AS (Access Stratum)
Introduction
The Access Stratum (AS) is a layer of the protocol stack that resides in the User Equipment (UE) and is responsible for controlling the radio interface between the UE and the network. The AS provides functions such as radio resource control, radio bearer control, and security. The AS is divided into two sub-layers: the Radio Resource Control (RRC) sub-layer and the Medium Access Control (MAC) sub-layer. In this article, we will discuss the Access Stratum and its sub-layers in detail.
Radio Resource Control (RRC) sub-layer
The RRC sub-layer is responsible for controlling the establishment, maintenance, and release of the radio bearers (RBs) between the UE and the network. The RRC sub-layer performs functions such as:
- System information acquisition: The UE acquires system information from the network to obtain information about the network and its capabilities.
- Establishment and release of radio bearers: The RRC sub-layer establishes and releases radio bearers between the UE and the network based on the user's data requirements and the network's resource availability.
- Radio bearer modification: The RRC sub-layer can modify the attributes of an existing radio bearer, such as Quality of Service (QoS) parameters.
- Handover: The RRC sub-layer initiates the handover process when the UE moves from one cell to another.
- Paging: The RRC sub-layer receives paging messages from the network and notifies the upper layers of the UE about incoming calls or messages.
- Connection setup and release: The RRC sub-layer initiates and terminates the connection between the UE and the network.
Medium Access Control (MAC) sub-layer
The MAC sub-layer is responsible for managing the access to the shared radio resources and ensuring efficient utilization of the available resources. The MAC sub-layer performs functions such as:
- Radio resource allocation: The MAC sub-layer allocates the radio resources to the UE based on the user's data requirements and the network's resource availability.
- Multiplexing and demultiplexing: The MAC sub-layer multiplexes multiple data streams into a single transmission burst and demultiplexes the received transmission burst into multiple data streams.
- Scheduling: The MAC sub-layer schedules the transmission of data based on the priority and QoS requirements of the data.
- Retransmission control: The MAC sub-layer performs retransmissions of lost or corrupted packets to ensure reliable data transmission.
- Hybrid Automatic Repeat Request (HARQ): The MAC sub-layer implements HARQ, which is a combination of ARQ (Automatic Repeat reQuest) and Forward Error Correction (FEC), to improve the reliability of data transmission.
- Power control: The MAC sub-layer performs power control to optimize the transmission power based on the channel conditions and the QoS requirements of the data.
- Random access: The MAC sub-layer handles the random access procedure when the UE initiates a new connection with the network.
Security
The Access Stratum provides security functions to protect the UE and the network from unauthorized access, data interception, and data modification. The security functions are implemented in the RRC sub-layer and the MAC sub-layer and include the following:
- Authentication: The RRC sub-layer performs authentication to verify the identity of the UE before allowing access to the network.
- Key agreement: The RRC sub-layer and the MAC sub-layer perform key agreement to generate and exchange keys for use in encryption and decryption of the data.
- Encryption and decryption: The RRC sub-layer and the MAC sub-layer encrypt and decrypt the data to ensure the confidentiality of the data during transmission.
- Integrity protection: The RRC sub-layer and the MAC sub-layer provide integrity protection to ensure that the data has not been modified during transmission.
- Radio bearer security: The RRC sub-layer and the MAC sub-layer provide security for the radio bearers by applying encryption, integrity protection, and key agreement to the RBs.
Conclusion
In conclusion, the Access Stratum is a critical layer in the protocol stack that resides in the UE and is responsible for controlling the radio interface between the UE and the network. The Access Stratum is divided into two sub-layers: the Radio Resource Control (RRC) sub-layer and the Medium Access Control (MAC) sub-layer. The RRC sub-layer is responsible for controlling the establishment, maintenance, and release of the radio bearers, while the MAC sub-layer is responsible for managing the access to the shared radio resources and ensuring efficient utilization of the available resources. Additionally, the Access Stratum provides security functions to protect the UE and the network from unauthorized access, data interception, and data modification. Understanding the Access Stratum is crucial for the design, optimization, and troubleshooting of wireless networks.