SDAP layer:
(6)
where, σ is the solution of σ = e−μT(1−σ) with the lowest absolute value. Using the Eqs 3–6, SDAP performance can be evaluated in both communication directions. The results of this evaluation are presented in section 4.
3.2 Packet Data Convergence Protocol (PDCP) sub-layer
The PDCP layer provides security and integrity protection for 5G communications and performs header compression [16]. PDCP functions are depicted in Fig 5. According to [2], the main functionality of header compression is to match 5G voice services with legacy voice services, which have no packet header. This analysis considers only data transmission; therefore, the header compression mechanism is not considered.
On the PDCP, the transmitter side receives SDUs from SDAP. Each SDU is assigned an integrity code called Message Authentication Code (MAC-I), then encrypted, and a header and trailer are added to generate the PDCP PDU (See Fig 5a. No header compression is performed). The reverse process is done on the receiver side: first stripping the header, then checking the integrity using the MAC, and decrypting the content before sending it to the upper layer (Fig 5b). Thus, the behavior of PDCP is a process of three sequential service phases. Based on this, PDCP is described as a M/Hypo3/1 queuing system. The geometric matrix approach is used for the analysis of this system. The queuing system has associated a transition matrix with a block structure of the form:
(7)
where the component block matrices are:
(8)
(9)
(10)
(11)
(12)
(13)
In Eqs 8–13, the value λ is the rate at which packets arrive at the PDCP layer and μ1, μ2 and μ3 are the service rates associated to the MAC-I calculation, ciphering and header creation process, respectively.
These equations are associated with the dynamics of the block matrix Q (Eq 7), allowing to describe how it transits between its levels. The level directly corresponds to the number of packets in the queue. Specifically, level 0 denotes no packets waiting, level 1 signifies 1 packet, and so on. The matrix in the Eq 8 indicates the rate at which the level 0 is exited. Eq 10 represents the rate at which the level 0 is entered. Similarly, there are matrices that describe the dynamics when i > 0 packets are in the queue. In this case, these are square matrices of order n, where n = 3 is the number of sequential phases that comprise the service process. The matrix A0 (Eq 11) it is the rate at which a package transits from level i to level i − 1, which occurs when a package exits the 3rd phase of service (at a mu3 rate). Matrix A1 (Eq 12) contains the rates of transitions between the different phases of service. Finally, matrix A2 is the rate at which level i transitions to level i + 1, which occurs at λ. Since this transition can occur during any phase of service, A2 matrix is constructed to represent this.
MAC-I computation and encryption processing rates are associated with the data size. Therefore, these service rates must be estimated for the data sizes of interest in the present analysis.
The M/Hypo3/1 queue transition matrix (Eq 7) has a steady state vector π that satisfies:
(14)
where the vector π has the form π = [π0 π1 π2 …]. Here, the element πi = [πi,1πi,2πi,3] is a vector associated with the probability that the queue has i packets in the queue and the current packet in service is in the j ∈ [1, 2, 3] phase of service. The elements of π are geometrically related by a matrix R such as:
(15)
The state of the queue is completely described by the π0 and π1 vectors and the R solution matrix. The work [17] describes the R matrix in a closed form as:
(16)
The vectors π0 and π1 are those that satisfy the normalization condition:
(17)
with I a 3x3 identity matrix and e = [1, 1, 1]t. Once the vectors π0, π1, and the matrix R are known, the statistics of the queue can be evaluated. The queue throughput is obtained as follows:
(18)
In addition, the delay is defined as:
(19)
where |x|1 is the 1-norm of vector x. The model presented above considers that all packets arriving at the PDCP layer have the same size. This is the case for transmitting driver control messages (DL directions). However, video streaming has two different packet sizes (one for 1280x720 and the other for 640x480 video). Thus, once the video packets arrive at the PDCP, the processing time of each of these packets must be differentiated. This leads to slightly modifying the approach adopted for the PDCP model. In this case, the service is no longer hypoexponential but follows a sequence of phases of service, as shown in Fig 6. where a is the probability that the arriving packet has high-resolution video, μ1,1 and μ2,1 are the ciphering and integrity protection rates for high-resolution video packets. While μ1,2 and μ2,2 are those rates for standard-resolution video packets. Based on this behavior, it can be identified that the service process is phase type (PH). These distributions have an associated rate matrix that guides the transition dynamics between the different phases. Using this matrix, the service process can be characterized, and the performance of the queuing system can be analyzed. For this, a geometric matrix approach is used, similar to that used to analyze the M/Hypo3/1 system presented above. However, unlike this one, there is no explicit solution to find the R matrix associated with the system. Based on the Eq 14 it is identified that:
(20)
where:
(21)
(22)
(23)
(24)
(25)
Note that states i = 2, 3, 4, …. in Eq 20 have the same structure. It is this structure that allows the use of an algorithmic approach. Substituting 15 in 20 yields:
(26)
Manipulating Eq 26:
(27)
Thus, the R matrix is the solution of the quadratic matrix equation A2 + RA1 + R2A0 = 0. To obtain R, it follows that:
(28) Eq 28 is the base of the algorithm. This is:
- Initialize
- Calculate
, for i = 1, 2, 3, …
- Repeat step 2 until the value R converges, i.e. the difference between Ri−1 and Ri is below a threshold.
