Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 7-Day Trial for You or Your Team.

Learn More →

Cross-layer latency analysis for 5G NR in V2X communications

Cross-layer latency analysis for 5G NR in V2X communications a1111111111 a1111111111 The 5G network was developed to push the capabilities of wireless networks to previously a1111111111 a1111111111 unseen performance limits, e.g., transmission rates of several gigabits per second, latency a1111111111 of less than a millisecond, and millions of devices connected at the same time. To meet these requirements, it is necessary to access new spectrum (the so-called millimeter waves) and use techniques such as Massive MIMO (Multiple-Input Multiple-Output) and beamforming. This required the design of a new radio interface, known as 5G NR, that OPENACCESS includes improvements to its physical components and new protocols. The performance of the 5G network will depend heavily on the behavior of these new protocols under certain Citation: Horta J, Siller M, Villarreal-Reyes S (2025) Cross-layer latency analysis for 5G NR in configuration parameters, traffic conditions, device density, and network architecture. This V2X communications. PLoS ONE 20(1): e0313772. paper introduces an analytical model for the performance evaluation of 5G NR. The devel- https://doi.org/10.1371/journal.pone.0313772 oped model describes the behavior of the different layer 1 and 2 protocols involved in 5G Editor: Muhammad Faheem, University of Vaasa: radio communication. Using the model, it is possible to evaluate the performance of 5G NR Vaasan Yliopisto, FINLAND in terms of throughput and latency, two key performance metrics used to describe QoS Received: May 7, 2024 (Quality of Service) thresholds of different applications. The protocol layer approach gives Accepted: October 31, 2024 the model sufficient granularity to identify critical behaviors that significantly impact perfor- mance. This can help focus efforts on improving these key points or propose improvements/ Published: January 9, 2025 modifications to the operation of network protocols or devices. The use of this model for per- Copyright:© 2025 Horta et al. This is an open formance evaluation is exemplified by studying a Remote Driving scenario operated over access article distributed under the terms of the Creative Commons Attribution License, which 5G. This scenario has very stringent delay requirements, which, according to the model’s permits unrestricted use, distribution, and results, can be satisfied if the network conditions are adequate. This model and its results reproduction in any medium, provided the original can be used as a starting point for performance evaluations of application involving end-to- author and source are credited. end (E2E) communications. Data Availability Statement: The simulation results presented in this article are generated with a custom developed simulator. Code is available on Github at https://github.com/JorgeHSa/ 5GNRSimulation. Funding: This research was partially supported by 1 Introduction a grant from the Consejo Nacional de Humanidades, Ciencias y Tecnologıas The fifth-generation (5G) of mobile networks aim to provide performance that significantly (CONAHCYT), awarded to Jorge Horta (CVU No. exceeds the one offered by fourth-generation (4G) networks. For instance, provisioning of 854262). The funder had no role in study design, peak data rates of 20 Gbps, latencies of 1ms, successful transmission probabilities above data collection and analysis, decision to publish, or preparation of the manuscript. 99.999%, high density of connected devices (up to 1000000 devices/km ), and improved PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 1 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Competing interests: The authors have declared network performance (Table 1.1 in [1]), should be feasible with 5G deployments. Different that no competing interests exist. organizations used these new performance limits to define use cases to guide the development of 5G technology. For instance, IMT-2020 defines three key use cases available for 5G. These cases, shown in Fig 1, are Enhanced Mobile Bandwidth (eMBB), Massive Machine Type Com- munications (mMTC), and Ultra Reliable Low Latency Communications (URLLC). The IMT-2020 classification represents these use cases as a triangle, with each vertex repre- senting a case with different requirements. The eMBB case focuses on improving the transmis- sion rate, mMTC increasing the number of connected devices, and URLLC reducing latency. Different applications can be placed in this triangle depending on the combination of their specific requirements. Consider the mission-critical and self-driving car applications, both of which require a low delay time, thus they are located near the URLLC vertex. The Smart City application favors connecting more devices simultaneously, hence it is located close to the URLLC vertex. On the other hand, video applications, remote work, or augmented reality require higher bandwidth. To achieve these performance goals, 5G standardization bodies have defined a New Radio (NR) interface which comprises access to new spectrum, massive multi-input multi-output beamforming, network slicing, dual connectivity with 4G, and cloud and edge computing support [2]. Thus, compared to 4G, the introduction of 5G NR required the development of a new protocol stack (layers 1 and 2) to integrate and access these technol- ogies. In addition, in 5G, there is the possibility of enabling edge computing deployments, which brings the processing closer to the user and allows the most demanding performance Fig 1. IMT-2020 use case and scenarios [4]. https://doi.org/10.1371/journal.pone.0313772.g001 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 2 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications limits (such as URLLC [3]) to be met. Although protocols and deployment scenarios are designed to ensure that applications meet specific Quality of Service (QoS) metrics, varying network conditions may make this unsatisfactory. It is necessary to evaluate the network con- figuration under different conditions to foresee behavior and make adjustments to solve it. Analytical models are attractive tools for this. This paper presents an analytical model for performance evaluation of the 5G NR protocol stack. This model is developed using a layered approach to consider the individual behavior of all protocols in the stack associated with 5G NR communication. The model focuses on describing in sufficient detail the contribution each of the stack’s protocols has on perfor- mance. The developed model is used to evaluate the performance of an application deployed in 5G with demanding delay requirements: Remote Driving. The main objectives of this work are: • Identify the behavior of 5G NR layer 1 and 2 protocols. • Develop analytical models for each of these protocols. • Integrate the models into a 5G NR model that considers all the individual contributions of the protocols. • Conduct a performance evaluation for the remote driving application deployed in 5G. The rest of the paper is organized as follows: Section 2 briefly introduces the architecture of a network for Remote Driving applications supported by 5G, and the state-of-the-art works relevant to it. Section 3 presents the development of the model, with a focus on analyzing and modeling the different protocols involved in radio communication. Section 4 reports the per- formance evaluation results for a remote driving application deployed in 5G NR. Finally, Sec- tion 6 discusses the developed model and the results obtained using it and concludes the paper. 2 Background and related work Remote driving, part of teleoperation systems, allows a driver (either human or an app) to con- trol a vehicle remotely. The 5G Automotive Association (5GAA) describes teleoperated driving as a use case associated with the autonomous driving group. Specifically, teleoperated driving is a Cellular V2X (C-V2X) use case in which a remote driver takes control of a vehicle to drive it efficiently and safely from the current location to its destination [5]. Teleoperated systems are mainly made up of three elements: a robot with sensors and actuators that allow the opera- tor to assess the environment and perform actions, generally with one or more cameras; a communication element, usually a wireless network, that allows the robot and the operator to exchange sensor data and control commands; and a control station, which enables the opera- tor to view and interpret sensing and video data as well as input devices that allow the operator to send control commands [6]. Translating this to the 5G remote driving use case, it follows that: • Robot: It is a system located within the vehicle that is capable of interfacing with control components (i.e., steering wheel, brake, throttle, etc.), in addition to one or more cameras and sensors that allow it to send information about the vehicle state and its surroundings. • Communication element: The 5G network establishes a communication link between the robot and the operator. • Control station: The remote site from which the operator will control the vehicle. It is usually equipped with one or several display elements to show the operator the video and data PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 3 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 2. Architecture for a 5G-enabled centralized remote driving application. https://doi.org/10.1371/journal.pone.0313772.g002 sensed by the vehicle and input devices that will enable commands to be captured and sent (i.e., keyboard, joystick, racing wheel, etc.). The architecture for a centralized remote driving application built with the above elements is shown in Fig 2a. Centralized deployment adds delays associated with traversing the 5G core network and the Internet. These delays may compromise fulfilling the stringent requirements of the remote driving application. Thus, the 5GAA proposed deployment options based on edge computing [7]. They aim to bring computing close to the vehicles to reduce the network delay. Based on these deployments, the control station for remote driving can be located on a node in the 5G Core Network or a site adjacent to the 5G gNB (Fig 2b). This can be considered as the baseline scenario for delay evaluation, because if delay requirements are not fulfilled for this case they will not be fulfilled for deployments where the control station is located further away from the 5G gNB. The evaluation requires estimating the 5G NR link delay under PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 4 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications different network conditions and configurations. Then, based on the obtained results, it is pos- sible to decide on the location of the control station that meets the delay requirements for remote driving. Thus, to demonstrate its usefulness, the analytical model introduced in this work is used to evaluate the delay for a remote driving application deployed in a Multi-access Edge Computing (MEC) 5G NR deployment where the control station is located next to the gNB (see Fig 2b). However, it is important to note that the use of the model is not limited to remote driving applications. Several state-of-the-art articles have investigated the application of remote driving, as described below. The authors in [8] present a study of a remote driving application perfor- mance and driving experience through an LTE network. The authors develop a prototype of a system to simulate remote driving under different network delay conditions. This prototype driving task is based on video streams transmitted from the prototype vehicle to the remote driving station. LTE network delay conditions are emulated using a probability distribution obtained from field measurements. The objective is to compare the performance and the driv- ing experience for two different scenarios: random delay and constant delay. In the first case, video frames are displayed as soon as they arrive. Thus, they may experience jitter. In the sec- ond case, the video frames are delayed to match the maximum delay experienced by the net- work (358 ms). This is done to eliminate jitter and smooth out the displayed video. The results show that while network delay is the biggest challenge for remote driving, a scenario with high variability (jitter) negatively impacts driver performance. They found that the performance in a scenario with constant high delay (with no jitter) is similar to that observed in a scenario with no delay. Conversely, a variable delay scenario imposes a more significant mental and physical load, frustration, and effort on the driver. This is why it is concluded that reducing the network delay could be helpful, but achieving a stable network delay value might be a prefera- ble enhancement for remote driving. In [9], the authors design and evaluate a remote driving system supported by 4G and 5G networks. This work describes an architecture that allows the application of remote driving and implement this architecture in a field test using a Hardware-In-the-Loop (HiL) simula- tion. Both implementations are used to evaluate remote driving application delay, bandwidth, and reliability using 4G and 5G networks. The following use cases are considered: straight-line driving and slalom. Those cases are evaluated under different latency and packet loss probabil- ity conditions. For remote driving, the vehicle must transmit video and some control com- mands. This data is presented to the remote driver to make decisions and execute actions sent to the vehicle as control commands. After analyzing the results obtained, the authors con- cluded that 5G offers advantages over 4G in remote driving applications,i.e. 5G latency is half of 4G latency. Furthermore, they did not observe a strong correlation between network delay and driver performance. They conclude that remote driving applications can be feasible with current technology in a low-speed (less than 40 km/h) scenarios. In [10], the authors propose a framework for driving vehicles remotely and validate this framework through performance evaluation in a real network environment. To implement this framework, they propose an architecture in which the vehicle is connected to the remote driving station via a commercial 4G/5G network. The architecture includes a remote driving station and a vehicle capable of transmitting video and other signals. It also requires a control mechanism capable of implementing the control commands received from the driver into the vehicle. These requirements are met using an Openpilot system in the test vehicle (2019 Toyota Prius Hybrid) as a basis. The authors modified the Openpilot base system to provide the vehicle with all the functions required to be driven by a remote driver. Using this imple- mentation, two different scenarios are tested: a local and a remote scenario. In the first sce- nario, the driver and the vehicle are connected to the same wireless network, which offers the PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 5 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications best case in terms of latency. In the second scenario, driving uses the commercially available 4G/5G network. After carrying out the different tests and analyzing the results, they conclude that control commands (sent from the remote driver to the vehicle) can experience an average delay of up to 32 ms and still allow remote driving in real-time. On the other hand, the average delay for streaming video is 680 ms, which would increase the difficulty of driving the vehicle remotely. In both cases, network performance is the main cause of delay, so the authors con- clude that these results can be improved with the next generation of mobile networks. The work [11] carries out a study on the remote control of a vehicle using video streams through wireless networks. Using a vehicle model and implementing a system based on the Robot Operating System (ROS), remote driving is enabled through a WiFi network that con- nects the vehicle and the remote driver. Driving tasks are guided by video streamed by the vehicle. The tests use three video-transmission protocols: ROS multi-computer communica- tion, UDP, and TCP. Additionally, an experiment is carried out in which the vehicle is driven based on the direct observation of the driver, which eliminates video delay and allows the impact of network latency to be measured. The different video transmission protocols are eval- uated in scenarios with different vehicle speeds. From the results, the authors conclude that remote vehicle operation is feasible if a low vehicle speed is maintained. It was also identified that the UDP-based stream offers the lowest latency for high-resolution video transmission compared to ROS and TCP. Another result found is that driver performance is more affected by delay jumps; thus, achieving a “deterministic delay” with low or no jitter is more important than a low delay with jitter. Much of the work related to remote driving is oriented towards experimental evaluation of driver performance, and aims to test the feasibility of such applications with current technolo- gies. Regarding analytical modeling, looking at works addressing Vehicle-to-Everything (VX2) scenarios is necessary. For instance, [12] presents an analytical 5G NR latency model in a V2X scenario where Vehicle-to-Network-to-Vehicle (V2N2V) communication is implemented. This model evaluates latency only at the radio level. The model considers different numerolo- gies (sub-carrier spacing or SCS, slot, and symbol duration, and Cyclic Prefixes), modulation and coding schemes, use of slots or mini-slots, dynamic or semi-static scheduling, different re- transmission mechanisms, as well as unicast or broadcast/multicast transmissions under dif- ferent traffic conditions. The authors use the model to assess the impact of different configura- tions on 5G delay and identify which ones meet the stringent latency and reliability requirements of V2X. This study is based on a cooperative lane change scenario enabled by V2N2V communication. The evaluation is carried out considering the requirements estab- lished by 3GPP associated with Low Level of Automation (LLoA) and High Level of Automa- tion (HLoA) [13]. These requirements are latencies of 25ms with 90% reliability for LLoA and 6ms with 99.99% reliability. From their results, the authors conclude that, at least at the radio level, 5G can be used for V2X services in an LLoA and periodic traffic environment. This is because all the evaluated scenarios had a latency of less than 6 ms in 90% of the cases. To com- ply with HLoA requirements, HARQ retransmissions are used. It is necessary to select the appropriate parameters (i.e., SCS and mini-slot) so as not to increase the radio latency and the required bandwidth. The impact of scheduling mechanisms on performance was also investi- gated. It was identified that semi-static scheduling is adequate to transmit periodic messages, while dynamic programming is more spectrum efficient for aperiodic messages. In the latter case, they demonstrated that the required control command exchange significantly affects the delay. Finally, the authors conclude that V2N2V 5G communication is suitable for V2X appli- cations with aperiodic traffic and non-strict latency requirements if the network load is low or medium and a high SCS value is used. PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 6 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications The work [14] presents a model for V2X application delay in 5G. As an extension of [12], different 5G deployment scenarios are considered to enable V2X applications. The authors argue that the delay is affected by the configuration of the 5G network, the traffic load, and the deployment and location of the application server (AS) that hosts the V2X application. In this case, the flexibility of 5G allows different deployment scenarios where the AS can be located in a remote cloud (centralized), or it may be found somewhere in the 5G core or transport net- works and even be co-located with the gNB. Deployment scenarios for a cooperative lane change case are evaluated using the traffic and configurations introduced in [12]. Based on the evaluation results, the authors concluded that a centralized scenario (cloud AS) has difficulties meeting the strict delay and reliability requirements of V2X. It was also identified that locating the AS closer to the edge of the cell can reduce delay. Still, the configuration must be chosen carefully, and network dimensioning must be considered. Furthermore, [12] does not address the development of analytical models to calculate the delay introduced by the protocol stack in 5G NR. This paper addresses this issue and thus complements the results presented in [12]. Regarding the handling of different QoS profiles in 5G service we have some works, such as [36]. This paper proposes some Configured Grant (CG) scheduling algorithms that can be adapted to the strict requirements of URLLC. The proposed algorithms, sorted-OFDMA and Best-MatchOFDMA, RB utilization are evaluated under different conditions of packet size, numerology and allocated bandwidth. These algorithms are compared against the traditional 5G algorithm for CG, called SymOFDMA. The results presented seem to indicate that the