5G NR Random Access Process
Article from Abhijeet Kumar
Imagine you're trying to make the first contact with a radio tower from your smartphone. There’s no personal connection yet, but you must synchronize with the network before any data can flow. It's like trying to introduce yourself in a crowded room, everyone is talking, but you need the perfect moment to stand out.
The Random Access Procedure is that perfect introduction, where your phone raises its hand in the crowd to get the network's attention.
Let’s break down the four essential flows of the Random Access Procedure:
The UE sends a "preamble" to the network to indicate its desire to connect. Think of it as saying "hello" to the network.
Message Content:
It contains a randomly selected preamble from a pool (for contention-based access) or a dedicated preamble (for contention-free access). This message helps the network identify which device is trying to connect.
The gNB (network node) responds with a Random Access Response (RAR).
Message Content:
Timing advance: This helps the UE adjust its transmission timing so it syncs perfectly with the network.
Uplink grant: This allows the UE to send data.
Temporary C-RNTI: A temporary identifier given to the UE during the procedure.
The UE sends its data over the granted resources, introducing itself fully to the network.
Message Content: Includes UE identity, which could be a temporary identifier or the full UE identifier (e.g., IMSI), especially in contention-based access.
?
Let’s imagine a real-world scenario:
You’re at a crowded concert, and you want to catch the attention of your friends in a different section. You wave your hand (Preamble Transmission), and they respond by calling out your name (Random Access Response). But the problem is, a few other people wave at the same time. When your friends respond, you shout back, “It’s me!” (Scheduled Transmission), and your friends finally recognize you (Contention Resolution).
In the same way, your smartphone waves at the network, and the network responds—but it might have to figure out exactly which phone was waving, and that’s where contention resolution comes in.
I'd like to learn more about Random access.
1. Random Access Preamble (Msg1) - Section 8.1 38.213 3GPP
The first step in the random access procedure is the transmission of the Random Access Preamble.
Tpreamble=NCS+NGuard+NFormat
Where:
NGuard is the guard period between preambles.
NFormat defines the format and duration of the preamble.
The formula for Preamble Format:
Tpreamble=NPRACH×Duration?per?preamble?symbol
领英推荐
2. Random Access Response (RAR - Msg2) - Section 8.2 38.213 3GPP (Type-1 Random Access Procedure)
After the UE sends the preamble, the gNB (5G base station) responds with the Random Access Response (RAR), which includes several critical parameters.
Instructs the UE to adjust its transmission timing to synchronize with the network.
Formula for Timing Advance:
TTA=2×Dpropagation/C
Where: Dpropagation is the round-trip propagation delay.
C is the speed of light (299,792,458 m/s).
Uplink Grant: Provides the UE with the resources (frequency and time slots) to transmit its data.
Temporary C-RNTI: A temporary identifier for the UE during the access procedure.
TRAR?window=Tinitial+NRAR
3. PUSCH Scheduled by RAR UL Grant (Msg3) - Section 8.3 38.213 3GPP
Once the UE receives the RAR with the uplink grant, it uses this to transmit its data on the Physical Uplink Shared Channel (PUSCH).
PUE=P0+α?PL+ΔTPC
P0 is the initial power.
α is the path loss compensation factor.
PL is the path loss between UE and gNB.
ΔTPC is the power control command from the gNB.
Configuring the PUSCH Transmission
Once the UE receives the uplink grant from the RAR, it prepares to send Msg3, which includes its identifier (C-RNTI or S-TMSI). The PUSCH transmission follows specific steps, based on the parameters defined in the Random Access Response:
?
The formula for determining the number of bits required for the resource allocation field is:
PUSCH Transmission (Msg3)
Once the UE configures the frequency and timing parameters, it sends Msg3 over the PUSCH using the uplink resources granted by the gNB. This message contains critical information, such as the UE's identifier (C-RNTI or S-TMSI), which is needed for contention resolution.
Repetitions and Redundancy Versions
In certain cases, the UE may be required to repeat its PUSCH transmission (for example, in poor signal conditions). The number of repetitions can be indicated in the RAR UL grant. The modulation and coding scheme (MCS) used for each repetition is determined by fields in the RAR UL grant or DCI format 0_0. If the RAR does not specify the number of repetitions, the UE assumes a default value of 1 repetition .
4. PDSCH with UE Contention Resolution Identity (Msg4) - Section 8.4
The final step in the contention-based random access procedure is resolving contention, where multiple UEs might have used the same preamble.
?
Telecommunications Professional
5 个月Thank you. A pity that font size in the table at the bottom is small
Maintenance Senior Manager at MTN Yemen
5 个月Special thanks for valuable information