Note that the delay equation (Eq 19) is still valid. However, the throughput model requires slight modification:
(29)
where PDCPst is the mean service time of the PDCP layer. This service time is derived from the PH distribution that describes it. For the presented model it is given by:
(30)
This completes the description of the PDCP model. To evaluate the model, it is necessary to describe the parameters it depends on. λ is given by the packet rates associated with each communication scenario. As stated above, the encryption and integrity protection processes depend on the size of the packet. According to [18], 5G has three algorithm alternatives to perform integrity protection and encryption. The available algorithms are presented in Table 2:
The present study considers the alternative based on AES (i.e., 128-NIA2 and 128-NEA2). The reason for this choice is twofold: it is a non-proprietary option and well documented in the literature. Using a technique like the one presented in [19], the AES algorithms for encryption and integrity protection are implemented in Python and tested to obtain a service time estimate. Testing was performed on a Windows 11 Pro computer with an AMD Ryzen 7 5700G processor with Radeon Graphics @ 3.80 GHz and 32 GB of RAM. Encryption and integrity protection experiments were replicated 100,000 times for each packet size. For UL, these are 467 Bytes and 521 Bytes for packets transmitting 640x480 and 1280x720 video, respectively. For the DL case, considering that there are 50 objects in the vehicle [5] and that 32-bit commands are sent to each of them, the control packets are 200 bytes. This value is within the margins considered in [5, 20] for remote driving applications. The average encryption and integrity protections times presented in Table 3 are obtained from these experiments.
Using the average times presented in Table 3, processing rates for encryption (μ1) and integrity protection (μ2) are estimated. Based on these values, the evaluation presented in Section 4 is carried out.
3.3 Radio Link Control (RLC) sub-layer
The RLC sublayer’s primary function is transmitting information in one of the three modes of operation available to it [21]. Those modes are Transparent Mode (TM), Unacknowledged Mode (UM), and Acknowledged Mode (AM). The two first operation modes are oriented to Control Plane message transmission. The last one is used for User Plane messages. The RLC AM operation is depicted in Fig 7.
On the transmitter side, the RLC sublayer receives SDUs from the PDCP layer. Each SDU is assigned a header and then forwarded using an Automatic Repeat Request (ARQ) re-transmission mechanism (Fig 7a). RLC considers possible packet fragmentation if a large amount of data is received that cannot be transmitted in a single PDU. For the present study, it is assumed that fragmentation is not necessary. On the receiver side, the packets are received, and if no error occurs, the header is stripped, assembled in case of fragmentation, and sent to the next layer (Fig 7b). Due to its behavior, it is challenging to abstract RLC AM as a queuing system. Due to its behavior, it can be challenging to outline RLC AM as a queuing system. Hence, we looked for a different formalism to describe the AM RLC model. Inspired by [22], we model RLC AM as a Stochastic Reward Net (SRN). A SRN is a variant of stochastic Petri nets that allows the evaluation of different performance metrics by assigning reward functions. The SRN used to model RLC AM is presented in Fig 8.
Regarding the SRN, the packets are generated with the activation of the Traffic timed transition and are stored in the place of the Buffer. Once here, a header is added to them at a rate given by Theader and is stored in the Pheader location. They are then transmitted (through the immediate transition t1) to the SRwindow site if there is available room in the transmission window. This is where the ARQ mechanism begins. Packets are correctly transmitted with a rate given by the TACK transition. Erroneous transmissions occur at a rate defined by TNACK. Each time this transition fires, a copy of the message is placed in the Retransbuffer place. Once all packets in SRwindow have been attempted to be transmitted, packets in Retransbuffer are transferred back to SRwindow for re-transmission through transition t2. This occurs if the maximum number of re-transmissions allowed for each packet has yet to be reached. The MAXRetransbuffer place controls the number of re-transmissions. Each time a packet is placed in SRwindows for re-transmission (t2 firing), its re-transmission counter in MAXRetransbuffer is incremented. If the packet is successfully transmitted before the maximum number of re-transmissions, the t3 transition resets the MAXRetransbuffer counter. If a packet’s maximum number of re-transmissions is reached, the packet is removed from the SRwindow place, and the MAXRetransbuffer counter is reset. These two actions are performed by firing the Tdiscard transition. RLC AM performance analysis is performed using specialized tools for Petri nets. The SHARPE [23] tool is used for the present work. With the Sharpe tool, the relevant performance metrics for the model can be estimated. SHARPE analyzes the Markov chains associated with the Petri net to calculate the performance metrics. In this chain, the states are made up of the Petri net markings. The transitions between these states are associated with the firing of the timed transitions. By analyzing the matrix associated with the Markov chain, the transient and stationary behavior of the chain can be identified. Performance metrics are derived from the steady state, for example, the average number of tokens at each site or the average rate at which each transition is triggered.