pro- posed algorithms have a similar level of efficiency to SymOFDMA. The work [37] studies the QoS requirements for remote and automated driving in 5G. The author proposes prediction algorithms for adjust the QoS requirements to varying network conditions. These variant conditions depend on background traffic (non-driving related appli- cations) from connected vehicles in the same cell and adjacent cells. This should be reflected in the MAC layer scheduling mechanisms, where traffic can be differentiated. Using the Random Forest algorithm, predictions are generated for different conditions (number of vehicle, posi- tions and network loads) and different prediction windows. By simulation the scenario, it is concluded that the prediction algorithm performs adequately as long as the prediction window is a few seconds and degrades as the window grows. The authors of [38] propose a parametric model for evaluating the performance of teleoper- ated driving. Three application scenarios with different requirements are proposed: Driving, Parking and Supervision. An analytical model for QoE based on different KPIs for the main aspects influencing remote driving is developed. These are: Video Coding Quality, Macro- blocking and Delay. Using data sets obtained from 4G and 5G networks measured in the corri- dor between Spain and Portugal, the different KPIs are estimated for different network configurations and conditions. Based on the results obtained, the authors conclude that cur- rent networks could hardly meet the requirements of teleoperated driving. However, 5G Stand Alone deployments, dedicated channels (network slicing), and MIMO provided by new chip- sets could help meet these requirements. The scheduling and correct use of radio resources are critical to meeting the requirements of 5G applications and use cases. Therefore, the problem of scheduling and resource allocation has been addressed by different works in the state of the art. The work [39] proposes a resource allocation method aimed at jointly optimizing delay and power consumption in LTE-A net- works. This allocation uses the DELFBDO (delay and energyaware Levy flight Brownian movement-based dragonfly optimization) algorithm to define a 3-phase process to determine the best allocation of resources. Teh fist stage determine and verify the scheduling parameters. In the second stage a estimate a parameter (α) that is used to rank UE priority. The final stage designates resources based on the priority rank. This algorithm is compared with other state- PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 7 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Table 1. State of the art summary. Work Network Technique [8] LTE Prototype Model Simulation Full Stack [9] 4G, 5G Test Bed ✘ ✘ ✔ [10] 4G, 5G Test Bed ✘ ✘ ✔ [11] WiFi Test Bed ✘ ✘ ✔ [12] 5G Analytical Model ✔ ✘ ✘ [14] 5G Analyical Model ✔ ✘ ✘ [36] 5G Scheduling Algorithm ✔ ✘ ✘ [37] 5G QoS Prediction Algorithm ✔ ✘ ✘ [38] 5G Analytical Mode ✔ ✘ ✘ [39] 4G LTE-A Scheduling Algorithm ✔ ✔ ✘ [40] 5G Scheduling Algorithm ✔ ✔ ✘ https://doi.org/10.1371/journal.pone.0313772.t001 of-the-art algorithms by simulation. Although this algorithm is outperformed by other single- metric oriented approaches, the authors conclude that in a multi-metric approach the perfor- mance of the proposed algorithm is balanced while sustaining the lowest energy consumption. In [40] the Energy Aware Scheduling Algorithm (EASA) performance for a 5G Green Net- work is analyzed. The authors propose an energy-aware scheduling model that considers the characteristics of 5G Green Communications. They present an analytical model to describe the optimization problem. A simulation is conducted to evaluate the model performance. The proposed algorithm uses machine learning to allocate real-time resources based on network conditions and user demand. Simulation results show that there is a reduction in energy con- sumption while maintaining high performance. The authors conclude that using energy-aware models can contribute to a sustainable environment without affecting performance or incur- ring operational costs to the grid. Table 1 presents a summary of the state of the art reviewed. 3 5G NR cross-layer analytical modeling This paper focuses on 5G NR protocols that enable communication between the user device (UE), in this case, the vehicle, and the base station (gNB). The analysis is carried out with a pro- tocol layer approach to identify the relevant behaviors of these protocols that influence the communication performance, mainly throughput and latency. For 5G, the radio link enabling protocols are those of layers 1 and 2 of the OSI reference model. These protocols are shown in Fig 3. It should be noted that the L2 layer is divided into different sub-layers to abstract and sim- plify the behavior associated with it. The behavior of each of the protocols shown in Fig 3 is based on the 3GPP specifications used to develop the models in this work. Based on the sce- nario, the one-way delay (OWD) of the radio link can be defined as follows: radio ¼ delay þ delay þ delay þ delay þ delay ð1Þ OWD sdap pdcp rlc mac phy where delay represents the delay introduced by layer x with x2 {sdap, pdcp, rlc, mac, phy}. Similarly, the performance of the radio link can be defined as: radio ¼ minðth ; th ; th ; th ; th Þ ð2Þ Th sdap pdcp rlc mac phy with th , the protocol throughput for x2 {sdap, pdcp, rlc, mac, phy}. It is necessary to define PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 8 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 3. 5G new radio protocols. https://doi.org/10.1371/journal.pone.0313772.g003 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 9 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 4. SDAP operation. https://doi.org/10.1371/journal.pone.0313772.g004 the performance of the different protocols to evaluate the models presented in Eqs 1 and 2. The remainder of this section describes the appropriate models for each of the protocols con- sidered in radio communication. 3.1 Service Data Adaptation Protocol (SDAP) sub-layer The Service Data Adaptation Protocol is the upper sub-layer protocol in L2. The function of SDAP is to manage different levels of QoS through traffic flows associated with each level [15]. This is handled by a QoS Flow Identifier (QFI) field included in the SDAP PDU header. On the transmitter side, the SDAP protocol receives IP packets, identifies the type of traffic by checking the appropriate field, and assigns a suitable identifier for this traffic (Fig 4a). After this, the SDAP PDU is generated, which will be retransmitted to the next layer (PDCP) in a virtual channel (radio bearer) on which packets with similar QoS requirements travel. On the receiver side, SDAP receives a PDU, from which the header is removed to identify its flow through the QFI field and then forwarded to the upper layer (Fig 4b). In the present model, all the packets transmitted by the device are considered to belong to the same class. Therefore, they are all processed similarly and retransmitted to the same virtual channel. Based on this behavior, SDAP can be identified as a store-and-forward element; thus, analyz- ing it as a queuing system is possible. For UL (Up-Link) on the transmitter side, video packets are assumed to follow a Poisson process. On the other hand, in DL (Down-Link), the packets from the control station arrive quasi-periodically; therefore, their arrival process is determin- istic. In both cases, the processing performed by SDAP is considered to have an exponential distribution. Based on this, the behavior of SDAP transmitter can be defined as an M/M/1 sys- tem and a D/M/1 system for UL and DL, respectively. Based on queuing theory, the SDAP PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 10 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications performance model for the UL direction can be obtained as follows: Th ¼ minðl ; m Þ ð3Þ tx SDAP UL SDAP SDAP Delay ¼ ð4Þ tx SDAP UL m l SDAP SDAP whereλ is the rate at which video packets arrive at the SDAP layer, and μ is the rate at SDAP SDAP which SDAP services incoming packets. For the DL direction, the throughput model is: � � Th ¼ min ; m ð5Þ tx SDAP DL SDAP here, T is the period between control packets arrivals. The following equation is used to calcu- late the time that each packet spends in the SDAP layer: Delay ¼ ð6Þ tx SDAP DL m ð1 sÞ SDAP −μT(1−σ) where, σ is the solution of σ = e with the lowest absolute value. Using the Eqs 3–6, SDAP performance can be evaluated in both communication directions. The results of this evaluation are presented in section 4. 3.2 Packet Data Convergence Protocol (PDCP) sub-layer The PDCP layer provides security and integrity protection for 5G communications and per- forms header compression [16]. PDCP functions are depicted in Fig 5. According to [2], the main functionality of header compression is to match 5G voice services with legacy voice ser- vices, which have no packet header. This analysis considers only data transmission; therefore, the header compression mechanism is not considered. On the PDCP, the transmitter side receives SDUs from SDAP. Each SDU is assigned an integrity code called Message Authentication Code (MAC-I), then encrypted, and a header and trailer are added to generate the PDCP PDU (See Fig 5a. No header compression is per- formed). The reverse process is done on the receiver side: first stripping the header, then checking the integrity using the MAC, and decrypting the content before sending it to the upper layer (Fig 5b). Thus, the behavior of PDCP is a process of three sequential service phases. Based on this, PDCP is described as a M/Hypo /1 queuing system. The geometric matrix approach is used for the analysis of this system. The queuing system has associated a transition matrix with a block structure of the form: 2 3 B B 0 0 0 ��� 00 01 6 7 6 7 6 B A A 0 0 ���7 10 1 2 6 7 6 7 6 7 0 A A A 0 ��� 6 0 1 2 7 6 7 6 7 6 7 0 0 A A A ��� 0 1 2 Q ¼ 6 7 ð7Þ 6 7 6 7 6 0 0 0 A A ���7 0 1 6 7 6 7 6 7 0 0 0 0 A ��� 6 7 6 7 4 5 . . . . . . . . . . . . . . . . . . PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 11 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 5. PDCP operation. https://doi.org/10.1371/journal.pone.0313772.g005 where the component block matrices are: B ¼ ½ l� ð8Þ B ¼ ½l 0 0� ð9Þ 2 3 6 7 6 7 B ¼ 0 ð10Þ 6 7 4 5 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 12 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications 2 3 0 0 0 6 7 6 7 A ¼ 0 0 0 ð11Þ 6 7 4 5 m 0 0 2 3 ðlþ m Þ m 0 1 1 6 7 6 7 A ¼ 0 ðlþ m Þ m ð12Þ 6 7 1 2 2 4 5 0 0 ðlþ m Þ 2 3 l 0 0 6 7 6 7 A ¼ 6 0 l 07 ð13Þ 4 5 0 0 l In Eqs 8–13, the valueλ is the rate at which packets arrive at the PDCP layer and μ , μ and 1 2 μ are the service rates associated to the MAC-I calculation, ciphering and header creation pro- cess, respectively. These equations are associated with the dynamics of the block matrix Q (Eq 7), allowing to describe how it transits between its levels. The level directly corresponds to the number of packets in the queue. Specifically, level 0 denotes no packets waiting, level 1 signifies 1 packet, and so on. The matrix in the Eq 8 indicates the rate at which the level 0 is exited. Eq 10 repre- sents the rate at which the level 0 is entered. Similarly, there are matrices that describe the dynamics when i > 0 packets are in the queue. In this case, these are square matrices of order n, where n = 3 is the number of sequential phases that comprise the service process. The matrix A (Eq 11) it is the rate at which a package transits from level i to level i − 1, which occurs when a package exits the 3rd phase of service (at a mu rate). Matrix A (Eq 12) contains the 3 1 rates of transitions between the different phases of service. Finally, matrix A is the rate at which level i transitions to level i + 1, which occurs atλ. Since this transition can occur during any phase of service, A matrix is constructed to represent this. MAC-I computation and encryption processing rates are associated with the data size. Therefore, these service rates must be estimated for the data sizes of interest in the present analysis. The M/Hypo /1 queue transition matrix (Eq 7) has a steady state vector π that satisfies: πQ ¼ 0 ð14Þ where the vector π has the form π = [π π π . . .]. Here, the element π = [π π π ] is a vec- 0 1 2 i i,1 i,2 i,3 tor associated with the probability that the queue has i packets in the queue and the current packet in service is in the j2 [1, 2, 3] phase of service. The elements of π are geometrically related by a matrix R such as: i 1 ð15Þ π ¼ π R i 1 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 13 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications The state of the queue is completely described by the π and π vectors and the R solution 0 1 matrix. The work [17] describes the R matrix in a closed form as: 2 3 lðlþ m Þðlþ m Þ lðlþ m Þ l 2 3 3 6 7 m m m m m m 1 2 3 2 3 3 6 7 6 7 6 7 6 7 l ðlþ m þ m Þ lðlþ m Þ l 2 3 3 6 7 R ¼ ð16Þ 6 7 m m m m m m 1 2 3 2 3 3 6 7 6 7 6 7 2 2 4 5 l ðlþ m Þ l l m m m m m m 1 2 3 2 3 3 The vectors π and π are those that satisfy the normalization condition: 0 1 ð17Þ π þπ ðI RÞ e ¼ 1 0 1 with I a 3x3 identity matrix and e = [1, 1, 1] . Once the vectors π , π , and the matrix R are 0 1 known, the statistics of the queue can be evaluated. The queue throughput is obtained as fol- lows: � � m m m 1 2 3 PDCP ¼ min l; ð18Þ Th m m þ m m þ m m 2 3 1 3 1 2 In addition, the delay is defined as: jπ ðI RÞ j 1 1 ð19Þ PDCP ¼ Delay where |x| is the 1-norm of vector x. The model presented above considers that all packets arriving at the PDCP layer have the same size. This is the case for transmitting driver control messages (DL directions). However, video streaming has two different packet sizes (one for 1280x720 and the other for 640x480 video). Thus, once the video packets arrive at the PDCP, the processing time of each of these packets must be differentiated. This leads to slightly modi- fying the approach adopted for the PDCP model. In this case, the service is no longer hypoex- ponential but follows a sequence of phases of service, as shown in Fig 6. where a is the probability that the arriving packet has high-resolution video, μ and μ are the ciphering 1,1 2,1 and integrity protection rates for high-resolution video packets. While μ and μ are those 1,2 2,2 rates for standard-resolution video packets. Based on this behavior, it can be identified that the service process is phase type (PH). These distributions have an associated rate matrix that guides the transition dynamics between the different phases. Using this matrix, the service pro- cess can be characterized, and the performance of the queuing system can be analyzed. For this, a geometric matrix approach is used, similar to that used to analyze the M/Hypo /1 system presented above. However, unlike this one, there is no explicit solution to find the R matrix associated with the system. Based on the Eq 14 it is identified that: π B þπ B ¼ 0 0 00 1 10 π B þπ A þπ A ¼ 0 ð20Þ 0 01 1 1 2 0 π A þπ A þπ A ¼ 0; i ¼ 2; 3; 4; ::: i 1 2 i 1 iþ1 0 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 14 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 6. PDCP operation for two packet sizes. https://doi.org/10.1371/journal.pone.0313772.g006 where: B ¼ ½ l� ð21Þ B ¼ ½ð1 aÞl al 0 0 0� ð22Þ 2 3 6 7 6 7 6 7 6 7 6 7 6 7 B ¼ 0 ð23Þ 6 7 6 7 6 7 6 7 4 5 2 3 0 0 0 0 0 6 7 6 7 0 0 0 0 0 6 7 6 7 6 7 6 7 A ¼ 0 0 0 0 0 ð24Þ 6 7 6 7 6 7 6 7 0 0 0 0 0 4 5 ð1 aÞm am 0 0 0 3 3 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 15 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications 2 3 ðm þ lÞ 0 m 0 0 1;1 1;1 6 7 6 7 0 ðm þ lÞ 0 m 0 6 7 1;2 1;2 6 7 6 7 6 7 A ¼ 0 0 ðm þ lÞ 0 m ð25Þ 1 2;1 2;1 6 7 6 7 6 7 6 7 0 0 0 ðm þ lÞ m 2;2 2;2 4 5 0 0 0 0 ðm þ lÞ Note that states i = 2, 3, 4, . . .. in Eq 20 have the same structure. It is this structure that allows the use of an algorithmic approach. Substituting 15 in 20 yields: i 2 i 1 i ðπ R ÞA þðπ R ÞA þðπ RÞA ¼ 0 ð26Þ 1 2 1 1 1 0 Manipulating Eq 26: i 2 2 π R ðA þ RA þ R A Þ ¼ 0 ð27Þ 1 2 1 0 Thus, the R matrix is the solution of the quadratic matrix equation A + RA + R A = 0. To 2 1 0 obtain R, it follows that: A þ RA þ R A ¼ 0 2 1 0 RA ¼ A R A ð28Þ 1 2 0 1 2 1 R ¼ A A R A A 2 1 0 1 Eq 28 is the base of the algorithm. This is: 1. Initialize R ¼ A A 0 2 1 1 2 1 2. Calculate R ¼ A A R A A , for i = 1, 2, 3, . . . i 2 0 1 i 1 1 3. Repeat step 2 until the value R converges, i.e. the difference between R and R is below a i−1 i threshold. Note that the delay equation (Eq 19) is still valid. However, the throughput model requires slight modification: � � PDCP ¼ min l; ð29Þ Th PDCP st where PDCP is the mean service time of the PDCP layer. This service time is derived from the st PH distribution that describes it. For the presented model it is given by: m � m � m � m � m 1;1 1;2 2;1 2;2 3 ð30Þ aðm m Þm m m þð1 aÞðm m Þm m m þ m m m m 1;2 2;2 1;1 2;1 3 1;1 2;1 1;2 2;2 3 1;1 2;1 1;2 2;2 This completes the description of the PDCP model. To evaluate the model, it is necessary to describe the parameters it depends on.λ is given by the packet rates associated with each com- munication scenario. As stated above, the encryption and integrity protection processes depend on the size of the packet. According to [18], 5G has three algorithm alternatives to per- form integrity protection and encryption. The available algorithms are presented in Table 2: The present study considers the alternative based on AES (i.e., 128-NIA2 and 128-NEA2). The reason for this choice is twofold: it is a non-proprietary option and well documented in PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 16 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Table 2. Algorithms used for integrity protection and ciphering. Algorithms Integrity Ciphering Based on 128-NIA1 128-NEA1 SNOW3G 128-NIA2 128-NEA2 AES 128-NIA3 128-NEA3 ZUC https://doi.org/10.1371/journal.pone.0313772.t002 Table 3. Average ciphering and integrity protection times for the different packet sizes. 200 B 467 B 520 B Ciphering 4.2107E-06 s 4.1865E-06 s ñ4.3196E-06 s Integrity 8.7660E-6 s 8.9776E-06 s 9.2588E-06 s https://doi.org/10.1371/journal.pone.0313772.t003 the literature. Using a technique like the one presented in [19], the AES algorithms for encryp- tion and integrity protection are implemented in Python and tested to obtain a service time estimate. Testing was performed on a Windows 11 Pro computer with an AMD Ryzen 7 5700G processor with Radeon Graphics @ 3.80 GHz and 32 GB of RAM. Encryption and integrity protection experiments were replicated 100,000 times for each packet size. For UL, these are 467 Bytes and 521 Bytes for packets transmitting 640x480 and 1280x720 video, respectively. For the DL case, considering that there are 50 objects in the vehicle [5] and that 32-bit commands are sent to each of them, the control packets are 200 bytes. This value is within the margins considered in [5, 20] for remote driving applications. The average encryp- tion and integrity protections times presented in Table 3 are obtained from these experiments. Using the average times presented in Table 3, processing rates for encryption (μ ) and integrity protection (μ ) are estimated. Based on these values, the evaluation presented in Sec- tion 4 is carried out. 3.3 Radio Link Control (RLC) sub-layer The RLC sublayer’s primary function is transmitting information in one of the three modes of operation available to it [21]. Those modes are Transparent Mode (TM), Unacknowledged Mode (UM), and Acknowledged Mode (AM). The two first operation modes are oriented to Control Plane message transmission. The last one is used for User Plane messages. The RLC AM operation is depicted in Fig 7. On the transmitter side, the RLC sublayer receives SDUs from the PDCP layer. Each SDU is assigned a header and then forwarded using an Automatic Repeat Request (ARQ) re-trans- mission mechanism (Fig 7a). RLC considers possible packet fragmentation if a large amount of data is received that cannot be transmitted in a single PDU. For the present study, it is assumed that fragmentation is not necessary. On the receiver side, the packets are received, and if no error occurs, the header is stripped, assembled in case of fragmentation, and sent to the next layer (Fig 7b). Due to its behavior, it is challenging to abstract RLC AM as a queuing system. Due to its behavior, it can be challenging to outline RLC AM as a queuing system. Hence, we looked for a different formalism to describe the AM RLC model. Inspired by [22], we model RLC AM as a Stochastic Reward Net (SRN). A SRN is a variant of stochastic Petri nets that allows the evaluation of different performance metrics by assigning reward functions. The SRN used to model RLC AM is presented in Fig 8. PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 17 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 7. RLC AM operation. https://doi.org/10.1371/journal.pone.0313772.g007 Regarding the SRN, the packets are generated with the activation of the Traffic timed transi- tion and are stored in the place of the Buffer. Once here, a header is added to them at a rate given by T and is stored in the P location. They are then transmitted (through the header header immediate transition t1) to the SR site if there is available room in the transmission win- window dow. This is where the ARQ mechanism