4G & Beyond: The Convergence of Networks, Devices and Services ( Electronics and Telecommunications Research )

Publication series :Electronics and Telecommunications Research

Author: Abdulrahman Yarali  

Publisher: Nova Science Publishers, Inc.‎

Publication year: 2015

E-ISBN: 9781634834025

P-ISBN(Paperback): 9781634833981

Subject: TN929.53 cellular mobile communication system (cellular phone, a mobile telephone handset)

Keyword: 暂无分类

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

4G & Beyond: The Convergence of Networks, Devices and Services

Chapter

B. Femtocells

C. Wi-Fi

CONCLUSION

REFERENCES

Chapter 3 FUTURE TRENDS AND CHALLENGES FOR MOBILE AND CONVERGENT NETWORKS

ABSTRACT

INTRODUCTION

LITERATURE REVIEW

Convergence on the Future Wireless Access

Support of Mobile Network Access

FUTURE NETWORK REQUIREMENTS

WIRELESS ACCESS TECHNOLOGIES

IEEE 802.11(WIFI)

Background

Critical View

Deployment Analysis

3GPP LTE

Background

Critical View

Deployment Analysis

IEEE 802.16 (WIMAX)

Background

Critical View

Deployment Analysis

WIMAX and LTE Developments to Support Mobility

Some Thoughts about the Evolution of Wireless Access Technologies

MOBILITY MANAGEMENT AT THE NETWORK LAYER

MIPV4

Background

Critical View

MIPV6

Background

Critical View

HMIPV6

Background

Critical View

FMIPV6

Background

Critical View

Deployment Analysis and Comparison among Selected Mobility Proposals at Network Layer

CONCLUSION

ACKNOWLEDGMENT

REFERENCES

Chapter 4 MACHINE-TO-MACHINE COMMUNICATION SYSTEMS: CONVERGED ARCHITECTURES, SERVICES AND INTERFERENCE EVALUATION

ABSTRACT

INTRODUCTION

M2M COMMUNICATIONS

Definitions

Services - Applications

Automotive

Smart Metering

Healthcare

Building Automation and Smart Homes

Economy

Comfort

Security

Smart Cities

Industrial Applications

Architectures and Standardization Efforts

Implementation Considerations and Challenges

IR-UWB AS PHY IN INDOOR M2M COMMUNICATIONS

UWB Signals

IR-UWB Systems

Pulse Shapes

Modulation Schemes

Pulse Position Modulation (PPM)

Pulse Amplitude Modulation (PAM)

On-Off Keying (OOK)

Pulse Shape Modulation (PSM)

Multiple Access and Whitening Techniques

Time Hopping (TH)

Direct Sequence (DS)

Channel Modeling

Receivers

PERFORMANCE EVALUATION

Simulation Framework

Topology Modeling

Channel Traffic

Channel Model

Modulation Schemes

RESULTS

Results without MAI

Results with MAI

CONCLUSION

REFERENCES

Chapter 5 REDEFINING COMMUNICATION WITH 5G MOBILE TECHNOLOGY

ABSTRACT

INTRODUCTION

Evolution of Wireless Networks

ARCHITECTURE

Architecture of 5G

IMPLEMENTATION

Implementation of 5G - Future Techonological

Implementation Issues of 5G Technology

(i) Higher Frequency

(ii) Effect of Wave Propagation

(iii) Path Loss

(iv) Quality of Service (QOS) Functionality

(v) Massive MIMO

CHALLENGES OF 5G TECHNOLOGY

ADVANTAGES OF 5G TECHNOLOGY

ECONOMICAL ANALYSIS AND VIABILITY

APPLICATIONS OF 5G TECHNOLOGY

CONCLUSION

REFERENCES

Chapter 6 IDENTIFYING AND MITIGATING SECURITY AND PRIVACY THREATS IN MODERN TELECOMMUNCIATION INFRASTRUCTURE

ABSTRACT

INTRODUCTION

Industry Environment

Commercial

A. Google

B. Social Media

Government

A. NSA

B. Healthcare

Wireless Network Security and Privacy

THE IEEE 802.11 WIRELESS STANDARDS

THE RELATIONSHIP BETWEEN THE IEEE 802.11 AND WIRELESS TECHNOLOGY

IEEE 802.11 SECURITY STANDARDS AND MECHANISMS FOR WIRELESS CONNECTIVITY

VPN

SERVICE SET IDENTIFIER (SSID)