Using this tool the throughput of the SRN RLC AM model can found to be:
(31)
where τT is the mean firing rate of transition X. For obtaining the RLC delay, Little’s rule is used at each SRN place. Thus, the RLC delay is:
(32)
here, #(P) is the mean number of tokens (packets) in place P, and μTACK is the rate at which the TACK transition fires when there are packets in the SRwindow site. Using the Eqs 31 and 32, and the Sharpe tool, it is possible to evaluate the performance of RLC AM. The results of this evaluation are presented in the following section.
3.4 Medium Access Control (MAC) sub-layer
The next sub-layer to analyze is the MAC layer. The primary services the MAC sublayer provides are data transfer and radio resource allocation [24]. On the transmitter side, the data transfer is performed by generating MAC PDUs by assigning headers and appropriately formatting the data before sending it to the physical (PHY) layer. On the receiver side, MAC receives the data from the PHY layer and tries to retrieve the data from the packet, and if this process is successful, it is transferred to the next layer. The MAC layer implements mechanisms for reliable transmissions. These include HARQ re-transmission or K-Repetitions mechanisms. In the first, feedback messages are used to control the re-transmission of packets that were erroneously received by the receiver. The package and the K − 1 copies are transmitted simultaneously in the second one. This increases the probability that the receiver can decode the data from one of the K copies sent. Concerning radio resource allocation, the scheduling mechanisms available in 5G fall into two main categories: dynamic scheduling and semi-static scheduling. In dynamic scheduling, requesting a resource each time a packet is transmitted is necessary, which results in delay and overhead due to the exchange of control messages. For semi-static scheduling, the resources that devices can use for transmitting are pre-allocated. This reduces latency and overhead at the cost of contending for resources. Either way, how the radio resources are structured influences the behavior of the scheduling mechanisms. For the present paper, the issue of scheduling is considered to be solved by using a semi-static mechanism. This means that every time there is a transmission, the device has already determined the resources that will be used to transmit.
Re-transmission mechanisms (if applicable) and scheduling affect MAC behavior and performance. For this research, it is considered that there are no re-transmissions. This is because the messages exchanged (detected video/data and control commands) depend on the context of the vehicle, which changes very quickly. Because of this, messages are short-lived; therefore, it is not worth using resources to re-transmit a message. Also, remote driving packets are supposed to have priority; therefore, resources are pre-allocated to support them. Also, the resources are considered always available to transmit remote drive packets. In other words, the packet will be sent at the next available transmission opportunity; see Fig 9.
This priority assumption can be supported by mechanisms developed for 5G, such as network slicing or preemption techniques. Network slicing generates virtual networks where resources are defined for the different services (for example, eMBB, URLLC, and mMTC). be assigned to each segment to meet the QoS requirements of each service [25]. Regarding the pre-emption methods, puncture techniques are worth mentioning. For instance, the work [26] introduces a resource allocation mechanism in which the resources allocated to eMBB traffic can be punctured (removed) and replaced with traffic data with more stringent requirements, URLLC. Using any of these techniques can guarantee resources to transmit remote drive packets.
Based on these assumptions, MAC behavior is described as store-and-forward; where packets arrive, a header is generated for each of them and forwarded at the appropriate time. The MAC headers are created at a rate μMAC. The time between when the packet is ready for transmission and when it is transmitted is called frame τfra, whose value is in the range [0, TTI]. TTI stands for Transmission Time Interval, the time resources are allocated in 5G. Based on this, the MAC layer performance model is described as follows:
(33)
here, λMAC is the rate at which the packets arrive at the MAC layer. The mean MAC delay is estimated using the following equation:
(34)
The first component of Eq 34 refers to the delay of the header creation process, and the second to the average frame alignment time.
Specifically, this work considers the K-Repetitions technique. This technique sends K copies of the data in a single “shot”. The receiver can use these K copies to try to recover the data. K-Repetitions is generally associated with Grant-Free mechanisms. In this case, it is necessary to consider not only delay but the other component of URLLC, reliability. To meet URLLC requirements for V2X scenarios, i.e., 3-10 ms with reliability of 0.99995, it is necessary to consider the different probabilities that correct data detection will not occur. As presented in ref, to describe the performance of Grant-Free K-Repeats, it is necessary to define the probability that the transmission is detected and the probability that each K-Repetition is correctly received. In [27, Chapter 16], a Grant-Free reliability model with K = 2 repetitions is presented. Using a similar analysis, a model for a K-Repetitions scheme can be defined as:
(35)
where pmiss is the probability that the transmission pilot is undetected, pHARQX is the probability that the data cannot be recovered by combining the redundancy of X packets, and pe(pHARQ1) is the probability that any of the single K repetitions will be received incorrectly. Using Eq 35 the reliability for a K = 4 repetitions is:
(36)
In this case, the packet delay depends on which data packet is received correctly. To estimate this delay, the following equation is proposed:
(37)
where (relK = i − relK = (i−1)) represents the probability that the packet was successfully received at the i−th attempt, and TI refers to the packet transmission interval. In addition to the K-repeat delay (Eq 37, the MAC packet header generation time must be considered. Thus, the MAC layer delay operating with Grant-Free K-Repeats is defined as:
(38)
where the first component refers to the queue delay, the second indicates the mean alignment time a packet waits before its transmission. This time is calculated assuming the packet will be transmitted in the RB following its creation. This packet creation can occur at any instant; therefore, the alignment time is uniformly distributed over the interval [0, Tsymbol]. Finally, the K-Repetition delay is the third component of Eq 38.