begins. Packets are correctly transmitted with a rate given by the T transition. Erroneous transmissions occur at a rate defined by T . Each ACK NACK time this transition fires, a copy of the message is placed in the Retrans place. Once all buffer packets in SR have been attempted to be transmitted, packets in Retrans are trans- window buffer ferred back to SR for re-transmission through transition t2. This occurs if the maximum window number of re-transmissions allowed for each packet has yet to be reached. The MAXRetrans buf- place controls the number of re-transmissions. Each time a packet is placed in SR for fer windows re-transmission (t2 firing), its re-transmission counter in MAXRetrans is incremented. If buffer the packet is successfully transmitted before the maximum number of re-transmissions, the t3 transition resets the MAXRetrans counter. If a packet’s maximum number of re-transmis- buffer sions is reached, the packet is removed from the SR place, and the MAXRetrans window buffer counter is reset. These two actions are performed by firing the T transition. RLC AM per- discard formance analysis is performed using specialized tools for Petri nets. The SHARPE [23] tool is used for the present work. With the Sharpe tool, the relevant performance metrics for the model can be estimated. SHARPE analyzes the Markov chains associated with the Petri net to PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 18 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 8. RLC Stochastic Reward Net. https://doi.org/10.1371/journal.pone.0313772.g008 calculate the performance metrics. In this chain, the states are made up of the Petri net mark- ings. The transitions between these states are associated with the firing of the timed transitions. By analyzing the matrix associated with the Markov chain, the transient and stationary behav- ior of the chain can be identified. Performance metrics are derived from the steady state, for example, the average number of tokens at each site or the average rate at which each transition is triggered. Using this tool the throughput of the SRN RLC AM model can found to be: RLC ¼ t ð31Þ Th T ACK where τ is the mean firing rate of transition X. For obtaining the RLC delay, Little’s rule is used at each SRN place. Thus, the RLC delay is: #ðRetrans Þ #ðBufferÞ #ðSR Þ 1 Buffer window RLC ¼ þ þ þ ð32Þ Delay t Z t m Traffic T T TACK header NACK here, #(P) is the mean number of tokens (packets) in place P, and μ is the rate at which the TACK TACK transition fires when there are packets in the SR site. Using the Eqs 31 and 32, and window the Sharpe tool, it is possible to evaluate the performance of RLC AM. The results of this evalu- ation are presented in the following section. PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 19 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications 3.4 Medium Access Control (MAC) sub-layer The next sub-layer to analyze is the MAC layer. The primary services the MAC sublayer pro- vides are data transfer and radio resource allocation [24]. On the transmitter side, the data transfer is performed by generating MAC PDUs by assigning headers and appropriately for- matting the data before sending it to the physical (PHY) layer. On the receiver side, MAC receives the data from the PHY layer and tries to retrieve the data from the packet, and if this process is successful, it is transferred to the next layer. The MAC layer implements mecha- nisms for reliable transmissions. These include HARQ re-transmission or K-Repetitions mechanisms. In the first, feedback messages are used to control the re-transmission of packets that were erroneously received by the receiver. The package and the K − 1 copies are transmit- ted simultaneously in the second one. This increases the probability that the receiver can decode the data from one of the K copies sent. Concerning radio resource allocation, the scheduling mechanisms available in 5G fall into two main categories: dynamic scheduling and semi-static scheduling. In dynamic scheduling, requesting a resource each time a packet is transmitted is necessary, which results in delay and overhead due to the exchange of control messages. For semi-static scheduling, the resources that devices can use for transmitting are pre-allocated. This reduces latency and overhead at the cost of contending for resources. Either way, how the radio resources are structured influences the behavior of the scheduling mecha- nisms. For the present paper, the issue of scheduling is considered to be solved by using a semi-static mechanism. This means that every time there is a transmission, the device has already determined the resources that will be used to transmit. Re-transmission mechanisms (if applicable) and scheduling affect MAC behavior and per- formance. For this research, it is considered that there are no re-transmissions. This is because the messages exchanged (detected video/data and control commands) depend on the context of the vehicle, which changes very quickly. Because of this, messages are short-lived; therefore, it is not worth using resources to re-transmit a message. Also, remote driving packets are sup- posed to have priority; therefore, resources are pre-allocated to support them. Also, the resources are considered always available to transmit remote drive packets. In other words, the packet will be sent at the next available transmission opportunity; see Fig 9. This priority assumption can be supported by mechanisms developed for 5G, such as net- work slicing or preemption techniques. Network slicing generates virtual networks where resources are defined for the different services (for example, eMBB, URLLC, and mMTC). be assigned to each segment to meet the QoS requirements of each service [25]. Regarding the pre-emption methods, puncture techniques are worth mentioning. For instance, the work [26] introduces a resource allocation mechanism in which the resources allocated to eMBB traffic can be punctured (removed) and replaced with traffic data with more stringent requirements, URLLC. Using any of these techniques can guarantee resources to transmit remote drive packets. Based on these assumptions, MAC behavior is described as store-and-forward; where pack- ets arrive, a header is generated for each of them and forwarded at the appropriate time. The MAC headers are created at a rate μ . The time between when the packet is ready for trans- MAC mission and when it is transmitted is called frame τ , whose value is in the range [0, TTI]. TTI fra stands for Transmission Time Interval, the time resources are allocated in 5G. Based on this, the MAC layer performance model is described as follows: MAC ¼ minðl ; m Þ ð33Þ Th MAC MAC here,λ is the rate at which the packets arrive at the MAC layer. The mean MAC delay is MAC PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 20 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 9. Transmission of the packet in the next transmission opportunity. https://doi.org/10.1371/journal.pone.0313772.g009 estimated using the following equation: 1 TTI MAC ¼ þ ð34Þ Delay m l 2 MAC MAC The first component of Eq 34 refers to the delay of the header creation process, and the sec- ond to the average frame alignment time. Specifically, this work considers the K-Repetitions technique. This technique sends K copies of the data in a single “shot”. The receiver can use these K copies to try to recover the data. K-Repetitions is generally associated with Grant-Free mechanisms. In this case, it is necessary to consider not only delay but the other component of URLLC, reliability. To meet URLLC requirements for V2X scenarios, i.e., 3-10 ms with reliability of 0.99995, it is necessary to con- sider the different probabilities that correct data detection will not occur. As presented in ref, to describe the performance of Grant-Free K-Repeats, it is necessary to define the probability that the transmission is detected and the probability that each K-Repetition is correctly received. In [27, Chapter 16], a Grant-Free reliability model with K = 2 repetitions is presented. Using a similar analysis, a model for a K-Repetitions scheme can be defined as: !! � � K 1 i X Y k i k i rel ¼ 1 p þ ð p Þð1 p Þ p ð35Þ K miss HARQj miss miss i¼0 j¼1 where p is the probability that the transmission pilot is undetected, p is the probabil- miss HARQX ity that the data cannot be recovered by combining the redundancy of X packets, and p (p ) is the probability that any of the single K repetitions will be received incorrectly. e HARQ1 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 21 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Using Eq 35 the reliability for a K = 4 repetitions is: rel ¼ p p p p ð1 p Þ K¼4 HARQ2 HARQ3 HARQ4 e miss þ4p p p p ð1 p Þ HARQ2 HARQ3 e miss miss ð36Þ þ6p p p ð1 p Þ HARQ2 e miss miss þ4p p ð1 p Þ e miss miss þp miss In this case, the packet delay depends on which data packet is received correctly. To esti- mate this delay, the following equation is proposed: � � ðrel rel Þ K¼i K¼ði 1Þ Delay ¼ � i� TI ð37Þ K¼4 rel K¼4 i¼1 where (rel − rel ) represents the probability that the packet was successfully received K = i K = (i−1) at the i−th attempt, and TI refers to the packet transmission interval. In addition to the K- repeat delay (Eq 37, the MAC packet header generation time must be considered. Thus, the MAC layer delay operating with Grant-Free K-Repeats is defined as: MAC ¼ þ T þ Delay ð38Þ Delay GF align K¼4 m l MAC MAc where the first component refers to the queue delay, the second indicates the mean alignment time a packet waits before its transmission. This time is calculated assuming the packet will be transmitted in the RB following its creation. This packet creation can occur at any instant; therefore, the alignment time is uniformly distributed over the interval [0, T ]. Finally, the symbol K-Repetition delay is the third component of Eq 38. The Throughput of the MAC operating the K-Repetitions scheme can be derived based on the T interval; in this case, this is: shot � � MAC ¼ min l ; ð39Þ Th GF URLLC shot where,λ is the URLLC packets arrival rate. The value of 1/T represents the maximum URLLC shot number of K-repetition shots that can be transmitted. This time is defined as: T ¼ K � TI ð40Þ shot Using the MAC model Eqs (33) and (34), the performance of the MAC layer is evaluated, and the results are presented in Section 4. Similarly, using the Eqs 37 and 39, the performance of the K-Repetitions mechanism for URLLC is evaluated. 3.5 Physical (PHY) layer The PHY layer is where the packets, converted into signals, travel through the channel from the sender to the receiver. The performance of the PHY layer depends mainly on the chosen parameters (for example, bandwidth, coding and modulation order, etc.) and the channel con- ditions. The present study considers that the network operates in good channel conditions (best-case scenario). Based on this, the maximum PHY throughput model described by 3GPP PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 22 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications in [28] is used. This model is: ðjÞ BW N � 12 ðjÞ ðjÞ PRB ðjÞ PHY ¼ v � Q � R �ð1 OH Þ bps ð41Þ Th layer m max j¼1 where: • J is the number of aggregated component carriers in a band or combination. It has a value of 16 for 5G NR UL and DL in [29]. • R is 948/1024, the maximum number of Low-Density Parity Check (LDPC) obtained max from [30]. • For the j − th Component Carrier (CC): ðiÞ • v is the maximum number of supported layers given by the higher layer parameter Layers maxNumberMIMO-LayersPDSCH for downlink and a maximum of higher layer parame- ters maxNumberMIMO-LayersCB-PUSCH and maxNumberMIMO-LayersNonCB- PUSCH for uplink. Options for this variable values for UL and DL are specified in [29, 31]. ðjÞ • Q is the maximum supported modulation order given by the higher layer parameter sup- portedModulationOrderDL for downlink and the higher layer parameter supportedModu- lationOrderUL for uplink. Values for QPSK, 16QAM, 64QAM, and 256QAM for UL and DL can be obtained in [32]. (j) • f is the scaling factor given by the higher layer parameter scalingFactor and can take the values 1, 0.8, 0.75, and 0.4. • μ is the numerology [32]. • T is the average OFDM symbol duration in a subframe for numerology μ. Assuming a m 10 normal cyclic prefix the value is T ¼ s 14:2 ðjÞ BW m (j) • N is the maximum RB allocation in the bandwidth BW with numerology μ as PRB (j) defined in [33, 34]. BW is the UE maximum supported bandwidth in a specific band or band combination. (j) • OH is overhead and can take one of the following values: 1. 0.14 for DL in frequency range FR1 2. 0.18 for DL in frequency range FR2 3. 0.08 for UL in frequency range FR1 4. 0.10 for UL in frequency range FR2 The maximum throughput limit for a given set of parameters is established using the model presented in Eq 41. In a real scenario, the actual throughput is expected to be less than or equal to this value. Regarding the delay, considering different components, such as propagation time, transmission time, and other processing times, is necessary. The model describes the delay of the PHY layer: PHY ¼ t þ t þ t þ t ð42Þ Delay proc tx prop proc tx rx where t and t are the processing time at the transmitter and receiver side, respectively; proc proc tx rx τ is the transmission delay, and τ is the propagation time. The transmission delay is tx prop PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 23 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications related to the radio resources required to transmit the data and is associated with the configu- ration parameters. The propagation delay depends on the distance between the transmitter and the receiver; thus, it is limited by the size of the 5G cell. Finally, it is necessary to describe the processing times (t and t ). Following [12], these values are given by tau ¼ proc proc proc tx rx tx T =2 and t ¼ T =2. Here, T is the UE Physical Downlink Shared Channel proc,1 proc;2 prox proc;1 rx (PDSCH) processing procedure time, and T is the Physical Uplink Shared Channel proc,2 (PUSCH) preparation procedure time. Both depend on the device’s processing capabilities and are defined in [30]. The performance of the PHY layer can now be evaluated using Eqs 41 and 42. The following section evaluates all the models developed in this section, considering a V2X scenario for the remote driving application. 4 Model results The present section uses the models presented in section 3 to evaluate the performance of 5G radio communication for a remote driving usage scenario. First, the remote driving scenario is described. Then, the configuration parameters for 5G NR are described. Finally, the perfor- mance evaluation results of the different 5G NR protocols operating with the defined parame- ters are presented. 4.1 Evaluation scenario The deployment scenario is shown in Fig 2b. This scenario presents a deployment in MEC. Therefore, communication occurs only on the 5G radio network and is mainly supported by 5G NR protocols. As mentioned above, the remote driving application requires vehicle status data, mainly video, to be transmitted to the remote driver. At the same time, the driver is required to send control commands. These transmissions are identified as Uplink when their origin is the vehi- cle and Downlink when the remote driver generates them; therefore, its source is the gNB for the radio link. In the case of UL, the traffic depends on the resolution, encoding, and other parameters associated with the video. This transmission requires higher bandwidth and is one of the critical points for the definition of remote driving applications. For the proposed sce- nario, it is considered that the vehicle has 4 cameras that transmit the vision of the vehicle’s surroundings. This is depicted in Fig 10. While some references mention that are needed between 25 and 32 Mbps to stream video from the vehicle’s four cameras,e.g., [5] states that 8 Mbps is required to stream a high-resolu- tion video stream, other works present real measurements where this requirement is less demanding. For example, in [10], the authors report that 22kBps (176kbps) and 67kBps (536kbps) are required to stream videos in 640x480 and 1280x720 resolution, respectively. According to their measurements, the videos are transmitted at a mean rate of 47.3 and 129.1 packets/s. The present study considers this last scenario for the video transmission evaluation. Considering that the cameras are independent, the total traffic transmitted in UL is the sum of the traffic of each camera. Thus, the UL traffic is defined as: l ¼ l þ l þ l þ l UL front rear left right ð43Þ ¼ 129:1þ 47:3þ 47:3þ 47:3 ¼ 271packets=s where,λ is the UL traffic rate andλ ,λ ,λ andλ are the traffic rates associated with UL front rear left right the front, rear, left and right cameras, respectively. For DL transmission, it is considered that the control commands originated by the driver are transmitted periodically. This is done to PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 24 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 10. Remote driving study scenario. https://doi.org/10.1371/journal.pone.0313772.g010 ensure that only a few orders during the transmission period of the lost packet are affected in case of packet loss. Typically, these transmissions are defined to occur several times per second; for example, 5GAA [5] states that 50 transmissions per second (20ms), and [20] mentions that they occur every 10ms (100 times per second). The model evaluation considers both scenarios, referred to as DL and DL . A B The 5G network configuration parameters are based on those presented in [12], oriented to 5G V2X scenarios. These are summarized in Table 4: Here, BW is the bandwidth used for the 5G network. CP is the employed cyclic prefix; its value is 14 meaning a normal prefix. Slot is the size of the TTI given in OFDM symbols. NRB Table 4. 5G NR configuration parameters. Parameters BW 20 MHz CP Normal Cyclic Prefix (NCP) Slot 14 OFDM Symbols (full-slot) NRB 51 RB Q (Modulation) 8 R (Coding Rate) 0.8643 μ 1 (Numerology) SCS 15�2 kHz = 30kHz v 2 MIMO-Layers https://doi.org/10.1371/journal.pone.0313772.t004 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 25 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications are the Resource Blocks (RB) available for the given bandwidth and specific numerology; it is provided by [33]. The numerology μ with μ2 {0, 1, 2, 3, 4} defines the sub-carrier spacing (SCS). Finally, v determines the maximum MIMO (Multiple-Input, Multiple-Output) layers. For this analysis, we consider a maximum of two MIMO layers. 4.2 SDAP model evaluation The SDAP performance in the UL direction on the transmitter side is calculated using Eqs 3 and 4. These performance values for the interest traffic rate (271packets/s) are: Th ¼ 271packets=s SDAP UL Delay ¼ 2:000e 8s SDAP UL For the DL direction performance equations, 5 and 6 are employed. In this scenario, the rel- evant traffic rates are DL = 50packets/s[5] and DL = 100packets/s[20]. The performance val- A B ues for these relevant rates are Th ¼ 50packets=s SDAP DL Delay ¼ 2:000e 8s SDAP DL for the former rate, and, Th ¼ 100packets=s SDAP DL Delay ¼ 2:000e 8s SDAP DL for the latter. 