MAC ADDRESS FILTERING

WEP ALGORITHM

Encryption

Authentication

Open System Authentication

Shared Key Authentication

MAC ADDRESS FILTERING

SECURITY WEAKNESSES IN THE IEEE 802.11 SECURITY MECHANISMS

SSID Weaknesses

MAC address Filtering Weaknesses

WEP Weaknesses

Higher Generation of Mobile Communication Systems

4G LTE Architecture

The Core Network

The Access Network

Security Technology for SAE/LTE

Security Requirements for LTE

LTE Security Architecture

Vulnerabilities in System Architecture

Security in a LTE Cellular System

Key Hierarchy

Separation of AS and NAS Security Functions

LTE Access Procedure Vulnerabilities

LTE Handover Security

X2 Handover

S1 Handover

Vulnerability in LTE Handover Procedure

Security in IMS (IP Multimedia Subsystem)

Security Threats to IMS

Security Architecture in IMS

IMS Access Security-IMS AKA

Security Vulnerabilities in IMS

HeNB Security

HeNB Security Architecture

HeNB Security Threats

Security Requirements to HeNB

Security Threats Mitigation of HeNB

Security Vulnerability in HeNB

MTC Security

Security Issues in MTC

Security Threats in MTC

Security Requirements

Vulnerability in MTC Security

CONCLUSION

REFERENCES

Chapter 7 CRYPTOGRAPHY, SECURITY AND PRIVACY OF WIRED, WIRELESS AND MOBILE NETWORKS

ABSTRACT

INTRODUCTION

SECURITY SERVICES

Types of Security Services

Security Service Implementation Locations and Layers

Security Mechanisms

CRYPTOGRAPHY

Symmetric Encryption

Asymmetric Encryption

WHY ENCRYPT

CRYPTOGRAPHY IN BUSINESS

OBSTACLES TO CRYPTOGRAPHY

CONCLUSION

REFERENCES

Chapter 8 TECHNOLOGICAL ALTERNATIVES AND CONVERGENCE AT MULTIPLE LEVELS FOR HIGHER GENERATION OF TELECOMMUNICATION SYSTEMS

ABSTRACT

INTRODUCTION

CONVERGENCE OVERVIEW

1. CONVERGENCE WITHIN THE HANDSET

2. FEMTOCELL

3. OPTICAL-WIRELESS NETWORK

4. HOMECELL COVERAGE (HOME-ZONE)

5. VOIP AND MOBILE INTERNET CONNECTION

FMC TECHNICAL OVERVIEW

Wireless Cellular Alernatives

UMA

IMS

VCC

BUSINESS AND ECONOMIC ASPECTS

SERVICE PROVIDER LOCAL LOOP BANDWIDTH

MULTIPLATFORM MULTIMEDIA END USER EQUIPMENT

HOMELAND/EMERGENCY DISASTER PREPAREDNESS

CONCLUSION

REFERENCES

Chapter 9 HANDOVER AND MOBILITY MANAGEMENT IN 4G AND BEYOND

ABSTRACT

INTRODUCTION

MOST IMPORTANT ASPECTS OF 5G

POSSIBLE TECHNOLOGIES IN 5G

Technical Schemes

Access Technologies

HAND OVER AT A GLANCE

Objectives of Handover

Handover Decision

Handover Initiation

Priority in Handover

Handover in 2G

GSM Handover

Handover in 3G

Handover in 4G

Requirement for Handover Mechanism

HANDOVER IN MULTI-RAT NETWORKS WITH EVOLUATED ARCHITECTURE

IP HANDOVER

Overview of GTP and PMIP

GTP

PMIP

HANDOVER PROCEDURES IN LAST GENERATION WIRELESS NETWORKS – LTE

X2 Handover

S1 Handover

I-RAT handover

CS Fallback

MOBILITY MANAGEMENT IN 4G

Mobility Management at Different Layers

CONCLUSION

REFERENCES

ABOUT THE EDITOR

INDEX

The users who browse this book also browse


No browse record.