The Throughput of the MAC operating the K-Repetitions scheme can be derived based on the Tshot interval; in this case, this is:
(39)
where, λURLLC is the URLLC packets arrival rate. The value of 1/Tshot represents the maximum number of K-repetition shots that can be transmitted. This time is defined as:
(40)
Using the MAC model Eqs (33) and (34), the performance of the MAC layer is evaluated, and the results are presented in Section 4. Similarly, using the Eqs 37 and 39, the performance of the K-Repetitions mechanism for URLLC is evaluated.
3.5 Physical (PHY) layer
The PHY layer is where the packets, converted into signals, travel through the channel from the sender to the receiver. The performance of the PHY layer depends mainly on the chosen parameters (for example, bandwidth, coding and modulation order, etc.) and the channel conditions. The present study considers that the network operates in good channel conditions (best-case scenario). Based on this, the maximum PHY throughput model described by 3GPP in [28] is used. This model is:
(41)
where:
- J is the number of aggregated component carriers in a band or combination. It has a value of 16 for 5G NR UL and DL in [29].
- Rmax is 948/1024, the maximum number of Low-Density Parity Check (LDPC) obtained from [30].
- For the j − th Component Carrier (CC):
is the maximum number of supported layers given by the higher layer parameter maxNumberMIMO-LayersPDSCH for downlink and a maximum of higher layer parameters maxNumberMIMO-LayersCB-PUSCH and maxNumberMIMO-LayersNonCB-PUSCH for uplink. Options for this variable values for UL and DL are specified in [29, 31].
is the maximum supported modulation order given by the higher layer parameter supportedModulationOrderDL for downlink and the higher layer parameter supportedModulationOrderUL for uplink. Values for QPSK, 16QAM, 64QAM, and 256QAM for UL and DL can be obtained in [32].
- f(j) is the scaling factor given by the higher layer parameter scalingFactor and can take the values 1, 0.8, 0.75, and 0.4.
- μ is the numerology [32].
is the average OFDM symbol duration in a subframe for numerology μ. Assuming a normal cyclic prefix the value is
is the maximum RB allocation in the bandwidth BW(j) with numerology μ as defined in [33, 34]. BW(j) is the UE maximum supported bandwidth in a specific band or band combination.
- OH(j) is overhead and can take one of the following values:
- 0.14 for DL in frequency range FR1
- 0.18 for DL in frequency range FR2
- 0.08 for UL in frequency range FR1
- 0.10 for UL in frequency range FR2
The maximum throughput limit for a given set of parameters is established using the model presented in Eq 41. In a real scenario, the actual throughput is expected to be less than or equal to this value. Regarding the delay, considering different components, such as propagation time, transmission time, and other processing times, is necessary. The model describes the delay of the PHY layer:
(42)
where
and
are the processing time at the transmitter and receiver side, respectively; τtx is the transmission delay, and τprop is the propagation time. The transmission delay is related to the radio resources required to transmit the data and is associated with the configuration parameters. The propagation delay depends on the distance between the transmitter and the receiver; thus, it is limited by the size of the 5G cell. Finally, it is necessary to describe the processing times (
and
). Following [12], these values are given by
and
. Here, Tproc,1 is the UE Physical Downlink Shared Channel (PDSCH) processing procedure time, and Tproc,2 is the Physical Uplink Shared Channel (PUSCH) preparation procedure time. Both depend on the device’s processing capabilities and are defined in [30]. The performance of the PHY layer can now be evaluated using Eqs 41 and 42.
The following section evaluates all the models developed in this section, considering a V2X scenario for the remote driving application.
4 Model results
The present section uses the models presented in section 3 to evaluate the performance of 5G radio communication for a remote driving usage scenario. First, the remote driving scenario is described. Then, the configuration parameters for 5G NR are described. Finally, the performance evaluation results of the different 5G NR protocols operating with the defined parameters are presented.
4.1 Evaluation scenario
The deployment scenario is shown in Fig 2b. This scenario presents a deployment in MEC. Therefore, communication occurs only on the 5G radio network and is mainly supported by 5G NR protocols.