4.3 PDCP model evaluation The PDCP performance obtained using the models described in section 3.2 are presented below. As PDCP performance is affected by the size of the transmitted packet, it is necessary to perform a specific evaluation for each of these packet sizes. In this case, the UL traffic rate of 271packets/s is composed of 129.1packets/s containing HD video and 141.9packets/s with SD video. Based on this, 47.64% of the arriving packets contain HD, and 52.36% contains SD video. Using these values, the following performance results are obtained: Th ¼ 271packets=s PDCP UL Delay ¼ 3:3582e 5 PDCP UL On the other hand, the performance metrics related to the DL relevant rates are Th ¼ 50packets=s PDCP DL Delay ¼ 3:2945e 5 PDCP DL PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 26 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications for the DL rate, and they are Th ¼ 100packets=s PDCP DL Delay ¼ 3:2945e 5: PDCP DL for the DL rate. 4.4 RLC model evaluation The performance of the RLC layer is evaluated using the model presented in section 3.3. As mentioned above, the RLC model is evaluated using the SHARPE tool. The model is config- ured using the parameters in Tables 5–7: Where p is the packet success transmission, windows_size is the size of the ARQ mechanism and max_ret is the maximum number of repetitions allowed for each packet Using it, the SRN associated with RLC (Fig 8) is defined, and the rewards associated with the throughput and latency metrics are evaluated. The results of this evaluation are presented below. First, results associated with UL streams containing video are displayed. The results associated with this stream are Th ¼ 271packets=s RLC UL Delay ¼ 4:0309e 8s RLC UL Table 5. Timed transition configuration parameters. Transition Value Traffic PDCP Th −1 T 0.02 packets/ms header T p/0.01packet/ms ACK T (1 − p)/0.01packets/ms NACK https://doi.org/10.1371/journal.pone.0313772.t005 Table 6. Parameters for activating immediate transitions. Transition Activation Condition t1 #(SR indow) + #(Retrans uffer)) < window_size W B t2 #(SR indow) == 0 T #(MaxRetrans )<max_ret Discard Buffer t #(MaxRetrans )<max_ret)&(#(SR indow) == 0) 3 Buffer W &(#(Retrans ) == 0 Buffer https://doi.org/10.1371/journal.pone.0313772.t006 Table 7. Constant parameters. Parameter Value p 0.97 window_size 10 max_ret 20 https://doi.org/10.1371/journal.pone.0313772.t007 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 27 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications The DL directions performance metrics are Th ¼ 50packets=s RLC DL Delay ¼ 1:0e 8s RLC DL and, Th ¼ 100packets=s RLC DL Delay ¼ 1:0e 8s RLC DL for the DL rate and DL rate, respectively. A B 4.5 MAC model evaluation The next sub-layer to analyze is the MAC. In this case, the results presented are based on the model developed in Section 3.4. The MAC layer behavior depends on the data size, which determines the resources necessary for the transmission. The resources needed to transmit each packet type are determined using Table 4 parameters. Some codes developed in [12] are used for the needed resource calculation. The authors made these codes available in [35]. Table 8 presents the results for each packet type. These results include the Transport Block Size (TBS), i.e., the number of bits to be transmitted and the RB required. Based on the results presented in Table 8, the performance analysis of the MAC layer is per- formed. It highlights the fact that the assumed network conditions are resulting in the amount of resources needed being low. Furthermore, this supports the assumption that the package will be broadcast at the next available transmission opportunity. The results obtained from the performance evaluation of the MAC layer for the UL direction are Th ¼ 271packets=s MAC UL Delay ¼ 2:5002e 8s MAC UL For the DL direction, the control packets are sent using URLLC. Based on the Configura- tion Parameters shown in Table 4, these packets can be transmitted using a single RB. The RB duration is defined as T . This time is defined as: symbol ð44Þ T ¼ symbol m 14� 2 Using the definition of T to calculate the value of TI defined in Eq 39 for a shot of 4rep- symbol −1 μ etitions is TI = 4� T = 40 /14� 2 . The rest of the parameters described in the equation symbol are defined in Table 9. Referring to Table 9, the value of p refers to the probability that a packet is received with an error. It is derived from the Block Error Rate (BLER). The values of p , X2 {2, 3, 4}, refer HARQX Table 8. Resource required for the packet transmissions. Packet Content TBS RBs Video (640x480) 4224 bits 2 RB Video (1280x720) 6272 bits 3 RB Control Commands 2088 bits 1 RB https://doi.org/10.1371/journal.pone.0313772.t008 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 28 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Table 9. Values for the error probabilities parameters in Eq 35. Parameter Value p < = 0.006 miss p 0.1 p 0.03 HARQ2 p 0.04 HARQ3 p 0.05 HARQ4 https://doi.org/10.1371/journal.pone.0313772.t009 to the probability that a packet cannot be retrieved using the redundancy mechanism with X packages. Finally, the value of p <= 0.006 is chosen to ensure that the reliability is as miss required by URLLC. These pilots can be transmitted over the control channels, making the transmission more reliable. Now that these parameters have been set, it is possible to use Eqs 37 and 39 to obtain the performance of the MAC layer operating with URLLC. In particular, the MAC downlink performance for dataflows DL and DL can be calculated as: A B Th ¼ 50packets=s MAC DL Delay ¼ 2:8765e 5s MAC DL Th ¼ 100packets=s MAC DL Delay ¼ 2:8765e 5s MAC DL 4.6 PHY model evaluation Finally, the performance of the PHY layer is analyzed. The evaluation is based on the models presented in 2.5. PHY performance depends on the amount of data to be transmitted. There- fore, for UL, two different pack sizes are contemplated: 466 Bytes for 640x480 video and 520 Bytes for 1280x720 video. The TBS presented in Table 8 are calculated based on these sizes. As stated in section 3.2, the probability that a high-resolution video packet arrives is a. Thus, the τ component in 42, which refers to the average transmission delay, is calculated by consider- tx ing the packet size and its associated probability as follows: TBS TBS 1280x720 640x480 t ¼ a� þð1 aÞ� ð45Þ tx PHY PHY Th Th The evaluation results for the UL direction are Th ¼ 271packets=s PHY UL Delay ¼ 2:0360e 4s PHY UL On the other hand, DL transmission considers a single control command packet size. Therefore, its transmission delay is τ = TBS /PHY . The evaluation performance results tx CC Th PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 29 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Table 10. Performance evaluation results for UL video transmission. UL Video Transmission Protocol Th (packets/s) Delay (s) SDAP 271 (Eq 3) 2e-8 (Eq 4) PDCP 271 (Eq 29) 3.3582e-5 (Eq 19) RLC 271 (Eq 31) 4.0309e-08 (Eq 32) MAC 271 (Eq 33) 2.5002e-4 (Eq 34) PHY 271 (Eq 41) 2.0360e-4 (Eq 42) Cross-Layer 271 (Eq 2) 4.8727e-04 (Eq 1) https://doi.org/10.1371/journal.pone.0313772.t010 are Th ¼ 50packets=s PHY DL Delay ¼ 1:900e 4s PHY DL and Th ¼ 100packets=s PHY DL Delay ¼ 1:900e 4s PHY DL 4.7 Overall 5G NR performance for remote driving Tables 10–12 summarize the network performance results for the three transmission flows of 5G NR, which are relevant for the Remote Driving scenario. The overall cross-layer delay per- formance can be calculated by using Eq 1 as: radio ¼ 4:8727e 04s for UL Video Transmission OWD radio ¼ 2:5181e 04s for DL OWD A radio ¼ 2:5185e 04s for DL OWD B Considering that the performance requirements defined by the 5GAA [5] for Remote Driv- ing establishes a maximum latency of 100 ms on UL and 20 ms on DL, it can be concluded Table 11. Performance evaluation results for DL control packets transmission. DL ControlPacketTransmission Protocol Th (packets/s) Delay (s) SDAP 50 (Eq 3) 2.0000e-08 (Eq 6) PDCP 50 (Eq 29) 3.2945e-05 (Eq 19) RLC 50 (Eq 31) 1.0000e-08 (Eq 32) MAC 50 (Eq 33) 2.8762e-05 (Eq 34) PHY 50 (Eq 41) 1.900e-04 (Eq 42) Cross-Layer 50 (Eq 2) 2.5181e-04 (Eq 1) https://doi.org/10.1371/journal.pone.0313772.t011 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 30 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Table 12. Performance evaluation results for DL control packets transmission. DL ControlPacketTransmission Protocol Th (packets/s) Delay (s) SDAP 100 (Eq 3) 2.0000e-08 (Eq 6) PDCP 100 (Eq 29) 3.2945e-05 (Eq 19) RLC 100 (Eq 31) 1.0000e-08 (Eq 32) MAC 100 (Eq 33) 2.8762e-05 (Eq 34) PHY 100 (Eq 41) 1.900e-04 (Eq 42) Cross-Layer 100 (Eq 2) 2.5185e-04 (Eq 1) https://doi.org/10.1371/journal.pone.0313772.t012 that transmission over 5G NR introduces a very small latency over the data flow. Thus, the control station can be located further away from the gNB, as long as the latency is kept below the margins mentioned before. Therefore, our model can be used a starting point when analyz- ing if network architectures where the data flows across 5G NR, 5G transport network (TN), 5G core network (CN), and the Internet are feasible to deploy (e.g. see Fig 2a). 5 Simulation results This section validates the results of the analytical model presented above. For this validation, a comparison with simulation results was used. The simulation uses the Julia language to write code that replicates the behavior of 5G NR protocols. Using this code, a series of iterations is run to obtain the average values of the performance metrics, throughput and latency. The parameters used for model evaluation and simulation are chosen to represent the transmission of control packets in the DL sense. This is chosen because it is the communication with the most stringent delay requirements and, therefore, must operate at conditions close to URLLC. A summary of the parameters used is presented in the Table 13. The processing delay values for the various layers are chosen to represent a device with suf- ficient capabilities to support 5G URLLC transmissions. The value of the radius, i.e., the dis- tance between the vehicle and the gNB base station, is defined as in article [14], which presents a remote driving application. For the definition of the bit rate in the PHY layer, the maximum rate defined in [28] Section 5 is used. The analyzed traffic rate is chosen to cover the values of interest for the remote driving application, 50 and 100 packets/s. Using the values of the parameters in the Table 13, the performance results presented in Figs 11 and 12 are obtained for flow rate and latency, respectively. Table 13. Simulation configuration parameters. Parameter Value Traffic 1��� 200packets/s SDAP Processing Delay 0.02μs PDCP Integrity Delay 8.7660μs PDCP Ciphering Delay 4.2107μs PDCP Header Delay 0.02μs RLC Haader Delay 0.02μs RLC HARQ Transmission Delay 0.01μs MAC Processing Delay 0.02μs PHY Radio Distance 866m PHY Bitrate 218Mbps https://doi.org/10.1371/journal.pone.0313772.t013 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 31 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 11. 5G NR throughput evaluation. https://doi.org/10.1371/journal.pone.0313772.g011 The presented performance evaluation results indicate that the model results adequately describe the behavior of 5G NR. This is based on the comparison of these with simulation results. The results for Flow (Fig 11) are practically identical, having a correlation of 0.9999 and an RMSE (Root Mean Square Error of 2.2919e − 4packets/s. On the other hand, although the simulation delay results seem more dispersed (correlation of −0.5155), both of them (model and simulation) share the same trend and their valuers are close, with an RMSE of 8.3321e−5s. This allows us to establish that the model is suitable for the performance evalua- tion of 5G NR. Although the delay results seem to have a constant value, a closer look reveals that it suffers from a slight increase, see Fig 13. This finding suggests that not being careful in the rate of packets being transmitted may lead to the risk that delay grows beyond the thresholds required by URLLC applications. In addition, operating in non-ideal network conditions or where the scheduling mechanism is inadequate threatens compliance with URLLC delay requirements. 6 Discussion & conclusions In this paper, we introduced an analytical model for the protocol stack of 5G NR. The model was designed using a layered approach that considers all protocols involved in 5G NR commu- nication: SDAP, PDCP, RLC, MAC, and PHY. All the protocol functions concerning user data transmission were analyzed to develop the model. Thus, by using different analytical tools like queuing theory and SRN, the behavior of each radio protocol was described and its perfor- mance components were derived. These components can then be used to evaluate the PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 32 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 12. 5G NR delay evaluation. https://doi.org/10.1371/journal.pone.0313772.g012 performance provided by5G NR for different applications by calculating metrics like as delay and throughput with the model. As an example of its utility, the derived model was used to evaluate the performance of an application with stringent delay requirements: Remote Driving. It was found that when the control station is located nearby the 5G gNB, the protocol stack of 5G NR does not introduces significant delay. Particularly, it was found that the accumulated delay for UL video transmis- sion and control packets transmission is well below the maximum latency of 100 ms on UL and 20 ms on DL required by the 5GAA [5] for Remote Driving. Furthermoe, from this results it can be concluded that data transmission over 5g NR provides sufficient delay margin to locate the control station further away from the 5G gNB (e.g. see Fig 2a) and still meet the requirements set by the 5GAA for Remote Driving. As such, The model introduced in this paper model can complement end-to-end 5G analysis, such as the one presented in [14]. In conclusion, the model proposed in this paper can be used to evaluate the performance of the protocol stack of 5G NR under different network configurations, traffic conditions and scheduling mechanisms. By using the model, selecting an adequate parameter combination for different network conditions and applications is possible. Furthermore, the model can also be used to identify whether an edge, fog or cloud deployment is adequate for a given application. Thus, the developed model can be used as a starting point for end-to-end (E2E) network per- formance evaluations of 5G-supported deployments. PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 33 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 13. 5G NR delay evaluation close view. https://doi.org/10.1371/journal.pone.0313772.g013 Author Contributions Conceptualization: Mario Siller, Salvador Villarreal-Reyes. Investigation: Jorge Horta, Mario Siller, Salvador Villarreal-Reyes. Methodology: Jorge Horta. Project administration: Mario Siller. Supervision: Mario Siller, Salvador Villarreal-Reyes. Visualization: Jorge Horta. Writing – original draft: Jorge Horta. Writing – review & editing: Salvador Villarreal-Reyes. References 1. Lin X., Lee N., 5g and beyond, Cham, Switzerland: Springer Nature Switzerland AG (2021). 2. Holma H., Toskala A., Nakamura T., 5G technology: 3GPP new radio, John Wiley & Sons, 2020. 3. A. Zaidi (2021). [link]. URL https://www.ericsson.com/en/blog/2021/10/realizing-time-critical- communication-with-5g 4. Dahlman E., Parkvall S., Sko ¨ ld J., 5G NR The Next Generation Wireless Access Technology, Mara Conner, 2018. https://doi.org/10.1017/CBO9781107415324.004 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 34 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications 5. G. A. Association, et al., C-v2x use cases volume ii: Examples and service level requirements, White Paper (2020). 6. Winfield A. F., Future directions in tele-operated robotics, Telerobotic applications (2000) 147–163. 7. 5GAA, Mec for automotive in multi-operator scenarios, White Paper (2021). 8. R. Liu, D. Kwak, S. Devarakonda, K. Bekris, L. Iftode, Investigating remote driving over the lte network, in: Proceedings of the 9th international conference on automotive user interfaces and interactive vehic- ular applications, 2017, pp. 264–269. 9. den Ouden J., Ho V., van der Smagt T., Kakes G., Rommel S., Passchier I., et al., Design and evalua- tion of remote driving architecture on 4g and 5g mobile networks, Frontiers in Future Transportation 2 (2022) 801567. https://doi.org/10.3389/ffutr.2021.801567 10. Saez-Perez J., Wang Q., Alcaraz-Calero J. M., Garcia-Rodriguez J., Design, implementation, and empirical validation of a framework for remote car driving using a commercial mobile network, Sensors 23 (3) (2023) 1671. https://doi.org/10.3390/s23031671 PMID: 36772711 11. Yu Y., Lee S., Remote driving control with real-time video streaming over wireless networks: Design and evaluation, IEEE Access 10 (2022) 64920–64932. https://doi.org/10.1109/ACCESS.2022. 12. Lucas-Estañ M. C., Coll-Perales B., Shimizu T., Gozalvez J., Higuchi T., Avedisov S., et al., An analyti- cal latency model and evaluation of the capacity of 5g nr to support v2x services using v2n2v communi- cations, IEEE Transactions on Vehicular Technology 72 (2) (2022) 2293–2306. https://doi.org/10. 1109/TVT.2022.3208306 13. 3GPP, Study on enhancement of 3gpp support for 5g v2x services: Tr 22.886, v16. 2.0, Tech. rep., ETSI (2018). 14. Coll-Perales B., Lucas-Estañ M. C., Shimizu T., Gozalvez J., Higuchi T., Avedisov S., et al., End-to-end v2x latency modeling and analysis in 5g networks, IEEE Transactions on Vehicular Technology 72 (4) (2022) 5094–5109. https://doi.org/10.1109/TVT.2022.3224614 15. 3GPP, Lte; 5g; evolved universal terrestrial radio access (e-utra) and nr; service data adaptation proto- col (sdap) specification (3gpp ts 37.324 version 16.2.0 release 16), Tech. rep., ETSI (2020). 16. 3GPP, 5g; nr; packet data convergence protocol (pdcp) specification (3gpp ts 38.323 version 16.2.0 release 16), Tech. rep., ETSI (2020). 17. Marin A., Bulò S. R., Explicit solutions for queues with hypo-or hyper-exponential service time distribu- tion and application to product-form approximations, Performance Evaluation 81 (2014) 1–19. https:// doi.org/10.1016/j.peva.2014.07.021 18. 3GPP, 5g; security architecture and procedures for 5g system (3gpp ts 33.501 version 16.3.0 release 16), Tech. rep., ETSI (2020). 19. M. Alfadel, E.-S. M. El-Alfy, K. M. A. Kamal, Evaluating time and throughput at different modes of opera- tion in aes algorithm, in: 2017 8th International Conference on Information Technology (ICIT), IEEE, 2017, pp. 795–801. 20. S. Neumeier, E. A. Walelgne, V. Bajpai, J. Ott, C. Facchi, Measuring the feasibility of teleoperated driv- ing in mobile networks, in: 2019 Network Traffic Measurement and Analysis Conference (TMA), IEEE, 2019, pp. 113–120. 21. 3GPP, 5g; nr; radio link control (rlc) specification (3gpp ts 38.322 version 16.1.0 release 16), Tech. rep., ETSI (2020). 22. Gupta S., Gupta V., Analytical modeling of rlc protocol of lte using stochastic reward nets, International Journal of Communication Systems 32 (6) (2019) e3903. https://doi.org/10.1002/dac.3903 23. Sahner R. A., Trivedi K., Puliafito A., Performance and reliability analysis of computer systems: an example-based approach using the SHARPE software package, Springer Science & Business Media, 24. 3GPP, Ts 138 321—v16.3.0–5g; nr; medium access control (mac) protocol specification (3gpp ts 38.321 version 16.3.0 release 16), Tech. rep., ETSI (2021). URL https://portal.etsi.org/TB/ ETSIDeliverableStatus.aspx 25. Zhang H., Liu N., Chu X., Long K., Aghvami A.-H., Leung V. C. M., Network slicing based 5g and future mobile networks: Mobility, resource management, and challenges, IEEE Communications Magazine 55 (8) (2017) 138–145. https://doi.org/10.1109/MCOM.2017.1600940 26. E. Engin, I. Ho ¨ kelek, H. A. C ¸ ırpan, Resource allocation of embb and urllc traffic using pre-emption mechanism, in: 2023 46th International Conference on Telecommunications and Signal Processing (TSP), 2023, pp. 129–133. 27. Vaezi M., Ding Z., Poor H. V., Multiple access techniques for 5G wireless networks and beyond, Springer International Publishing, 2018. PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 35 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications 28. 3GPP, 5g; nr; user equipment (ue) radio access capabilities (3gpp ts 38.306 version 17.0.0 release 17), Tech. rep., ETSI (2022). 29. I. R. S. Groups, FINAL EVALUATION REPORT FROM THE 5G INFRASTRUCTURE ASSOCIATION ON IMT-2020 PROPOSALS IMT-2020/ 14, 15, 16, PARTS OF 17, Technical report (tr), ITU, document 5D/50-E (02 2020). 30. 3GPP, 5G; NR; Physical layer procedures for data (3GPP TS 38.214 version 16.2.0 Release 16), Tech- nical Specification (TS) 38.214, 3rd Generation Partnership Project (3GPP), version 16.2.0 (07 2020). 31. 3GPP, Technical Specification Group Radio Access Network; Study on New Radio Access Technology Physical Layer Aspects (Release 14), Technical Report (TR) 38.802, 3rd Generation Partnership Proj- ect (3GPP), version 14.2.0 (09 2017). 32. 3GPP, 5G; NR; Physical channels and modulation (3GPP TS 38.211 version 16.2.0 Release 16), Tech- nical Specification (TS) 38.211, 3rd Generation Partnership Project (3GPP), version 16.2.0 (07 2020). 33. 3GPP, 5G; NR; User Equipment (UE) radio transmission and reception; Part 1: Range 1 Standalone (3GPP TS 38.101-1 version 16.4.0 Release 16), Technical Specification (TS) 38.101, 3rd Generation Partnership Project (3GPP), version 16.4.0 (07 2020). 34. 3GPP, 5G; NR; User Equipment (UE) radio transmission and reception; Part 2: Range 2 Standalone (3GPP TS 38.101-2 version 16.4.0 Release 16), Technical Specification (TS) 38.101, 3rd Generation Partnership Project (3GPP), version 16.4.0 (07 2020). 35. 5g-nr-radio-latency-models, https://github.com/msepulcre/5G-NR-Radio-Latency-Models, openly Available. Accessed: 08/23/2023 (2022). 36. Kumar, S., Gautam, V., Sharma, S. & Giluka, M. Improving Uplink Transmissions for URLLC Communi- cation in 5G NR. 2024 16th International Conference On COMmunication Systems & NETworkS (COMSNETS). pp. 1160–1163 (2024) 37. Kousaridas A., Manjunath R., Perdomo J., Zhou C., Zielinski E., Schmitz S. et al. QoS prediction for 5G connected and automated driving. IEEE Communications Magazine. 59, 58–64 (2021) https://doi.org/ 10.1109/MCOM.110.2100042 38. Perez P., Ruiz J., Benito I. & Lopez R. A parametric quality model to evaluate the performance of tele- operated driving services over 5G networks. Multimedia Tools And Applications. 81, 12287–12303 (2022) https://doi.org/10.1007/s11042-021-11251-x 39. Moses L., Sambantham P., Faheem M., Ali K S. & Khan A. Joint delay and energy aware dragonfly opti- mization-based uplink resource allocation scheme for LTE-A networks in a cross-layer environment. The Journal Of Engineering. 2024, e12353 (2024) https://doi.org/10.1049/tje2.12353 40. Sangeetha S., Logeshwaran J., Faheem M., Kannadasan R., Sundararaju S. & Vijayaraja L. Smart per- formance optimization of energy-aware scheduling model for resource sharing in 5G green communica- tion systems. The Journal Of Engineering. 2024, e12358 (2024) https://doi.org/10.1049/tje2.12358 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 36 / 36 http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png PLoS ONE Public Library of Science (PLoS) Journal

Cross-layer latency analysis for 5G NR in V2X communications

Loading next page...