As mentioned above, the remote driving application requires vehicle status data, mainly video, to be transmitted to the remote driver. At the same time, the driver is required to send control commands. These transmissions are identified as Uplink when their origin is the vehicle and Downlink when the remote driver generates them; therefore, its source is the gNB for the radio link. In the case of UL, the traffic depends on the resolution, encoding, and other parameters associated with the video. This transmission requires higher bandwidth and is one of the critical points for the definition of remote driving applications. For the proposed scenario, it is considered that the vehicle has 4 cameras that transmit the vision of the vehicle’s surroundings. This is depicted in Fig 10.
While some references mention that are needed between 25 and 32 Mbps to stream video from the vehicle’s four cameras,e.g., [5] states that 8 Mbps is required to stream a high-resolution video stream, other works present real measurements where this requirement is less demanding. For example, in [10], the authors report that 22kBps (176kbps) and 67kBps (536kbps) are required to stream videos in 640x480 and 1280x720 resolution, respectively. According to their measurements, the videos are transmitted at a mean rate of 47.3 and 129.1 packets/s. The present study considers this last scenario for the video transmission evaluation. Considering that the cameras are independent, the total traffic transmitted in UL is the sum of the traffic of each camera. Thus, the UL traffic is defined as:
(43)
where, λUL is the UL traffic rate and λfront,λrear,λleft and λright are the traffic rates associated with the front, rear, left and right cameras, respectively. For DL transmission, it is considered that the control commands originated by the driver are transmitted periodically. This is done to ensure that only a few orders during the transmission period of the lost packet are affected in case of packet loss. Typically, these transmissions are defined to occur several times per second; for example, 5GAA [5] states that 50 transmissions per second (20ms), and [20] mentions that they occur every 10ms (100 times per second). The model evaluation considers both scenarios, referred to as DLA and DLB.
The 5G network configuration parameters are based on those presented in [12], oriented to 5G V2X scenarios. These are summarized in Table 4:
Here, BW is the bandwidth used for the 5G network. CP is the employed cyclic prefix; its value is 14 meaning a normal prefix. Slot is the size of the TTI given in OFDM symbols. NRB are the Resource Blocks (RB) available for the given bandwidth and specific numerology; it is provided by [33]. The numerology μ with μ ∈ {0, 1, 2, 3, 4} defines the sub-carrier spacing (SCS). Finally, v determines the maximum MIMO (Multiple-Input, Multiple-Output) layers. For this analysis, we consider a maximum of two MIMO layers.
4.2 SDAP model evaluation
The SDAP performance in the UL direction on the transmitter side is calculated using Eqs 3 and 4. These performance values for the interest traffic rate (271packets/s) are:
For the DL direction performance equations, 5 and 6 are employed. In this scenario, the relevant traffic rates are DLA = 50packets/s[5] and DLB = 100packets/s[20]. The performance values for these relevant rates are
for the former rate, and,
for the latter.
4.3 PDCP model evaluation
The PDCP performance obtained using the models described in section 3.2 are presented below. As PDCP performance is affected by the size of the transmitted packet, it is necessary to perform a specific evaluation for each of these packet sizes. In this case, the UL traffic rate of 271packets/s is composed of 129.1packets/s containing HD video and 141.9packets/s with SD video. Based on this, 47.64% of the arriving packets contain HD, and 52.36% contains SD video. Using these values, the following performance results are obtained:
On the other hand, the performance metrics related to the DL relevant rates are
for the DLA rate, and they are
for the DLB rate.
4.4 RLC model evaluation
The performance of the RLC layer is evaluated using the model presented in section 3.3. As mentioned above, the RLC model is evaluated using the SHARPE tool. The model is configured using the parameters in Tables 5–7:
Where p is the packet success transmission, windows_size is the size of the ARQ mechanism and max_ret is the maximum number of repetitions allowed for each packet Using it, the SRN associated with RLC (Fig 8) is defined, and the rewards associated with the throughput and latency metrics are evaluated. The results of this evaluation are presented below. First, results associated with UL streams containing video are displayed. The results associated with this stream are
The DL directions performance metrics are
and,
for the DLA rate and DLB rate, respectively.
4.5 MAC model evaluation
The next sub-layer to analyze is the MAC. In this case, the results presented are based on the model developed in Section 3.4. The MAC layer behavior depends on the data size, which determines the resources necessary for the transmission. The resources needed to transmit each packet type are determined using Table 4 parameters. Some codes developed in [12] are used for the needed resource calculation. The authors made these codes available in [35]. Table 8 presents the results for each packet type. These results include the Transport Block Size (TBS), i.e., the number of bits to be transmitted and the RB required.
Based on the results presented in Table 8, the performance analysis of the MAC layer is performed. It highlights the fact that the assumed network conditions are resulting in the amount of resources needed being low. Furthermore, this supports the assumption that the package will be broadcast at the next available transmission opportunity. The results obtained from the performance evaluation of the MAC layer for the UL direction are
For the DL direction, the control packets are sent using URLLC. Based on the Configuration Parameters shown in Table 4, these packets can be transmitted using a single RB. The RB duration is defined as Tsymbol. This time is defined as:
(44)
Using the definition of Tsymbol to calculate the value of TI defined in Eq 39 for a shot of 4repetitions is TI = 4 ⋅ Tsymbol = 40−1/14 ⋅ 2μ. The rest of the parameters described in the equation are defined in Table 9.
Referring to Table 9, the value of pe refers to the probability that a packet is received with an error. It is derived from the Block Error Rate (BLER). The values of pHARQX, X ∈ {2, 3, 4}, refer to the probability that a packet cannot be retrieved using the redundancy mechanism with X packages. Finally, the value of pmiss <= 0.006 is chosen to ensure that the reliability is as required by URLLC. These pilots can be transmitted over the control channels, making the transmission more reliable. Now that these parameters have been set, it is possible to use Eqs 37 and 39 to obtain the performance of the MAC layer operating with URLLC. In particular, the MAC downlink performance for dataflows DLA and DLB can be calculated as:
4.6 PHY model evaluation
Finally, the performance of the PHY layer is analyzed. The evaluation is based on the models presented in 2.5. PHY performance depends on the amount of data to be transmitted. Therefore, for UL, two different pack sizes are contemplated: 466 Bytes for 640x480 video and 520 Bytes for 1280x720 video. The TBS presented in Table 8 are calculated based on these sizes. As stated in section 3.2, the probability that a high-resolution video packet arrives is a. Thus, the τtx component in 42, which refers to the average transmission delay, is calculated by considering the packet size and its associated probability as follows:
(45)
The evaluation results for the UL direction are
On the other hand, DL transmission considers a single control command packet size. Therefore, its transmission delay is τtx = TBSCC/PHYTh. The evaluation performance results are
and
4.7 Overall 5G NR performance for remote driving
Tables 10–12 summarize the network performance results for the three transmission flows of 5G NR, which are relevant for the Remote Driving scenario. The overall cross-layer delay performance can be calculated by using Eq 1 as:
Considering that the performance requirements defined by the 5GAA [5] for Remote Driving establishes a maximum latency of 100 ms on UL and 20 ms on DL, it can be concluded that transmission over 5G NR introduces a very small latency over the data flow. Thus, the control station can be located further away from the gNB, as long as the latency is kept below the margins mentioned before. Therefore, our model can be used a starting point when analyzing if network architectures where the data flows across 5G NR, 5G transport network (TN), 5G core network (CN), and the Internet are feasible to deploy (e.g. see Fig 2a).
5 Simulation results
This section validates the results of the analytical model presented above. For this validation, a comparison with simulation results was used. The simulation uses the Julia language to write code that replicates the behavior of 5G NR protocols. Using this code, a series of iterations is run to obtain the average values of the performance metrics, throughput and latency. The parameters used for model evaluation and simulation are chosen to represent the transmission of control packets in the DL sense. This is chosen because it is the communication with the most stringent delay requirements and, therefore, must operate at conditions close to URLLC. A summary of the parameters used is presented in the Table 13.
The processing delay values for the various layers are chosen to represent a device with sufficient capabilities to support 5G URLLC transmissions. The value of the radius, i.e., the distance between the vehicle and the gNB base station, is defined as in article [14], which presents a remote driving application. For the definition of the bit rate in the PHY layer, the maximum rate defined in [28] Section 5 is used. The analyzed traffic rate is chosen to cover the values of interest for the remote driving application, 50 and 100 packets/s. Using the values of the parameters in the Table 13, the performance results presented in Figs 11 and 12 are obtained for flow rate and latency, respectively.
The presented performance evaluation results indicate that the model results adequately describe the behavior of 5G NR. This is based on the comparison of these with simulation results. The results for Flow (Fig 11) are practically identical, having a correlation of 0.9999 and an RMSE (Root Mean Square Error of 2.2919e − 4packets/s. On the other hand, although the simulation delay results seem more dispersed (correlation of −0.5155), both of them (model and simulation) share the same trend and their valuers are close, with an RMSE of 8.3321e−5s. This allows us to establish that the model is suitable for the performance evaluation of 5G NR. Although the delay results seem to have a constant value, a closer look reveals that it suffers from a slight increase, see Fig 13.
This finding suggests that not being careful in the rate of packets being transmitted may lead to the risk that delay grows beyond the thresholds required by URLLC applications. In addition, operating in non-ideal network conditions or where the scheduling mechanism is inadequate threatens compliance with URLLC delay requirements.
6 Discussion & conclusions
In this paper, we introduced an analytical model for the protocol stack of 5G NR. The model was designed using a layered approach that considers all protocols involved in 5G NR communication: SDAP, PDCP, RLC, MAC, and PHY. All the protocol functions concerning user data transmission were analyzed to develop the model. Thus, by using different analytical tools like queuing theory and SRN, the behavior of each radio protocol was described and its performance components were derived. These components can then be used to evaluate the performance provided by5G NR for different applications by calculating metrics like as delay and throughput with the model.