 
/lp/public-library-of-science-plos-journal/cross-layer-latency-analysis-for-5g-nr-in-v2x-communications-ERRu0DplFz

References (34)

Publisher
Public Library of Science (PLoS) Journal
Copyright
Copyright: © 2025 Horta et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Data Availability: The simulation results presented in this article are generated with a custom developed simulator. Code is available on Github at https://github.com/JorgeHSa/5GNRSimulation. Funding: This research was partially supported by a grant from the Consejo Nacional de Humanidades, Ciencias y Tecnologías (CONAHCYT), awarded to Jorge Horta (CVU No. 854262). The funder had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Competing interests: The authors have declared that no competing interests exist.
eISSN
1932-6203
DOI
10.1371/journal.pone.0313772
Publisher site
See Article on Publisher Site

Abstract

a1111111111 a1111111111 The 5G network was developed to push the capabilities of wireless networks to previously a1111111111 a1111111111 unseen performance limits, e.g., transmission rates of several gigabits per second, latency a1111111111 of less than a millisecond, and millions of devices connected at the same time. To meet these requirements, it is necessary to access new spectrum (the so-called millimeter waves) and use techniques such as Massive MIMO (Multiple-Input Multiple-Output) and beamforming. This required the design of a new radio interface, known as 5G NR, that OPENACCESS includes improvements to its physical components and new protocols. The performance of the 5G network will depend heavily on the behavior of these new protocols under certain Citation: Horta J, Siller M, Villarreal-Reyes S (2025) Cross-layer latency analysis for 5G NR in configuration parameters, traffic conditions, device density, and network architecture. This V2X communications. PLoS ONE 20(1): e0313772. paper introduces an analytical model for the performance evaluation of 5G NR. The devel- https://doi.org/10.1371/journal.pone.0313772 oped model describes the behavior of the different layer 1 and 2 protocols involved in 5G Editor: Muhammad Faheem, University of Vaasa: radio communication. Using the model, it is possible to evaluate the performance of 5G NR Vaasan Yliopisto, FINLAND in terms of throughput and latency, two key performance metrics used to describe QoS Received: May 7, 2024 (Quality of Service) thresholds of different applications. The protocol layer approach gives Accepted: October 31, 2024 the model sufficient granularity to identify critical behaviors that significantly impact perfor- mance. This can help focus efforts on improving these key points or propose improvements/ Published: January 9, 2025 modifications to the operation of network protocols or devices. The use of this model for per- Copyright:© 2025 Horta et al. This is an open formance evaluation is exemplified by studying a Remote Driving scenario operated over access article distributed under the terms of the Creative Commons Attribution License, which 5G. This scenario has very stringent delay requirements, which, according to the model’s permits unrestricted use, distribution, and results, can be satisfied if the network conditions are adequate. This model and its results reproduction in any medium, provided the original can be used as a starting point for performance evaluations of application involving end-to- author and source are credited. end (E2E) communications. Data Availability Statement: The simulation results presented in this article are generated with a custom developed simulator. Code is available on Github at https://github.com/JorgeHSa/ 5GNRSimulation. Funding: This research was partially supported by 1 Introduction a grant from the Consejo Nacional de Humanidades, Ciencias y Tecnologıas The fifth-generation (5G) of mobile networks aim to provide performance that significantly (CONAHCYT), awarded to Jorge Horta (CVU No. exceeds the one offered by fourth-generation (4G) networks. For instance, provisioning of 854262). The funder had no role in study design, peak data rates of 20 Gbps, latencies of 1ms, successful transmission probabilities above data collection and analysis, decision to publish, or preparation of the manuscript. 99.999%, high density of connected devices (up to 1000000 devices/km ), and improved PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 1 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Competing interests: The authors have declared network performance (Table 1.1 in [1]), should be feasible with 5G deployments. Different that no competing interests exist. organizations used these new performance limits to define use cases to guide the development of 5G technology. For instance, IMT-2020 defines three key use cases available for 5G. These cases, shown in Fig 1, are Enhanced Mobile Bandwidth (eMBB), Massive Machine Type Com- munications (mMTC), and Ultra Reliable Low Latency Communications (URLLC). The IMT-2020 classification represents these use cases as a triangle, with each vertex repre- senting a case with different requirements. The eMBB case focuses on improving the transmis- sion rate, mMTC increasing the number of connected devices, and URLLC reducing latency. Different applications can be placed in this triangle depending on the combination of their specific requirements. Consider the mission-critical and self-driving car applications, both of which require a low delay time, thus they are located near the URLLC vertex. The Smart City application favors connecting more devices simultaneously, hence it is located close to the URLLC vertex. On the other hand, video applications, remote work, or augmented reality require higher bandwidth. To achieve these performance goals, 5G standardization bodies have defined a New Radio (NR) interface which comprises access to new spectrum, massive multi-input multi-output beamforming, network slicing, dual connectivity with 4G, and cloud and edge computing support [2]. Thus, compared to 4G, the introduction of 5G NR required the development of a new protocol stack (layers 1 and 2) to integrate and access these technol- ogies. In addition, in 5G, there is the possibility of enabling edge computing deployments, which brings the processing closer to the user and allows the most demanding performance Fig 1. IMT-2020 use case and scenarios [4]. https://doi.org/10.1371/journal.pone.0313772.g001 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 2 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications limits (such as URLLC [3]) to be met. Although protocols and deployment scenarios are designed to ensure that applications meet specific Quality of Service (QoS) metrics, varying network conditions may make this unsatisfactory. It is necessary to evaluate the network con- figuration under different conditions to foresee behavior and make adjustments to solve it. Analytical models are attractive tools for this. This paper presents an analytical model for performance evaluation of the 5G NR protocol stack. This model is developed using a layered approach to consider the individual behavior of all protocols in the stack associated with 5G NR communication. The model focuses on describing in sufficient detail the contribution each of the stack’s protocols has on perfor- mance. The developed model is used to evaluate the performance of an application deployed in 5G with demanding delay requirements: Remote Driving. The main objectives of this work are: • Identify the behavior of 5G NR layer 1 and 2 protocols. • Develop analytical models for each of these protocols. • Integrate the models into a 5G NR model that considers all the individual contributions of the protocols. • Conduct a performance evaluation for the remote driving application deployed in 5G. The rest of the paper is organized as follows: Section 2 briefly introduces the architecture of a network for Remote Driving applications supported by 5G, and the state-of-the-art works relevant to it. Section 3 presents the development of the model, with a focus on analyzing and modeling the different protocols involved in radio communication. Section 4 reports the per- formance evaluation results for a remote driving application deployed in 5G NR. Finally, Sec- tion 6 discusses the developed model and the results obtained using it and concludes the paper. 2 Background and related work Remote driving, part of teleoperation systems, allows a driver (either human or an app) to con- trol a vehicle remotely. The 5G Automotive Association (5GAA) describes teleoperated driving as a use case associated with the autonomous driving group. Specifically, teleoperated driving is a Cellular V2X (C-V2X) use case in which a remote driver takes control of a vehicle to drive it efficiently and safely from the current location to its destination [5]. Teleoperated systems are mainly made up of three elements: a robot with sensors and actuators that allow the opera- tor to assess the environment and perform actions, generally with one or more cameras; a communication element, usually a wireless network, that allows the robot and the operator to exchange sensor data and control commands; and a control station, which enables the opera- tor to view and interpret sensing and video data as well as input devices that allow the operator to send control commands [6]. Translating this to the 5G remote driving use case, it follows that: • Robot: It is a system located within the vehicle that is capable of interfacing with control components (i.e., steering wheel, brake, throttle, etc.), in addition to one or more cameras and sensors that allow it to send information about the vehicle state and its surroundings. • Communication element: The 5G network establishes a communication link between the robot and the operator. • Control station: The remote site from which the operator will control the vehicle. It is usually equipped with one or several display elements to show the operator the video and data PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 3 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 2. Architecture for a 5G-enabled centralized remote driving application. https://doi.org/10.1371/journal.pone.0313772.g002 sensed by the vehicle and input devices that will enable commands to be captured and sent (i.e., keyboard, joystick, racing wheel, etc.). The architecture for a centralized remote driving application built with the above elements is shown in Fig 2a. Centralized deployment adds delays associated with traversing the 5G core network and the Internet. These delays may compromise fulfilling the stringent requirements of the remote driving application. Thus, the 5GAA proposed deployment options based on edge computing [7]. They aim to bring computing close to the vehicles to reduce the network delay. Based on these deployments, the control station for remote driving can be located on a node in the 5G Core Network or a site adjacent to the 5G gNB (Fig 2b). This can be considered as the baseline scenario for delay evaluation, because if delay requirements are not fulfilled for this case they will not be fulfilled for deployments where the control station is located further away from the 5G gNB. The evaluation requires estimating the 5G NR link delay under PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 4 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications different network conditions and configurations. Then, based on the obtained results, it is pos- sible to decide on the location of the control station that meets the delay requirements for remote driving. Thus, to demonstrate its usefulness, the analytical model introduced in this work is used to evaluate the delay for a remote driving application deployed in a Multi-access Edge Computing (MEC) 5G NR deployment where the control station is located next to the gNB (see Fig 2b). However, it is important to note that the use of the model is not limited to remote driving applications. Several state-of-the-art articles have investigated the application of remote driving, as described below. The authors in [8] present a study of a remote driving application perfor- mance and driving experience through an LTE network. The authors develop a prototype of a system to simulate remote driving under different network delay conditions. This prototype driving task is based on video streams transmitted from the prototype vehicle to the remote driving station. LTE network delay conditions are emulated using a probability distribution obtained from field measurements. The objective is to compare the performance and the driv- ing experience for two different scenarios: random delay and constant delay. In the first case, video frames are displayed as soon as they arrive. Thus, they may experience jitter. In the sec- ond case, the video frames are delayed to match the maximum delay experienced by the net- work (358 ms). This is done to eliminate jitter and smooth out the displayed video. The results show that while network delay is the biggest challenge for remote driving, a scenario with high variability (jitter) negatively impacts driver performance. They found that the performance in a scenario with constant high delay (with no jitter) is similar to that observed in a scenario with no delay. Conversely, a variable delay scenario imposes a more significant mental and physical load, frustration, and effort on the driver. This is why it is concluded that reducing the network delay could be helpful, but achieving a stable network delay value might be a prefera- ble enhancement for remote driving. In [9], the authors design and evaluate a remote driving system supported by 4G and 5G networks. This work describes an architecture that allows the application of remote driving and implement this architecture in a field test using a Hardware-In-the-Loop (HiL) simula- tion. Both implementations are used to evaluate remote driving application delay, bandwidth, and reliability using 4G and 5G networks. The following use cases are considered: straight-line driving and slalom. Those cases are evaluated under different latency and packet loss probabil- ity conditions. For remote driving, the vehicle must transmit video and some control com- mands. This data is presented to the remote driver to make decisions and execute actions sent to the vehicle as control commands. After analyzing the results obtained, the authors con- cluded that 5G offers advantages over 4G in remote driving applications,i.e. 5G latency is half of 4G latency. Furthermore, they did not observe a strong correlation between network delay and driver performance. They conclude that remote driving applications can be feasible with current technology in a low-speed (less than 40 km/h) scenarios. In [10], the authors propose a framework for driving vehicles remotely and validate this framework through performance evaluation in a real network environment. To implement this framework, they propose an architecture in which the vehicle is connected to the remote driving station via a commercial 4G/5G network. The architecture includes a remote driving station and a vehicle capable of transmitting video and other signals. It also requires a control mechanism capable of implementing the control commands received from the driver into the vehicle. These requirements are met using an Openpilot system in the test vehicle (2019 Toyota Prius Hybrid) as a basis. The authors modified the Openpilot base system to provide the vehicle with all the functions required to be driven by a remote driver. Using this imple- mentation, two different scenarios are tested: a local and a remote scenario. In the first sce- nario, the driver and the vehicle are connected to the same wireless network, which offers the PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 5 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications best case in terms of latency. In the second scenario, driving uses the commercially available 4G/5G network. After carrying out the different tests and analyzing the results, they conclude that control commands (sent from the remote driver to the vehicle) can experience an average delay of up to 32 ms and still allow remote driving in real-time. On the other hand, the average delay for streaming video is 680 ms, which would increase the difficulty of driving the vehicle remotely. In both cases, network performance is the main cause of delay, so the authors con- clude that these results can be improved with the next generation of mobile networks. The work [11] carries out a study on the remote control of a vehicle using video streams through wireless networks. Using a vehicle model and implementing a system based on the Robot Operating System (ROS), remote driving is enabled through a WiFi network that con- nects the vehicle and the remote driver. Driving tasks are guided by video streamed by the vehicle. The tests use three video-transmission protocols: ROS multi-computer communica- tion, UDP, and TCP. Additionally, an experiment is carried out in which the vehicle is driven based on the direct observation of the driver, which eliminates video delay and allows the impact of network latency to be measured. The different video transmission protocols are eval- uated in scenarios with different vehicle speeds. From the results, the authors conclude that remote vehicle operation is feasible if a low vehicle speed is maintained. It was also identified that the UDP-based stream offers the lowest latency for high-resolution video transmission compared to ROS and TCP. Another result found is that driver performance is more affected by delay jumps; thus, achieving a “deterministic delay” with low or no jitter is more important than a low delay with jitter. Much of the work related to remote driving is oriented towards experimental evaluation of driver performance, and aims to test the feasibility of such applications with current technolo- gies. Regarding analytical modeling, looking at works addressing Vehicle-to-Everything (VX2) scenarios is necessary. For instance, [12] presents an analytical 5G NR latency model in a V2X scenario where Vehicle-to-Network-to-Vehicle (V2N2V) communication is implemented. This model evaluates latency only at the radio level. The model considers different numerolo- gies (sub-carrier spacing or SCS, slot, and symbol duration, and Cyclic Prefixes), modulation and coding schemes, use of slots or mini-slots, dynamic or semi-static scheduling, different re- transmission mechanisms, as well as unicast or broadcast/multicast transmissions under dif- ferent traffic conditions. The authors use the model to assess the impact of different configura- tions on 5G delay and identify which ones meet the stringent latency and reliability requirements of V2X. This study is based on a cooperative lane change scenario enabled by V2N2V communication. The evaluation is carried out considering the requirements estab- lished by 3GPP associated with Low Level of Automation (LLoA) and High Level of Automa- tion (HLoA) [13]. These requirements are latencies of 25ms with 90% reliability for LLoA and 6ms with 99.99% reliability. From their results, the authors conclude that, at least at the radio level, 5G can be used for V2X services in an LLoA and periodic traffic environment. This is because all the evaluated scenarios had a latency of less than 6 ms in 90% of the cases. To com- ply with HLoA requirements, HARQ retransmissions are used. It is necessary to select the appropriate parameters (i.e., SCS and mini-slot) so as not to increase the radio latency and the required bandwidth. The impact of scheduling mechanisms on performance was also investi- gated. It was identified that semi-static scheduling is adequate to transmit periodic messages, while dynamic programming is more spectrum efficient for aperiodic messages. In the latter case, they demonstrated that the required control command exchange significantly affects the delay. Finally, the authors conclude that V2N2V 5G communication is suitable for V2X appli- cations with aperiodic traffic and non-strict latency requirements if the network load is low or medium and a high SCS value is used. PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 6 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications The work [14] presents a model for V2X application delay in 5G. As an extension of [12], different 5G deployment scenarios are considered to enable V2X applications. The authors argue that the delay is affected by the configuration of the 5G network, the traffic load, and the deployment and location of the application server (AS) that hosts the V2X application. In this case, the flexibility of 5G allows different deployment scenarios where the AS can be located in a remote cloud (centralized), or it may be found somewhere in the 5G core or transport net- works and even be co-located with the gNB. Deployment scenarios for a cooperative lane change case are evaluated using the traffic and configurations introduced in [12]. Based on the evaluation results, the authors concluded that a centralized scenario (cloud AS) has difficulties meeting the strict delay and reliability requirements of V2X. It was also identified that locating the AS closer to the edge of the cell can reduce delay. Still, the configuration must be chosen carefully, and network dimensioning must be considered. Furthermore, [12] does not address the development of analytical models to calculate the delay introduced by the protocol stack in 5G NR. This paper addresses this issue and thus complements the results presented in [12]. Regarding the handling