As an example of its utility, the derived model was used to evaluate the performance of an application with stringent delay requirements: Remote Driving. It was found that when the control station is located nearby the 5G gNB, the protocol stack of 5G NR does not introduces significant delay. Particularly, it was found that the accumulated delay for UL video transmission and control packets transmission is well below the maximum latency of 100 ms on UL and 20 ms on DL required by the 5GAA [5] for Remote Driving. Furthermoe, from this results it can be concluded that data transmission over 5g NR provides sufficient delay margin to locate the control station further away from the 5G gNB (e.g. see Fig 2a) and still meet the requirements set by the 5GAA for Remote Driving. As such, The model introduced in this paper model can complement end-to-end 5G analysis, such as the one presented in [14].
In conclusion, the model proposed in this paper can be used to evaluate the performance of the protocol stack of 5G NR under different network configurations, traffic conditions and scheduling mechanisms. By using the model, selecting an adequate parameter combination for different network conditions and applications is possible. Furthermore, the model can also be used to identify whether an edge, fog or cloud deployment is adequate for a given application. Thus, the developed model can be used as a starting point for end-to-end (E2E) network performance evaluations of 5G-supported deployments.
References
- 1.
Lin X., Lee N., 5g and beyond, Cham, Switzerland: Springer Nature Switzerland AG (2021).
- 2.
Holma H., Toskala A., Nakamura T., 5G technology: 3GPP new radio, John Wiley & Sons, 2020.
- 3.
A. Zaidi (2021). [link]. URL https://www.ericsson.com/en/blog/2021/10/realizing-time-critical-communication-with-5g
- 4. Dahlman E., Parkvall S., Sköld J., 5G NR The Next Generation Wireless Access Technology, Mara Conner, 2018.
- 5.
G. A. Association, et al., C-v2x use cases volume ii: Examples and service level requirements, White Paper (2020).
- 6. Winfield A. F., Future directions in tele-operated robotics, Telerobotic applications (2000) 147–163.
- 7.
5GAA, Mec for automotive in multi-operator scenarios, White Paper (2021).
- 8.
R. Liu, D. Kwak, S. Devarakonda, K. Bekris, L. Iftode, Investigating remote driving over the lte network, in: Proceedings of the 9th international conference on automotive user interfaces and interactive vehicular applications, 2017, pp. 264–269.
- 9. den Ouden J., Ho V., van der Smagt T., Kakes G., Rommel S., Passchier I., et al., Design and evaluation of remote driving architecture on 4g and 5g mobile networks, Frontiers in Future Transportation 2 (2022) 801567.
- 10. Saez-Perez J., Wang Q., Alcaraz-Calero J. M., Garcia-Rodriguez J., Design, implementation, and empirical validation of a framework for remote car driving using a commercial mobile network, Sensors 23 (3) (2023) 1671. pmid:36772711
- 11. Yu Y., Lee S., Remote driving control with real-time video streaming over wireless networks: Design and evaluation, IEEE Access 10 (2022) 64920–64932.
- 12. Lucas-Estañ M. C., Coll-Perales B., Shimizu T., Gozalvez J., Higuchi T., Avedisov S., et al., An analytical latency model and evaluation of the capacity of 5g nr to support v2x services using v2n2v communications, IEEE Transactions on Vehicular Technology 72 (2) (2022) 2293–2306.
- 13.
3GPP, Study on enhancement of 3gpp support for 5g v2x services: Tr 22.886, v16. 2.0, Tech. rep., ETSI (2018).
- 14. Coll-Perales B., Lucas-Estañ M. C., Shimizu T., Gozalvez J., Higuchi T., Avedisov S., et al., End-to-end v2x latency modeling and analysis in 5g networks, IEEE Transactions on Vehicular Technology 72 (4) (2022) 5094–5109.
- 15.
3GPP, Lte; 5g; evolved universal terrestrial radio access (e-utra) and nr; service data adaptation protocol (sdap) specification (3gpp ts 37.324 version 16.2.0 release 16), Tech. rep., ETSI (2020).
- 16.
3GPP, 5g; nr; packet data convergence protocol (pdcp) specification (3gpp ts 38.323 version 16.2.0 release 16), Tech. rep., ETSI (2020).
- 17. Marin A., Bulò S. R., Explicit solutions for queues with hypo-or hyper-exponential service time distribution and application to product-form approximations, Performance Evaluation 81 (2014) 1–19.
- 18.
3GPP, 5g; security architecture and procedures for 5g system (3gpp ts 33.501 version 16.3.0 release 16), Tech. rep., ETSI (2020).
- 19.
M. Alfadel, E.-S. M. El-Alfy, K. M. A. Kamal, Evaluating time and throughput at different modes of operation in aes algorithm, in: 2017 8th International Conference on Information Technology (ICIT), IEEE, 2017, pp. 795–801.
- 20.