of different QoS profiles in 5G service we have some works, such as [36]. This paper proposes some Configured Grant (CG) scheduling algorithms that can be adapted to the strict requirements of URLLC. The proposed algorithms, sorted-OFDMA and Best-MatchOFDMA, RB utilization are evaluated under different conditions of packet size, numerology and allocated bandwidth. These algorithms are compared against the traditional 5G algorithm for CG, called SymOFDMA. The results presented seem to indicate that the pro- posed algorithms have a similar level of efficiency to SymOFDMA. The work [37] studies the QoS requirements for remote and automated driving in 5G. The author proposes prediction algorithms for adjust the QoS requirements to varying network conditions. These variant conditions depend on background traffic (non-driving related appli- cations) from connected vehicles in the same cell and adjacent cells. This should be reflected in the MAC layer scheduling mechanisms, where traffic can be differentiated. Using the Random Forest algorithm, predictions are generated for different conditions (number of vehicle, posi- tions and network loads) and different prediction windows. By simulation the scenario, it is concluded that the prediction algorithm performs adequately as long as the prediction window is a few seconds and degrades as the window grows. The authors of [38] propose a parametric model for evaluating the performance of teleoper- ated driving. Three application scenarios with different requirements are proposed: Driving, Parking and Supervision. An analytical model for QoE based on different KPIs for the main aspects influencing remote driving is developed. These are: Video Coding Quality, Macro- blocking and Delay. Using data sets obtained from 4G and 5G networks measured in the corri- dor between Spain and Portugal, the different KPIs are estimated for different network configurations and conditions. Based on the results obtained, the authors conclude that cur- rent networks could hardly meet the requirements of teleoperated driving. However, 5G Stand Alone deployments, dedicated channels (network slicing), and MIMO provided by new chip- sets could help meet these requirements. The scheduling and correct use of radio resources are critical to meeting the requirements of 5G applications and use cases. Therefore, the problem of scheduling and resource allocation has been addressed by different works in the state of the art. The work [39] proposes a resource allocation method aimed at jointly optimizing delay and power consumption in LTE-A net- works. This allocation uses the DELFBDO (delay and energyaware Levy flight Brownian movement-based dragonfly optimization) algorithm to define a 3-phase process to determine the best allocation of resources. Teh fist stage determine and verify the scheduling parameters. In the second stage a estimate a parameter (α) that is used to rank UE priority. The final stage designates resources based on the priority rank. This algorithm is compared with other state- PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 7 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Table 1. State of the art summary. Work Network Technique [8] LTE Prototype Model Simulation Full Stack [9] 4G, 5G Test Bed ✘ ✘ ✔ [10] 4G, 5G Test Bed ✘ ✘ ✔ [11] WiFi Test Bed ✘ ✘ ✔ [12] 5G Analytical Model ✔ ✘ ✘ [14] 5G Analyical Model ✔ ✘ ✘ [36] 5G Scheduling Algorithm ✔ ✘ ✘ [37] 5G QoS Prediction Algorithm ✔ ✘ ✘ [38] 5G Analytical Mode ✔ ✘ ✘ [39] 4G LTE-A Scheduling Algorithm ✔ ✔ ✘ [40] 5G Scheduling Algorithm ✔ ✔ ✘ https://doi.org/10.1371/journal.pone.0313772.t001 of-the-art algorithms by simulation. Although this algorithm is outperformed by other single- metric oriented approaches, the authors conclude that in a multi-metric approach the perfor- mance of the proposed algorithm is balanced while sustaining the lowest energy consumption. In [40] the Energy Aware Scheduling Algorithm (EASA) performance for a 5G Green Net- work is analyzed. The authors propose an energy-aware scheduling model that considers the characteristics of 5G Green Communications. They present an analytical model to describe the optimization problem. A simulation is conducted to evaluate the model performance. The proposed algorithm uses machine learning to allocate real-time resources based on network conditions and user demand. Simulation results show that there is a reduction in energy con- sumption while maintaining high performance. The authors conclude that using energy-aware models can contribute to a sustainable environment without affecting performance or incur- ring operational costs to the grid. Table 1 presents a summary of the state of the art reviewed. 3 5G NR cross-layer analytical modeling This paper focuses on 5G NR protocols that enable communication between the user device (UE), in this case, the vehicle, and the base station (gNB). The analysis is carried out with a pro- tocol layer approach to identify the relevant behaviors of these protocols that influence the communication performance, mainly throughput and latency. For 5G, the radio link enabling protocols are those of layers 1 and 2 of the OSI reference model. These protocols are shown in Fig 3. It should be noted that the L2 layer is divided into different sub-layers to abstract and sim- plify the behavior associated with it. The behavior of each of the protocols shown in Fig 3 is based on the 3GPP specifications used to develop the models in this work. Based on the sce- nario, the one-way delay (OWD) of the radio link can be defined as follows: radio ¼ delay þ delay þ delay þ delay þ delay ð1Þ OWD sdap pdcp rlc mac phy where delay represents the delay introduced by layer x with x2 {sdap, pdcp, rlc, mac, phy}. Similarly, the performance of the radio link can be defined as: radio ¼ minðth ; th ; th ; th ; th Þ ð2Þ Th sdap pdcp rlc mac phy with th , the protocol throughput for x2 {sdap, pdcp, rlc, mac, phy}. It is necessary to define PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 8 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 3. 5G new radio protocols. https://doi.org/10.1371/journal.pone.0313772.g003 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 9 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 4. SDAP operation. https://doi.org/10.1371/journal.pone.0313772.g004 the performance of the different protocols to evaluate the models presented in Eqs 1 and 2. The remainder of this section describes the appropriate models for each of the protocols con- sidered in radio communication. 3.1 Service Data Adaptation Protocol (SDAP) sub-layer The Service Data Adaptation Protocol is the upper sub-layer protocol in L2. The function of SDAP is to manage different levels of QoS through traffic flows associated with each level [15]. This is handled by a QoS Flow Identifier (QFI) field included in the SDAP PDU header. On the transmitter side, the SDAP protocol receives IP packets, identifies the type of traffic by checking the appropriate field, and assigns a suitable identifier for this traffic (Fig 4a). After this, the SDAP PDU is generated, which will be retransmitted to the next layer (PDCP) in a virtual channel (radio bearer) on which packets with similar QoS requirements travel. On the receiver side, SDAP receives a PDU, from which the header is removed to identify its flow through the QFI field and then forwarded to the upper layer (Fig 4b). In the present model, all the packets transmitted by the device are considered to belong to the same class. Therefore, they are all processed similarly and retransmitted to the same virtual channel. Based on this behavior, SDAP can be identified as a store-and-forward element; thus, analyz- ing it as a queuing system is possible. For UL (Up-Link) on the transmitter side, video packets are assumed to follow a Poisson process. On the other hand, in DL (Down-Link), the packets from the control station arrive quasi-periodically; therefore, their arrival process is determin- istic. In both cases, the processing performed by SDAP is considered to have an exponential distribution. Based on this, the behavior of SDAP transmitter can be defined as an M/M/1 sys- tem and a D/M/1 system for UL and DL, respectively. Based on queuing theory, the SDAP PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 10 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications performance model for the UL direction can be obtained as follows: Th ¼ minðl ; m Þ ð3Þ tx SDAP UL SDAP SDAP Delay ¼ ð4Þ tx SDAP UL m l SDAP SDAP whereλ is the rate at which video packets arrive at the SDAP layer, and μ is the rate at SDAP SDAP which SDAP services incoming packets. For the DL direction, the throughput model is: � � Th ¼ min ; m ð5Þ tx SDAP DL SDAP here, T is the period between control packets arrivals. The following equation is used to calcu- late the time that each packet spends in the SDAP layer: Delay ¼ ð6Þ tx SDAP DL m ð1 sÞ SDAP −μT(1−σ) where, σ is the solution of σ = e with the lowest absolute value. Using the Eqs 3–6, SDAP performance can be evaluated in both communication directions. The results of this evaluation are presented in section 4. 3.2 Packet Data Convergence Protocol (PDCP) sub-layer The PDCP layer provides security and integrity protection for 5G communications and per- forms header compression [16]. PDCP functions are depicted in Fig 5. According to [2], the main functionality of header compression is to match 5G voice services with legacy voice ser- vices, which have no packet header. This analysis considers only data transmission; therefore, the header compression mechanism is not considered. On the PDCP, the transmitter side receives SDUs from SDAP. Each SDU is assigned an integrity code called Message Authentication Code (MAC-I), then encrypted, and a header and trailer are added to generate the PDCP PDU (See Fig 5a. No header compression is per- formed). The reverse process is done on the receiver side: first stripping the header, then checking the integrity using the MAC, and decrypting the content before sending it to the upper layer (Fig 5b). Thus, the behavior of PDCP is a process of three sequential service phases. Based on this, PDCP is described as a M/Hypo /1 queuing system. The geometric matrix approach is used for the analysis of this system. The queuing system has associated a transition matrix with a block structure of the form: 2 3 B B 0 0 0 ��� 00 01 6 7 6 7 6 B A A 0 0 ���7 10 1 2 6 7 6 7 6 7 0 A A A 0 ��� 6 0 1 2 7 6 7 6 7 6 7 0 0 A A A ��� 0 1 2 Q ¼ 6 7 ð7Þ 6 7 6 7 6 0 0 0 A A ���7 0 1 6 7 6 7 6 7 0 0 0 0 A ��� 6 7 6 7 4 5 . . . . . . . . . . . . . . . . . . PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 11 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 5. PDCP operation. https://doi.org/10.1371/journal.pone.0313772.g005 where the component block matrices are: B ¼ ½ l� ð8Þ B ¼ ½l 0 0� ð9Þ 2 3 6 7 6 7 B ¼ 0 ð10Þ 6 7 4 5 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 12 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications 2 3 0 0 0 6 7 6 7 A ¼ 0 0 0 ð11Þ 6 7 4 5 m 0 0 2 3 ðlþ m Þ m 0 1 1 6 7 6 7 A ¼ 0 ðlþ m Þ m ð12Þ 6 7 1 2 2 4 5 0 0 ðlþ m Þ 2 3 l 0 0 6 7 6 7 A ¼ 6 0 l 07 ð13Þ 4 5 0 0 l In Eqs 8–13, the valueλ is the rate at which packets arrive at the PDCP layer and μ , μ and 1 2 μ are the service rates associated to the MAC-I calculation, ciphering and header creation pro- cess, respectively. These equations are associated with the dynamics of the block matrix Q (Eq 7), allowing to describe how it transits between its levels. The level directly corresponds to the number of packets in the queue. Specifically, level 0 denotes no packets waiting, level 1 signifies 1 packet, and so on. The matrix in the Eq 8 indicates the rate at which the level 0 is exited. Eq 10 repre- sents the rate at which the level 0 is entered. Similarly, there are matrices that describe the dynamics when i > 0 packets are in the queue. In this case, these are square matrices of order n, where n = 3 is the number of sequential phases that comprise the service process. The matrix A (Eq 11) it is the rate at which a package transits from level i to level i − 1, which occurs when a package exits the 3rd phase of service (at a mu rate). Matrix A (Eq 12) contains the 3 1 rates of transitions between the different phases of service. Finally, matrix A is the rate at which level i transitions to level i + 1, which occurs atλ. Since this transition can occur during any phase of service, A matrix is constructed to represent this. MAC-I computation and encryption processing rates are associated with the data size. Therefore, these service rates must be estimated for the data sizes of interest in the present analysis. The M/Hypo /1 queue transition matrix (Eq 7) has a steady state vector π that satisfies: πQ ¼ 0 ð14Þ where the vector π has the form π = [π π π . . .]. Here, the element π = [π π π ] is a vec- 0 1 2 i i,1 i,2 i,3 tor associated with the probability that the queue has i packets in the queue and the current packet in service is in the j2 [1, 2, 3] phase of service. The elements of π are geometrically related by a matrix R such as: i 1 ð15Þ π ¼ π R i 1 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 13 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications The state of the queue is completely described by the π and π vectors and the R solution 0 1 matrix. The work [17] describes the R matrix in a closed form as: 2 3 lðlþ m Þðlþ m Þ lðlþ m Þ l 2 3 3 6 7 m m m m m m 1 2 3 2 3 3 6 7 6 7 6 7 6 7 l ðlþ m þ m Þ lðlþ m Þ l 2 3 3 6 7 R ¼ ð16Þ 6 7 m m m m m m 1 2 3 2 3 3 6 7 6 7 6 7 2 2 4 5 l ðlþ m Þ l l m m m m m m 1 2 3 2 3 3 The vectors π and π are those that satisfy the normalization condition: 0 1 ð17Þ π þπ ðI RÞ e ¼ 1 0 1 with I a 3x3 identity matrix and e = [1, 1, 1] . Once the vectors π , π , and the matrix R are 0 1 known, the statistics of the queue can be evaluated. The queue throughput is obtained as fol- lows: � � m m m 1 2 3 PDCP ¼ min l; ð18Þ Th m m þ m m þ m m 2 3 1 3 1 2 In addition, the delay is defined as: jπ ðI RÞ j 1 1 ð19Þ PDCP ¼ Delay where |x| is the 1-norm of vector x. The model presented above considers that all packets arriving at the PDCP layer have the same size. This is the case for transmitting driver control messages (DL directions). However, video streaming has two different packet sizes (one for 1280x720 and the other for 640x480 video). Thus, once the video packets arrive at the PDCP, the processing time of each of these packets must be differentiated. This leads to slightly modi- fying the approach adopted for the PDCP model. In this case, the service is no longer hypoex- ponential but follows a sequence of phases of service, as shown in Fig 6. where a is the probability that the arriving packet has high-resolution video, μ and μ are the ciphering 1,1 2,1 and integrity protection rates for high-resolution video packets. While μ and μ are those 1,2 2,2 rates for standard-resolution video packets. Based on this behavior, it can be identified that the service process is phase type (PH). These distributions have an associated rate matrix that guides the transition dynamics between the different phases. Using this matrix, the service pro- cess can be characterized, and the performance of the queuing system can be analyzed. For this, a geometric matrix approach is used, similar to that used to analyze the M/Hypo /1 system presented above. However, unlike this one, there is no explicit solution to find the R matrix associated with the system. Based on the Eq 14 it is identified that: π B þπ B ¼ 0 0 00 1 10 π B þπ A þπ A ¼ 0 ð20Þ 0 01 1 1 2 0 π A þπ A þπ A ¼ 0; i ¼ 2; 3; 4; ::: i 1 2 i 1 iþ1 0 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 14 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 6. PDCP operation for two packet sizes. https://doi.org/10.1371/journal.pone.0313772.g006 where: B ¼ ½ l� ð21Þ B ¼ ½ð1 aÞl al 0 0 0� ð22Þ 2 3 6 7 6 7 6 7 6 7 6 7 6 7 B ¼ 0 ð23Þ 6 7 6 7 6 7 6 7 4 5 2 3 0 0 0 0 0 6 7 6 7 0 0 0 0 0 6 7 6 7 6 7 6 7 A ¼ 0 0 0 0 0 ð24Þ 6 7 6 7 6 7 6 7 0 0 0 0 0 4 5 ð1 aÞm am 0 0 0 3 3 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 15 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications 2 3 ðm þ lÞ 0 m 0 0 1;1 1;1 6 7 6 7 0 ðm þ lÞ 0 m 0 6 7 1;2 1;2 6 7 6 7 6 7 A ¼ 0 0 ðm þ lÞ 0 m ð25Þ 1 2;1 2;1 6 7 6 7 6 7 6 7 0 0 0 ðm þ lÞ m 2;2 2;2 4 5 0 0 0 0 ðm þ lÞ Note that states i = 2, 3, 4, . . .. in Eq 20 have the same structure. It is this structure that allows the use of an algorithmic approach. Substituting 15 in 20 yields: i 2 i 1 i ðπ R ÞA þðπ R ÞA þðπ RÞA ¼ 0 ð26Þ 1 2 1 1 1 0 Manipulating Eq 26: i 2 2 π R ðA þ RA þ R A Þ ¼ 0 ð27Þ 1 2 1 0 Thus, the R matrix is the solution of the quadratic matrix equation A + RA + R A = 0. To 2 1 0 obtain R, it follows that: A þ RA þ R A ¼ 0 2 1 0 RA ¼ A R A ð28Þ 1 2 0 1 2 1 R ¼ A A R A A 2 1 0 1 Eq 28 is the base of the algorithm. This is: 1. Initialize R ¼ A A 0 2 1 1 2 1 2. Calculate R ¼ A A R A A , for i = 1, 2, 3, . . . i 2 0 1 i 1 1 3. Repeat step 2 until the value R converges, i.e. the difference between R and R is below a i−1 i threshold. Note that the delay equation (Eq 19) is still valid. However, the throughput model requires slight modification: � � PDCP ¼ min l; ð29Þ Th PDCP st where PDCP is the mean service time of the PDCP layer. This service time is derived from the st PH distribution that describes it. For the presented model it is given by: m � m � m � m � m 1;1 1;2 2;1 2;2 3 ð30Þ aðm m Þm m m þð1 aÞðm m Þm m m þ m m m m 1;2 2;2 1;1 2;1 3 1;1 2;1 1;2 2;2 3 1;1 2;1 1;2 2;2 This completes the description of the PDCP model. To evaluate the model, it is necessary to describe the parameters it depends on.λ is given by the packet rates associated with each com- munication scenario. As stated above, the encryption and integrity protection processes depend on the size of the packet. According to [18], 5G has three algorithm alternatives to per- form integrity protection and encryption. The available algorithms are presented in Table 2: The present study considers the alternative based on AES (i.e., 128-NIA2 and 128-NEA2). The reason for this choice is twofold: it is a non-proprietary option and well documented in PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 16 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Table 2. Algorithms used for integrity protection and ciphering. Algorithms Integrity Ciphering Based on 128-NIA1 128-NEA1 SNOW3G 128-NIA2 128-NEA2 AES 128-NIA3 128-NEA3 ZUC https://doi.org/10.1371/journal.pone.0313772.t002 Table 3. Average ciphering and integrity protection times for the different packet sizes. 200 B 467 B 520 B Ciphering 4.2107E-06 s 4.1865E-06 s ñ4.3196E-06 s Integrity 8.7660E-6 s 8.9776E-06 s 9.2588E-06 s https://doi.org/10.1371/journal.pone.0313772.t003 the literature. Using a technique like the one presented in [19], the AES algorithms for encryp- tion and integrity protection are implemented in Python and tested to obtain a service time estimate. Testing was performed on a Windows 11 Pro computer with an AMD Ryzen 7 5700G processor with Radeon Graphics @ 3.80 GHz and 32 GB of RAM. Encryption and integrity protection experiments were replicated 100,000 times for each packet size. For UL, these are 467 Bytes and 521 Bytes for packets transmitting 640x480 and 1280x720 video, respectively. For the DL case, considering that there are 50 objects in the vehicle [5] and that 32-bit commands are sent to each of them, the control packets are 200 bytes. This value is within the margins considered in [5, 20] for remote driving applications. The average encryp- tion and integrity protections times presented in Table 3 are obtained from these experiments. Using the average times presented in Table 3, processing rates for encryption (μ ) and integrity protection (μ ) are estimated. Based on these values, the evaluation presented in Sec- tion 4 is carried out. 3.3 Radio Link Control (RLC) sub-layer The RLC sublayer’s primary function is transmitting information in one of the three modes of operation available to it [21]. Those modes are Transparent Mode (TM), Unacknowledged Mode (UM), and Acknowledged Mode (AM). The two first operation modes are oriented to Control Plane message transmission. The last one is used for User Plane messages. The RLC AM operation is depicted in Fig 7. On the transmitter side, the RLC sublayer receives SDUs from the PDCP layer. Each SDU is assigned a header and then forwarded using an Automatic Repeat Request (ARQ) re-trans- mission mechanism (Fig 7a). RLC considers possible packet fragmentation if a large amount of data is received that cannot be transmitted in a single PDU. For the present study, it is assumed that fragmentation is not necessary. On the receiver side, the packets are received, and if no error occurs, the header is stripped, assembled in case of fragmentation, and sent to the next layer (Fig 7b). Due to its behavior, it is challenging to abstract RLC AM as a queuing system. Due to its behavior, it can be challenging to outline RLC AM as a queuing system. Hence, we looked for a different formalism to describe the AM RLC model. Inspired by [22], we model RLC AM as a Stochastic Reward Net (SRN). A SRN is a variant of stochastic Petri nets that allows the evaluation of different performance metrics by assigning reward functions. The SRN used to model RLC AM is presented in Fig 8. PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 17 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 7. RLC AM operation. https://doi.org/10.1371/journal.pone.0313772.g007 Regarding the SRN, the packets are generated with the activation of the Traffic timed transi- tion and are stored in the place of the Buffer. Once here, a header is added to them at a rate given by T and is stored in the P location. They are then transmitted (through the header header immediate transition t1) to the SR site if there is available room in the transmission win- window dow. This is where the ARQ mechanism begins. Packets are correctly transmitted with a rate given by the T transition. Erroneous transmissions occur at a rate defined by T . Each ACK NACK time this transition fires, a copy of the message is placed in the Retrans place. Once all buffer packets in SR have been attempted to be transmitted, packets in Retrans are trans- window buffer ferred back to SR for re-transmission through transition t2. This occurs if the maximum window number of re-transmissions allowed for each packet has yet to be reached. The MAXRetrans buf- place controls the number of re-transmissions. Each time a packet is placed in SR for fer windows re-transmission (t2 firing), its re-transmission counter in MAXRetrans is incremented. If buffer the packet is successfully transmitted before the maximum number of re-transmissions, the t3 transition resets the MAXRetrans counter. If a packet’s maximum number of re-transmis- buffer sions is reached, the packet is removed from the SR place, and the MAXRetrans window buffer counter is reset. These two actions are performed by firing the T transition. RLC AM per- discard formance analysis is performed using specialized tools for Petri nets. The SHARPE [23] tool is used for the present work. With the Sharpe tool, the relevant performance metrics for the model can be estimated. SHARPE analyzes the Markov chains associated with the Petri net to PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 18 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 8. RLC Stochastic Reward Net. https://doi.org/10.1371/journal.pone.0313772.g008 calculate the performance metrics. In this chain, the states are made up of the Petri net mark- ings. The transitions between these states are associated with the firing of the timed transitions. By analyzing the matrix associated with the Markov chain, the transient and stationary behav- ior of the chain can be identified. Performance metrics are derived from the steady state, for example, the average number of tokens at each site or the average rate at which each transition is triggered. Using this tool the throughput of the SRN RLC AM model can found to be: RLC ¼ t ð31Þ Th T ACK where τ is the mean firing rate of transition X. For obtaining the RLC delay, Little’s rule is used at each SRN place. Thus, the RLC delay is: #ðRetrans Þ #ðBufferÞ #ðSR Þ 1 Buffer window RLC ¼ þ þ þ ð32Þ Delay t Z t m Traffic T T TACK header NACK here, #(P) is the mean number of tokens (packets) in place P, and μ is the rate at which the TACK TACK transition fires when there are packets in the SR site. Using the Eqs 31 and 32, and window the Sharpe tool, it is possible to evaluate the performance of RLC AM. The results of this evalu- ation are presented in the following section. PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 19 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications 3.4 Medium Access Control (MAC) sub-layer The next sub-layer to analyze is the MAC layer. The primary services the MAC sublayer pro- vides are data transfer and radio resource allocation [24]. On the transmitter side, the data transfer is performed by generating MAC PDUs by assigning headers and appropriately for- matting the data before sending it to the physical (PHY) layer. On the receiver side, MAC receives the data from the PHY layer and tries to retrieve the data from the packet, and if this process is successful, it is transferred to the next layer. The MAC layer implements mecha- nisms for reliable transmissions. These include HARQ re-transmission or K-Repetitions mechanisms. In the first, feedback messages are used to control the re-transmission of packets that were erroneously received by the receiver. The package and the K − 1 copies are transmit- ted simultaneously in the second one. This increases the probability that the receiver can decode the data from one of the K copies sent. Concerning radio resource allocation, the scheduling mechanisms available in 5G fall into two main categories: dynamic scheduling and semi-static scheduling. In dynamic scheduling, requesting a resource each time a packet is transmitted is necessary, which results in delay and overhead due to the exchange of control messages. For semi-static scheduling, the resources that devices can use for transmitting are pre-allocated. This reduces latency and overhead at the cost of contending for resources. Either way, how the radio resources are structured influences the behavior of the scheduling mecha- nisms. For the present paper, the issue of scheduling is considered to be solved by using a semi-static mechanism. This means that every time there is a transmission, the device has already determined the resources that will be used to transmit. Re-transmission mechanisms (if applicable) and scheduling affect MAC behavior and per- formance. For this research, it is considered that there are no re-transmissions. This is because the messages exchanged (detected video/data and control commands) depend on the context of the vehicle, which changes very quickly. Because of this, messages are short-lived; therefore, it is not worth using resources to re-transmit a message. Also, remote driving packets are sup- posed to have priority; therefore, resources are pre-allocated to support them. Also, the resources are considered always available to transmit remote drive packets. In other words, the packet will be sent at the next available transmission opportunity; see Fig 9. This priority assumption can be supported by mechanisms developed for 5G, such as net- work slicing or preemption techniques. Network slicing generates virtual networks where resources are defined for the different services (for example, eMBB, URLLC, and mMTC). be assigned to each segment to meet the QoS requirements of each service [25]. Regarding the pre-emption methods, puncture techniques are worth mentioning. For instance, the work [26] introduces a resource allocation mechanism in which the resources allocated to eMBB traffic can be punctured (removed) and replaced with traffic data with more stringent requirements, URLLC. Using any of these techniques can guarantee resources to transmit remote drive packets. Based on these assumptions, MAC behavior is described as store-and-forward; where pack- ets arrive, a header is generated for each of them and forwarded at the appropriate time. The MAC headers are created at a rate μ . The time between when the packet is ready for trans- MAC mission and when it is transmitted is called frame τ , whose value is in the range [0, TTI]. TTI fra stands for Transmission Time Interval, the time resources are allocated in 5G. Based on this, the MAC layer performance model is described as follows: MAC ¼ minðl ; m Þ ð33Þ Th MAC MAC here,λ is the rate at which the packets arrive at the MAC layer. The mean MAC delay is MAC PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 20 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 9. Transmission of the packet in the next transmission opportunity. https://doi.org/10.1371/journal.pone.0313772.g009 estimated using the following equation: 1 TTI MAC ¼ þ ð34Þ Delay m l 2 MAC MAC The first component of Eq 34 refers to the delay of the header creation process, and the sec- ond to the average frame alignment time. Specifically, this work considers the K-Repetitions technique. This technique sends K copies of the data in a single “shot”. The receiver can use these K copies to try to recover the data. K-Repetitions is generally associated with Grant-Free mechanisms. In this case, it is necessary to consider not only delay but the other component of URLLC, reliability. To meet URLLC requirements for V2X scenarios, i.e., 3-10 ms with reliability of 0.99995, it is necessary to con- sider the different probabilities that correct data detection will not occur. As presented in ref, to describe the performance of Grant-Free K-Repeats, it is necessary to define the probability that the transmission is detected and the probability that each K-Repetition is correctly received. In [27, Chapter 16], a Grant-Free reliability model with K = 2 repetitions is presented. Using a similar analysis, a model for a K-Repetitions scheme can be defined as: !! � � K 1 i X Y k i k i rel ¼ 1 p þ ð p Þð1 p Þ p ð35Þ K miss HARQj miss miss i¼0 j¼1 where p is the probability that the transmission pilot is undetected, p is the probabil- miss HARQX ity that the data cannot be recovered by combining the redundancy of X packets, and p (p ) is the probability that any of the single K repetitions will be received incorrectly. e HARQ1 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 21 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Using Eq 35 the reliability for a K = 4 repetitions is: rel ¼ p p p p ð1 p Þ K¼4 HARQ2 HARQ3 HARQ4 e miss þ4p p p p ð1 p Þ HARQ2 HARQ3 e miss miss ð36Þ þ6p p p ð1 p Þ HARQ2 e miss miss þ4p p ð1 p Þ e miss miss þp miss In this case, the packet delay depends on which data packet is received correctly. To esti- mate this delay, the following equation is proposed: � � ðrel rel Þ K¼i K¼ði 1Þ Delay ¼ � i� TI ð37Þ K¼4 rel K¼4 i¼1 where (rel − rel ) represents the probability that the packet was successfully received K = i K = (i−1) at the i−th attempt, and TI refers to the packet transmission interval. In addition to the K- repeat delay (Eq 37, the MAC packet header generation time must be considered. Thus, the MAC layer delay operating with Grant-Free K-Repeats is defined as: MAC ¼ þ T þ Delay ð38Þ Delay GF align K¼4 m l MAC MAc where the first component refers to the queue delay, the second indicates the mean alignment time a packet waits before its transmission. This time is calculated assuming the packet will be transmitted in the RB following its creation. This packet creation can occur at any instant; therefore, the alignment time is uniformly distributed over the interval [0, T ]. Finally, the symbol K-Repetition delay is the third component of Eq 38. The Throughput of the MAC operating the K-Repetitions scheme can be derived based on the T interval; in this case, this is: shot � � MAC ¼ min l ; ð39Þ Th GF URLLC shot where,λ is the URLLC packets arrival rate. The value of 1/T represents the maximum URLLC shot number of K-repetition shots that can be transmitted. This time is defined as: T ¼ K � TI ð40Þ shot Using the MAC model Eqs (33) and (34), the performance of the MAC layer is evaluated, and the results are presented in Section 4. Similarly, using the Eqs 37 and 39, the performance of the K-Repetitions mechanism for URLLC is evaluated. 3.5 Physical (PHY) layer The PHY layer is where the packets, converted into signals, travel through the channel from the sender to the receiver. The performance of the PHY layer depends mainly on the chosen parameters (for example, bandwidth, coding and modulation order, etc.) and the channel con- ditions. The present study considers that the network operates in good channel conditions (best-case scenario). Based on this, the maximum PHY throughput model described by 3GPP PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 22 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications in [28] is used. This model is: ðjÞ BW N � 12 ðjÞ ðjÞ PRB ðjÞ PHY ¼ v � Q � R �ð1 OH Þ bps ð41Þ Th layer m max j¼1 where: • J is the number of aggregated component carriers in a band or combination. It has a value of 16 for 5G NR UL and DL in [29]. • R is 948/1024, the maximum number of Low-Density Parity Check (LDPC) obtained max from [30]. • For the j − th Component Carrier (CC): ðiÞ • v is the maximum number of supported layers given by the higher layer parameter Layers maxNumberMIMO-LayersPDSCH for downlink and a maximum of higher layer parame- ters maxNumberMIMO-LayersCB-PUSCH and maxNumberMIMO-LayersNonCB- PUSCH for uplink. Options for this variable values for UL and DL are specified in [29, 31]. ðjÞ • Q is the maximum supported modulation order given by the higher layer parameter sup- portedModulationOrderDL for downlink and the higher layer parameter supportedModu- lationOrderUL for uplink. Values for QPSK, 16QAM, 64QAM, and 256QAM for UL and DL can be obtained in [32]. (j) • f is the scaling factor given by the higher layer parameter scalingFactor and can take the values 1, 0.8, 0.75, and 0.4. • μ is the numerology [32]. • T is the average OFDM symbol duration in a subframe for numerology μ. Assuming a m 10 normal cyclic prefix the value is T ¼ s 14:2 ðjÞ BW m (j) • N is the maximum RB allocation in the bandwidth BW with numerology μ as PRB (j) defined in [33, 34]. BW is the UE maximum supported bandwidth in a specific band or band combination. (j) • OH is overhead and can take one of the following values: 1. 0.14 for DL in frequency range FR1 2. 0.18 for DL in frequency range FR2 3. 0.08 for UL in frequency range FR1 4. 0.10 for UL in frequency range FR2 The maximum throughput limit for a given set of parameters is established using the model presented in Eq 41. In a real scenario, the actual throughput is expected to be less than or equal to this value. Regarding the delay, considering different components, such as propagation time, transmission time, and other processing times, is necessary. The model describes the delay of the PHY layer: PHY ¼ t þ t þ t þ t ð42Þ Delay proc tx prop proc tx rx where t and t are the processing time at the transmitter and receiver side, respectively; proc proc tx rx τ is the transmission delay, and τ is the propagation time. The transmission delay is tx prop PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 23 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications related to the radio resources required to transmit the data and is associated with the configu- ration parameters. The propagation delay depends on the distance between the transmitter and the receiver; thus, it is limited by the size of the 5G cell. Finally, it is necessary to describe the processing times (t and t ). Following [12], these values are given by tau ¼ proc proc proc tx rx tx T =2 and t ¼ T =2. Here, T is the UE Physical Downlink Shared Channel proc,1 proc;2 prox proc;1 rx (PDSCH) processing procedure time, and T is the Physical Uplink Shared Channel proc,2 (PUSCH) preparation procedure time. Both depend on the device’s processing capabilities and are defined in [30]. The performance of the PHY layer can now be evaluated using Eqs 41 and 42. The following section evaluates all the models developed in this section, considering a V2X scenario for the remote driving application. 4 Model results The present section uses the models presented in section 3 to evaluate the performance of 5G radio communication for a remote driving usage scenario. First, the remote driving scenario is described. Then, the configuration parameters for 5G NR are described. Finally, the perfor- mance evaluation results of the different 5G NR protocols operating with the defined parame- ters are presented. 4.1 Evaluation scenario The deployment scenario is shown in Fig 2b. This scenario presents a deployment in MEC. Therefore, communication occurs only on the 5G radio network and is mainly supported by 5G NR protocols. As mentioned above, the remote driving application requires vehicle status data, mainly video, to be transmitted to the remote driver. At the same time, the driver is required to send control commands. These transmissions are identified as Uplink when their origin is the vehi- cle and Downlink when the remote driver generates them; therefore, its source is the gNB for the radio link. In the case of UL, the traffic depends on the resolution, encoding, and other parameters associated with the video. This transmission requires higher bandwidth and is one of the critical points for the definition of remote driving applications. For the proposed sce- nario, it is considered that the vehicle has 4 cameras that transmit the vision of the vehicle’s surroundings. This is depicted in Fig 10. While some references mention that are needed between 25 and 32 Mbps to stream video from the vehicle’s four cameras,e.g., [5] states that 8 Mbps is required to stream a high-resolu- tion video stream, other works present real measurements where this requirement is less demanding. For example, in [10], the authors report that 22kBps (176kbps) and 67kBps (536kbps) are required to stream videos in 640x480 and 1280x720 resolution, respectively. According to their measurements, the videos are transmitted at a mean rate of 47.3 and 129.1 packets/s. The present study considers this last scenario for the video transmission evaluation. Considering that the cameras are independent, the total traffic transmitted in UL is the sum of the traffic of each camera. Thus, the UL traffic is defined as: l ¼ l þ l þ l þ l UL front rear left right ð43Þ ¼ 129:1þ 47:3þ 47:3þ 47:3 ¼ 271packets=s where,λ is the UL traffic rate andλ ,λ ,λ andλ are the traffic rates associated with UL front rear left right the front, rear, left and right cameras, respectively. For DL transmission, it is considered that the control commands originated by the driver are transmitted periodically. This is done to PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 24 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 10. Remote driving study scenario. https://doi.org/10.1371/journal.pone.0313772.g010 ensure that only a few orders during the transmission period of the lost packet are affected in case of packet loss. Typically, these transmissions are defined to occur several times per second; for example, 5GAA [5] states that 50 transmissions per second (20ms), and [20] mentions that they occur every 10ms (100 times per second). The model evaluation considers both scenarios, referred to as DL and DL . A B The 5G network configuration parameters are based on those presented in [12], oriented to 5G V2X scenarios. These are summarized in Table 4: Here, BW is the bandwidth used for the 5G network. CP is the employed cyclic prefix; its value is 14 meaning a normal prefix. Slot is the size of the TTI given in OFDM symbols. NRB Table 4. 5G NR configuration parameters. Parameters BW 20 MHz CP Normal Cyclic Prefix (NCP) Slot 14 OFDM Symbols (full-slot) NRB 51 RB Q (Modulation) 8 R (Coding Rate) 0.8643 μ 1 (Numerology) SCS 15�2 kHz = 30kHz v 2 MIMO-Layers https://doi.org/10.1371/journal.pone.0313772.t004 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 25 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications are the Resource Blocks (RB) available for the given bandwidth and specific numerology; it is provided by [33]. The numerology μ with μ2 {0, 1, 2, 3, 4} defines the sub-carrier spacing (SCS). Finally, v determines the maximum MIMO (Multiple-Input, Multiple-Output) layers. For this analysis, we consider a maximum of two MIMO layers. 4.2 SDAP model evaluation The SDAP performance in the UL direction on the transmitter side is calculated using Eqs 3 and 4. These performance values for the interest traffic rate (271packets/s) are: Th ¼ 271packets=s SDAP UL Delay ¼ 2:000e 8s SDAP UL For the DL direction performance equations, 5 and 6 are employed. In this scenario, the rel- evant traffic rates are DL = 50packets/s[5] and DL = 100packets/s[20]. The performance val- A B ues for these relevant rates are Th ¼ 50packets=s SDAP DL Delay ¼ 2:000e 8s SDAP DL for the former rate, and, Th ¼ 100packets=s SDAP DL Delay ¼ 2:000e 8s SDAP DL for the latter. 