S. Neumeier, E. A. Walelgne, V. Bajpai, J. Ott, C. Facchi, Measuring the feasibility of teleoperated driving in mobile networks, in: 2019 Network Traffic Measurement and Analysis Conference (TMA), IEEE, 2019, pp. 113–120.
- 21.
3GPP, 5g; nr; radio link control (rlc) specification (3gpp ts 38.322 version 16.1.0 release 16), Tech. rep., ETSI (2020).
- 22. Gupta S., Gupta V., Analytical modeling of rlc protocol of lte using stochastic reward nets, International Journal of Communication Systems 32 (6) (2019) e3903.
- 23.
Sahner R. A., Trivedi K., Puliafito A., Performance and reliability analysis of computer systems: an example-based approach using the SHARPE software package, Springer Science & Business Media, 2012.
- 24.
3GPP, Ts 138 321—v16.3.0–5g; nr; medium access control (mac) protocol specification (3gpp ts 38.321 version 16.3.0 release 16), Tech. rep., ETSI (2021). URL https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
- 25. Zhang H., Liu N., Chu X., Long K., Aghvami A.-H., Leung V. C. M., Network slicing based 5g and future mobile networks: Mobility, resource management, and challenges, IEEE Communications Magazine 55 (8) (2017) 138–145.
- 26.
E. Engin, I. Hökelek, H. A. Çırpan, Resource allocation of embb and urllc traffic using pre-emption mechanism, in: 2023 46th International Conference on Telecommunications and Signal Processing (TSP), 2023, pp. 129–133.
- 27.
Vaezi M., Ding Z., Poor H. V., Multiple access techniques for 5G wireless networks and beyond, Springer International Publishing, 2018.
- 28.
3GPP, 5g; nr; user equipment (ue) radio access capabilities (3gpp ts 38.306 version 17.0.0 release 17), Tech. rep., ETSI (2022).
- 29.
I. R. S. Groups, FINAL EVALUATION REPORT FROM THE 5G INFRASTRUCTURE ASSOCIATION ON IMT-2020 PROPOSALS IMT-2020/ 14, 15, 16, PARTS OF 17, Technical report (tr), ITU, document 5D/50-E (02 2020).
- 30.
3GPP, 5G; NR; Physical layer procedures for data (3GPP TS 38.214 version 16.2.0 Release 16), Technical Specification (TS) 38.214, 3rd Generation Partnership Project (3GPP), version 16.2.0 (07 2020).
- 31.
3GPP, Technical Specification Group Radio Access Network; Study on New Radio Access Technology Physical Layer Aspects (Release 14), Technical Report (TR) 38.802, 3rd Generation Partnership Project (3GPP), version 14.2.0 (09 2017).
- 32.
3GPP, 5G; NR; Physical channels and modulation (3GPP TS 38.211 version 16.2.0 Release 16), Technical Specification (TS) 38.211, 3rd Generation Partnership Project (3GPP), version 16.2.0 (07 2020).
- 33.
3GPP, 5G; NR; User Equipment (UE) radio transmission and reception; Part 1: Range 1 Standalone (3GPP TS 38.101-1 version 16.4.0 Release 16), Technical Specification (TS) 38.101, 3rd Generation Partnership Project (3GPP), version 16.4.0 (07 2020).
- 34.
3GPP, 5G; NR; User Equipment (UE) radio transmission and reception; Part 2: Range 2 Standalone (3GPP TS 38.101-2 version 16.4.0 Release 16), Technical Specification (TS) 38.101, 3rd Generation Partnership Project (3GPP), version 16.4.0 (07 2020).
- 35.
5g-nr-radio-latency-models, https://github.com/msepulcre/5G-NR-Radio-Latency-Models, openly Available. Accessed: 08/23/2023 (2022).
- 36.
Kumar, S., Gautam, V., Sharma, S. & Giluka, M. Improving Uplink Transmissions for URLLC Communication in 5G NR. 2024 16th International Conference On COMmunication Systems & NETworkS (COMSNETS). pp. 1160–1163 (2024)
- 37. Kousaridas A., Manjunath R., Perdomo J., Zhou C., Zielinski E., Schmitz S. et al. QoS prediction for 5G connected and automated driving. IEEE Communications Magazine. 59, 58–64 (2021)
- 38. Perez P., Ruiz J., Benito I. & Lopez R. A parametric quality model to evaluate the performance of tele-operated driving services over 5G networks. Multimedia Tools And Applications. 81, 12287–12303 (2022)
- 39. Moses L., Sambantham P., Faheem M., Ali K S. & Khan A. Joint delay and energy aware dragonfly optimization-based uplink resource allocation scheme for LTE-A networks in a cross-layer environment. The Journal Of Engineering. 2024, e12353 (2024)
- 40. Sangeetha S., Logeshwaran J., Faheem M., Kannadasan R., Sundararaju S. & Vijayaraja L. Smart performance optimization of energy-aware scheduling model for resource sharing in 5G green communication systems. The Journal Of Engineering. 2024, e12358 (2024)