4.3 PDCP model evaluation The PDCP performance obtained using the models described in section 3.2 are presented below. As PDCP performance is affected by the size of the transmitted packet, it is necessary to perform a specific evaluation for each of these packet sizes. In this case, the UL traffic rate of 271packets/s is composed of 129.1packets/s containing HD video and 141.9packets/s with SD video. Based on this, 47.64% of the arriving packets contain HD, and 52.36% contains SD video. Using these values, the following performance results are obtained: Th ¼ 271packets=s PDCP UL Delay ¼ 3:3582e 5 PDCP UL On the other hand, the performance metrics related to the DL relevant rates are Th ¼ 50packets=s PDCP DL Delay ¼ 3:2945e 5 PDCP DL PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 26 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications for the DL rate, and they are Th ¼ 100packets=s PDCP DL Delay ¼ 3:2945e 5: PDCP DL for the DL rate. 4.4 RLC model evaluation The performance of the RLC layer is evaluated using the model presented in section 3.3. As mentioned above, the RLC model is evaluated using the SHARPE tool. The model is config- ured using the parameters in Tables 5–7: Where p is the packet success transmission, windows_size is the size of the ARQ mechanism and max_ret is the maximum number of repetitions allowed for each packet Using it, the SRN associated with RLC (Fig 8) is defined, and the rewards associated with the throughput and latency metrics are evaluated. The results of this evaluation are presented below. First, results associated with UL streams containing video are displayed. The results associated with this stream are Th ¼ 271packets=s RLC UL Delay ¼ 4:0309e 8s RLC UL Table 5. Timed transition configuration parameters. Transition Value Traffic PDCP Th −1 T 0.02 packets/ms header T p/0.01packet/ms ACK T (1 − p)/0.01packets/ms NACK https://doi.org/10.1371/journal.pone.0313772.t005 Table 6. Parameters for activating immediate transitions. Transition Activation Condition t1 #(SR indow) + #(Retrans uffer)) < window_size W B t2 #(SR indow) == 0 T #(MaxRetrans )<max_ret Discard Buffer t #(MaxRetrans )<max_ret)&(#(SR indow) == 0) 3 Buffer W &(#(Retrans ) == 0 Buffer https://doi.org/10.1371/journal.pone.0313772.t006 Table 7. Constant parameters. Parameter Value p 0.97 window_size 10 max_ret 20 https://doi.org/10.1371/journal.pone.0313772.t007 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 27 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications The DL directions performance metrics are Th ¼ 50packets=s RLC DL Delay ¼ 1:0e 8s RLC DL and, Th ¼ 100packets=s RLC DL Delay ¼ 1:0e 8s RLC DL for the DL rate and DL rate, respectively. A B 4.5 MAC model evaluation The next sub-layer to analyze is the MAC. In this case, the results presented are based on the model developed in Section 3.4. The MAC layer behavior depends on the data size, which determines the resources necessary for the transmission. The resources needed to transmit each packet type are determined using Table 4 parameters. Some codes developed in [12] are used for the needed resource calculation. The authors made these codes available in [35]. Table 8 presents the results for each packet type. These results include the Transport Block Size (TBS), i.e., the number of bits to be transmitted and the RB required. Based on the results presented in Table 8, the performance analysis of the MAC layer is per- formed. It highlights the fact that the assumed network conditions are resulting in the amount of resources needed being low. Furthermore, this supports the assumption that the package will be broadcast at the next available transmission opportunity. The results obtained from the performance evaluation of the MAC layer for the UL direction are Th ¼ 271packets=s MAC UL Delay ¼ 2:5002e 8s MAC UL For the DL direction, the control packets are sent using URLLC. Based on the Configura- tion Parameters shown in Table 4, these packets can be transmitted using a single RB. The RB duration is defined as T . This time is defined as: symbol ð44Þ T ¼ symbol m 14� 2 Using the definition of T to calculate the value of TI defined in Eq 39 for a shot of 4rep- symbol −1 μ etitions is TI = 4� T = 40 /14� 2 . The rest of the parameters described in the equation symbol are defined in Table 9. Referring to Table 9, the value of p refers to the probability that a packet is received with an error. It is derived from the Block Error Rate (BLER). The values of p , X2 {2, 3, 4}, refer HARQX Table 8. Resource required for the packet transmissions. Packet Content TBS RBs Video (640x480) 4224 bits 2 RB Video (1280x720) 6272 bits 3 RB Control Commands 2088 bits 1 RB https://doi.org/10.1371/journal.pone.0313772.t008 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 28 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Table 9. Values for the error probabilities parameters in Eq 35. Parameter Value p < = 0.006 miss p 0.1 p 0.03 HARQ2 p 0.04 HARQ3 p 0.05 HARQ4 https://doi.org/10.1371/journal.pone.0313772.t009 to the probability that a packet cannot be retrieved using the redundancy mechanism with X packages. Finally, the value of p <= 0.006 is chosen to ensure that the reliability is as miss required by URLLC. These pilots can be transmitted over the control channels, making the transmission more reliable. Now that these parameters have been set, it is possible to use Eqs 37 and 39 to obtain the performance of the MAC layer operating with URLLC. In particular, the MAC downlink performance for dataflows DL and DL can be calculated as: A B Th ¼ 50packets=s MAC DL Delay ¼ 2:8765e 5s MAC DL Th ¼ 100packets=s MAC DL Delay ¼ 2:8765e 5s MAC DL 4.6 PHY model evaluation Finally, the performance of the PHY layer is analyzed. The evaluation is based on the models presented in 2.5. PHY performance depends on the amount of data to be transmitted. There- fore, for UL, two different pack sizes are contemplated: 466 Bytes for 640x480 video and 520 Bytes for 1280x720 video. The TBS presented in Table 8 are calculated based on these sizes. As stated in section 3.2, the probability that a high-resolution video packet arrives is a. Thus, the τ component in 42, which refers to the average transmission delay, is calculated by consider- tx ing the packet size and its associated probability as follows: TBS TBS 1280x720 640x480 t ¼ a� þð1 aÞ� ð45Þ tx PHY PHY Th Th The evaluation results for the UL direction are Th ¼ 271packets=s PHY UL Delay ¼ 2:0360e 4s PHY UL On the other hand, DL transmission considers a single control command packet size. Therefore, its transmission delay is τ = TBS /PHY . The evaluation performance results tx CC Th PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 29 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Table 10. Performance evaluation results for UL video transmission. UL Video Transmission Protocol Th (packets/s) Delay (s) SDAP 271 (Eq 3) 2e-8 (Eq 4) PDCP 271 (Eq 29) 3.3582e-5 (Eq 19) RLC 271 (Eq 31) 4.0309e-08 (Eq 32) MAC 271 (Eq 33) 2.5002e-4 (Eq 34) PHY 271 (Eq 41) 2.0360e-4 (Eq 42) Cross-Layer 271 (Eq 2) 4.8727e-04 (Eq 1) https://doi.org/10.1371/journal.pone.0313772.t010 are Th ¼ 50packets=s PHY DL Delay ¼ 1:900e 4s PHY DL and Th ¼ 100packets=s PHY DL Delay ¼ 1:900e 4s PHY DL 4.7 Overall 5G NR performance for remote driving Tables 10–12 summarize the network performance results for the three transmission flows of 5G NR, which are relevant for the Remote Driving scenario. The overall cross-layer delay per- formance can be calculated by using Eq 1 as: radio ¼ 4:8727e 04s for UL Video Transmission OWD radio ¼ 2:5181e 04s for DL OWD A radio ¼ 2:5185e 04s for DL OWD B Considering that the performance requirements defined by the 5GAA [5] for Remote Driv- ing establishes a maximum latency of 100 ms on UL and 20 ms on DL, it can be concluded Table 11. Performance evaluation results for DL control packets transmission. DL ControlPacketTransmission Protocol Th (packets/s) Delay (s) SDAP 50 (Eq 3) 2.0000e-08 (Eq 6) PDCP 50 (Eq 29) 3.2945e-05 (Eq 19) RLC 50 (Eq 31) 1.0000e-08 (Eq 32) MAC 50 (Eq 33) 2.8762e-05 (Eq 34) PHY 50 (Eq 41) 1.900e-04 (Eq 42) Cross-Layer 50 (Eq 2) 2.5181e-04 (Eq 1) https://doi.org/10.1371/journal.pone.0313772.t011 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 30 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Table 12. Performance evaluation results for DL control packets transmission. DL ControlPacketTransmission Protocol Th (packets/s) Delay (s) SDAP 100 (Eq 3) 2.0000e-08 (Eq 6) PDCP 100 (Eq 29) 3.2945e-05 (Eq 19) RLC 100 (Eq 31) 1.0000e-08 (Eq 32) MAC 100 (Eq 33) 2.8762e-05 (Eq 34) PHY 100 (Eq 41) 1.900e-04 (Eq 42) Cross-Layer 100 (Eq 2) 2.5185e-04 (Eq 1) https://doi.org/10.1371/journal.pone.0313772.t012 that transmission over 5G NR introduces a very small latency over the data flow. Thus, the control station can be located further away from the gNB, as long as the latency is kept below the margins mentioned before. Therefore, our model can be used a starting point when analyz- ing if network architectures where the data flows across 5G NR, 5G transport network (TN), 5G core network (CN), and the Internet are feasible to deploy (e.g. see Fig 2a). 5 Simulation results This section validates the results of the analytical model presented above. For this validation, a comparison with simulation results was used. The simulation uses the Julia language to write code that replicates the behavior of 5G NR protocols. Using this code, a series of iterations is run to obtain the average values of the performance metrics, throughput and latency. The parameters used for model evaluation and simulation are chosen to represent the transmission of control packets in the DL sense. This is chosen because it is the communication with the most stringent delay requirements and, therefore, must operate at conditions close to URLLC. A summary of the parameters used is presented in the Table 13. The processing delay values for the various layers are chosen to represent a device with suf- ficient capabilities to support 5G URLLC transmissions. The value of the radius, i.e., the dis- tance between the vehicle and the gNB base station, is defined as in article [14], which presents a remote driving application. For the definition of the bit rate in the PHY layer, the maximum rate defined in [28] Section 5 is used. The analyzed traffic rate is chosen to cover the values of interest for the remote driving application, 50 and 100 packets/s. Using the values of the parameters in the Table 13, the performance results presented in Figs 11 and 12 are obtained for flow rate and latency, respectively. Table 13. Simulation configuration parameters. Parameter Value Traffic 1��� 200packets/s SDAP Processing Delay 0.02μs PDCP Integrity Delay 8.7660μs PDCP Ciphering Delay 4.2107μs PDCP Header Delay 0.02μs RLC Haader Delay 0.02μs RLC HARQ Transmission Delay 0.01μs MAC Processing Delay 0.02μs PHY Radio Distance 866m PHY Bitrate 218Mbps https://doi.org/10.1371/journal.pone.0313772.t013 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 31 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 11. 5G NR throughput evaluation. https://doi.org/10.1371/journal.pone.0313772.g011 The presented performance evaluation results indicate that the model results adequately describe the behavior of 5G NR. This is based on the comparison of these with simulation results. The results for Flow (Fig 11) are practically identical, having a correlation of 0.9999 and an RMSE (Root Mean Square Error of 2.2919e − 4packets/s. On the other hand, although the simulation delay results seem more dispersed (correlation of −0.5155), both of them (model and simulation) share the same trend and their valuers are close, with an RMSE of 8.3321e−5s. This allows us to establish that the model is suitable for the performance evalua- tion of 5G NR. Although the delay results seem to have a constant value, a closer look reveals that it suffers from a slight increase, see Fig 13. This finding suggests that not being careful in the rate of packets being transmitted may lead to the risk that delay grows beyond the thresholds required by URLLC applications. In addition, operating in non-ideal network conditions or where the scheduling mechanism is inadequate threatens compliance with URLLC delay requirements. 6 Discussion & conclusions In this paper, we introduced an analytical model for the protocol stack of 5G NR. The model was designed using a layered approach that considers all protocols involved in 5G NR commu- nication: SDAP, PDCP, RLC, MAC, and PHY. All the protocol functions concerning user data transmission were analyzed to develop the model. Thus, by using different analytical tools like queuing theory and SRN, the behavior of each radio protocol was described and its perfor- mance components were derived. These components can then be used to evaluate the PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 32 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 12. 5G NR delay evaluation. https://doi.org/10.1371/journal.pone.0313772.g012 performance provided by5G NR for different applications by calculating metrics like as delay and throughput with the model. As an example of its utility, the derived model was used to evaluate the performance of an application with stringent delay requirements: Remote Driving. It was found that when the control station is located nearby the 5G gNB, the protocol stack of 5G NR does not introduces significant delay. Particularly, it was found that the accumulated delay for UL video transmis- sion and control packets transmission is well below the maximum latency of 100 ms on UL and 20 ms on DL required by the 5GAA [5] for Remote Driving. Furthermoe, from this results it can be concluded that data transmission over 5g NR provides sufficient delay margin to locate the control station further away from the 5G gNB (e.g. see Fig 2a) and still meet the requirements set by the 5GAA for Remote Driving. As such, The model introduced in this paper model can complement end-to-end 5G analysis, such as the one presented in [14]. In conclusion, the model proposed in this paper can be used to evaluate the performance of the protocol stack of 5G NR under different network configurations, traffic conditions and scheduling mechanisms. By using the model, selecting an adequate parameter combination for different network conditions and applications is possible. Furthermore, the model can also be used to identify whether an edge, fog or cloud deployment is adequate for a given application. Thus, the developed model can be used as a starting point for end-to-end (E2E) network per- formance evaluations of 5G-supported deployments. PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 33 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications Fig 13. 5G NR delay evaluation close view. https://doi.org/10.1371/journal.pone.0313772.g013 Author Contributions Conceptualization: Mario Siller, Salvador Villarreal-Reyes. Investigation: Jorge Horta, Mario Siller, Salvador Villarreal-Reyes. Methodology: Jorge Horta. Project administration: Mario Siller. Supervision: Mario Siller, Salvador Villarreal-Reyes. Visualization: Jorge Horta. Writing – original draft: Jorge Horta. Writing – review & editing: Salvador Villarreal-Reyes. References 1. Lin X., Lee N., 5g and beyond, Cham, Switzerland: Springer Nature Switzerland AG (2021). 2. Holma H., Toskala A., Nakamura T., 5G technology: 3GPP new radio, John Wiley & Sons, 2020. 3. A. Zaidi (2021). [link]. URL https://www.ericsson.com/en/blog/2021/10/realizing-time-critical- communication-with-5g 4. Dahlman E., Parkvall S., Sko ¨ ld J., 5G NR The Next Generation Wireless Access Technology, Mara Conner, 2018. https://doi.org/10.1017/CBO9781107415324.004 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 34 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications 5. G. A. Association, et al., C-v2x use cases volume ii: Examples and service level requirements, White Paper (2020). 6. Winfield A. F., Future directions in tele-operated robotics, Telerobotic applications (2000) 147–163. 7. 5GAA, Mec for automotive in multi-operator scenarios, White Paper (2021). 8. R. Liu, D. Kwak, S. Devarakonda, K. Bekris, L. Iftode, Investigating remote driving over the lte network, in: Proceedings of the 9th international conference on automotive user interfaces and interactive vehic- ular applications, 2017, pp. 264–269. 9. den Ouden J., Ho V., van der Smagt T., Kakes G., Rommel S., Passchier I., et al., Design and evalua- tion of remote driving architecture on 4g and 5g mobile networks, Frontiers in Future Transportation 2 (2022) 801567. https://doi.org/10.3389/ffutr.2021.801567 10. Saez-Perez J., Wang Q., Alcaraz-Calero J. M., Garcia-Rodriguez J., Design, implementation, and empirical validation of a framework for remote car driving using a commercial mobile network, Sensors 23 (3) (2023) 1671. https://doi.org/10.3390/s23031671 PMID: 36772711 11. Yu Y., Lee S., Remote driving control with real-time video streaming over wireless networks: Design and evaluation, IEEE Access 10 (2022) 64920–64932. https://doi.org/10.1109/ACCESS.2022. 12. Lucas-Estañ M. C., Coll-Perales B., Shimizu T., Gozalvez J., Higuchi T., Avedisov S., et al., An analyti- cal latency model and evaluation of the capacity of 5g nr to support v2x services using v2n2v communi- cations, IEEE Transactions on Vehicular Technology 72 (2) (2022) 2293–2306. https://doi.org/10. 1109/TVT.2022.3208306 13. 3GPP, Study on enhancement of 3gpp support for 5g v2x services: Tr 22.886, v16. 2.0, Tech. rep., ETSI (2018). 14. Coll-Perales B., Lucas-Estañ M. C., Shimizu T., Gozalvez J., Higuchi T., Avedisov S., et al., End-to-end v2x latency modeling and analysis in 5g networks, IEEE Transactions on Vehicular Technology 72 (4) (2022) 5094–5109. https://doi.org/10.1109/TVT.2022.3224614 15. 3GPP, Lte; 5g; evolved universal terrestrial radio access (e-utra) and nr; service data adaptation proto- col (sdap) specification (3gpp ts 37.324 version 16.2.0 release 16), Tech. rep., ETSI (2020). 16. 3GPP, 5g; nr; packet data convergence protocol (pdcp) specification (3gpp ts 38.323 version 16.2.0 release 16), Tech. rep., ETSI (2020). 17. Marin A., Bulò S. R., Explicit solutions for queues with hypo-or hyper-exponential service time distribu- tion and application to product-form approximations, Performance Evaluation 81 (2014) 1–19. https:// doi.org/10.1016/j.peva.2014.07.021 18. 3GPP, 5g; security architecture and procedures for 5g system (3gpp ts 33.501 version 16.3.0 release 16), Tech. rep., ETSI (2020). 19. M. Alfadel, E.-S. M. El-Alfy, K. M. A. Kamal, Evaluating time and throughput at different modes of opera- tion in aes algorithm, in: 2017 8th International Conference on Information Technology (ICIT), IEEE, 2017, pp. 795–801. 20. S. Neumeier, E. A. Walelgne, V. Bajpai, J. Ott, C. Facchi, Measuring the feasibility of teleoperated driv- ing in mobile networks, in: 2019 Network Traffic Measurement and Analysis Conference (TMA), IEEE, 2019, pp. 113–120. 21. 3GPP, 5g; nr; radio link control (rlc) specification (3gpp ts 38.322 version 16.1.0 release 16), Tech. rep., ETSI (2020). 22. Gupta S., Gupta V., Analytical modeling of rlc protocol of lte using stochastic reward nets, International Journal of Communication Systems 32 (6) (2019) e3903. https://doi.org/10.1002/dac.3903 23. Sahner R. A., Trivedi K., Puliafito A., Performance and reliability analysis of computer systems: an example-based approach using the SHARPE software package, Springer Science & Business Media, 24. 3GPP, Ts 138 321—v16.3.0–5g; nr; medium access control (mac) protocol specification (3gpp ts 38.321 version 16.3.0 release 16), Tech. rep., ETSI (2021). URL https://portal.etsi.org/TB/ ETSIDeliverableStatus.aspx 25. Zhang H., Liu N., Chu X., Long K., Aghvami A.-H., Leung V. C. M., Network slicing based 5g and future mobile networks: Mobility, resource management, and challenges, IEEE Communications Magazine 55 (8) (2017) 138–145. https://doi.org/10.1109/MCOM.2017.1600940 26. E. Engin, I. Ho ¨ kelek, H. A. C ¸ ırpan, Resource allocation of embb and urllc traffic using pre-emption mechanism, in: 2023 46th International Conference on Telecommunications and Signal Processing (TSP), 2023, pp. 129–133. 27. Vaezi M., Ding Z., Poor H. V., Multiple access techniques for 5G wireless networks and beyond, Springer International Publishing, 2018. PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 35 / 36 PLOS ONE Cross-layer latency analysis for 5G NR in V2X communications 28. 3GPP, 5g; nr; user equipment (ue) radio access capabilities (3gpp ts 38.306 version 17.0.0 release 17), Tech. rep., ETSI (2022). 29. I. R. S. Groups, FINAL EVALUATION REPORT FROM THE 5G INFRASTRUCTURE ASSOCIATION ON IMT-2020 PROPOSALS IMT-2020/ 14, 15, 16, PARTS OF 17, Technical report (tr), ITU, document 5D/50-E (02 2020). 30. 3GPP, 5G; NR; Physical layer procedures for data (3GPP TS 38.214 version 16.2.0 Release 16), Tech- nical Specification (TS) 38.214, 3rd Generation Partnership Project (3GPP), version 16.2.0 (07 2020). 31. 3GPP, Technical Specification Group Radio Access Network; Study on New Radio Access Technology Physical Layer Aspects (Release 14), Technical Report (TR) 38.802, 3rd Generation Partnership Proj- ect (3GPP), version 14.2.0 (09 2017). 32. 3GPP, 5G; NR; Physical channels and modulation (3GPP TS 38.211 version 16.2.0 Release 16), Tech- nical Specification (TS) 38.211, 3rd Generation Partnership Project (3GPP), version 16.2.0 (07 2020). 33. 3GPP, 5G; NR; User Equipment (UE) radio transmission and reception; Part 1: Range 1 Standalone (3GPP TS 38.101-1 version 16.4.0 Release 16), Technical Specification (TS) 38.101, 3rd Generation Partnership Project (3GPP), version 16.4.0 (07 2020). 34. 3GPP, 5G; NR; User Equipment (UE) radio transmission and reception; Part 2: Range 2 Standalone (3GPP TS 38.101-2 version 16.4.0 Release 16), Technical Specification (TS) 38.101, 3rd Generation Partnership Project (3GPP), version 16.4.0 (07 2020). 35. 5g-nr-radio-latency-models, https://github.com/msepulcre/5G-NR-Radio-Latency-Models, openly Available. Accessed: 08/23/2023 (2022). 36. Kumar, S., Gautam, V., Sharma, S. & Giluka, M. Improving Uplink Transmissions for URLLC Communi- cation in 5G NR. 2024 16th International Conference On COMmunication Systems & NETworkS (COMSNETS). pp. 1160–1163 (2024) 37. Kousaridas A., Manjunath R., Perdomo J., Zhou C., Zielinski E., Schmitz S. et al. QoS prediction for 5G connected and automated driving. IEEE Communications Magazine. 59, 58–64 (2021) https://doi.org/ 10.1109/MCOM.110.2100042 38. Perez P., Ruiz J., Benito I. & Lopez R. A parametric quality model to evaluate the performance of tele- operated driving services over 5G networks. Multimedia Tools And Applications. 81, 12287–12303 (2022) https://doi.org/10.1007/s11042-021-11251-x 39. Moses L., Sambantham P., Faheem M., Ali K S. & Khan A. Joint delay and energy aware dragonfly opti- mization-based uplink resource allocation scheme for LTE-A networks in a cross-layer environment. The Journal Of Engineering. 2024, e12353 (2024) https://doi.org/10.1049/tje2.12353 40. Sangeetha S., Logeshwaran J., Faheem M., Kannadasan R., Sundararaju S. & Vijayaraja L. Smart per- formance optimization of energy-aware scheduling model for resource sharing in 5G green communica- tion systems. The Journal Of Engineering. 2024, e12358 (2024) https://doi.org/10.1049/tje2.12358 PLOS ONE | https://doi.org/10.1371/journal.pone.0313772 January 9, 2025 36 / 36

Journal

PLoS ONEPublic Library of Science (PLoS) Journal

Published: Jan 9, 2025

There are no references for this article.