ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب 5G Core Networks: Powering Digitalization

دانلود کتاب شبکه های اصلی 5G: دیجیتالی کردن نیرو

5G Core Networks: Powering Digitalization

مشخصات کتاب

5G Core Networks: Powering Digitalization

ویرایش: 1 
نویسندگان: , , , , ,   
سری:  
ISBN (شابک) : 0081030096, 9780081030097 
ناشر: Academic Press 
سال نشر: 2019 
تعداد صفحات: 498 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 30 مگابایت 

قیمت کتاب (تومان) : 43,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب 5G Core Networks: Powering Digitalization به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب شبکه های اصلی 5G: دیجیتالی کردن نیرو نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Front Cover
5G Core Networks: Powering Digitalization
Copyright
Contents
Forewords
Acknowledgments
Chapter 1: Introduction
	1.1. 5G-A new era of connectivity
	1.2. A step change
	1.3. A new context for operators
	1.4. The road to 5G network deployments
	1.5. 3GPP release 15 and 16
	1.6. Core requirements
	1.7. New service grades
	1.8. Structure of this book
		1.8.1. Part one: Introduction, architecture and scope of book
		1.8.2. Part two: Core concepts of 5GC
		1.8.3. Part three: 5GC nuts and bolts
		1.8.4. Part four: Release 16 and beyond
Chapter 2: Drivers for 5G
	2.1. Introduction
	2.2. New use cases
	2.3. New technologies
		2.3.1. Virtualization
		2.3.2. Cloud native
		2.3.3. Containers
		2.3.4. Microservices
		2.3.5. Automation
Chapter 3: Architecture overview
	3.1. Introduction
		3.1.1. Balancing evolution and disruption
		3.1.2. 3GPP architecture options
			3.1.2.1. The non stand-alone (NSA) architecture
	3.2. Two perspectives on 5G Core
	3.3. Service-based architecture (SBA)
		3.3.1. The concept of services
		3.3.2. HTTP REST interfaces
		3.3.3. Service registration and discovery
	3.4. The core of the core
	3.5. Connecting the core network to mobile devices and radio networks
	3.6. Mobility and data connectivity
	3.7. Policy control and charging
	3.8. 5GC interworking with EPC
		3.8.1. Interworking using the N26 interface
		3.8.2. Interworking without an N26 interface
	3.9. Voice services
		3.9.1. Overview of 5G voice
		3.9.2. EPS fallback
		3.9.3. Voice-over-NR
	3.10. Messaging services
		3.10.1. Overview of messaging services
		3.10.2. SMS over IP
		3.10.3. SMS over NAS
	3.11. Exposure of network information
	3.12. Device positioning services
	3.13. Network analytics
	3.14. Public warning system
	3.15. Support for devices connected over non-3GPP access networks
	3.16. Network slicing
	3.17. Roaming
	3.18. Storage of data
	3.19. 5G radio networks
		3.19.1. Overview
		3.19.2. Mobile network fundamentals
		3.19.3. 5G targets
		3.19.4. NR radio channel concepts
		3.19.5. Advanced antenna techniques
		3.19.6. NR radio network architecture
		3.19.7. The NR air interface
		3.19.8. Base station internal architecture
Chapter 4: EPC for 5G
	4.1. Introduction
	4.2. Key EPC functions
		4.2.1. Subscription and mobility management
		4.2.2. Mobility management
		4.2.3. Session management
		4.2.4. Control-plane aspects
		4.2.5. QoS
		4.2.6. The EPS bearer for E-UTRAN access
		4.2.7. Default and dedicated bearers
		4.2.8. User-plane aspects
		4.2.9. Policy control and charging
	4.3. (Enhanced) Dedicated Core Networks ((e)DECOR)
	4.4. Control and User Plane Separation (CUPS)
Chapter 5: Key concepts
	5.1. Architecture modeling
	5.2. Service Based Architecture
	5.3. Identifiers
Chapter 6: Session management
	6.1. PDU Session concepts
		6.1.1. Introduction
		6.1.2. Connectivity service to DN
			6.1.2.1. Basic PDU Session connectivity
			6.1.2.2. Relation between transport network, PDU Session and application traffic
			6.1.2.3. Multiple PDU Sessions
			6.1.2.4. PDU Session properties
	6.2. PDU Session types
		6.2.1. General
		6.2.2. IP based PDU Session types
			6.2.2.1. General
			6.2.2.2. IP addressing for IP-based PDU Session types
			6.2.2.3. IP address allocation
		6.2.3. Ethernet PDU Session type
			6.2.3.1. General
			6.2.3.2. MAC addressing
			6.2.3.3. Support for Virtual LANs
			6.2.3.4. QoS and charging aspects
			6.2.3.5. Handling of broadcast
		6.2.4. Unstructured PDU Session type
	6.3. User plane handling
		6.3.1. General
		6.3.2. User Plane path and UPF roles
		6.3.3. Control-plane and user-plane separation and the N4 interface
			6.3.3.1. General
			6.3.3.2. UPF discovery and selection
			6.3.3.3. Selective activation and deactivation of UP connections
	6.4. Mechanisms to provide efficient user plane connectivity
		6.4.1. General
		6.4.2. Service and Session Continuity (SSC) modes
			6.4.2.1. General
			6.4.2.2. SSC mode 1
			6.4.2.3. SSC mode 2
			6.4.2.4. SSC mode 3
		6.4.3. Selective traffic routing to a DN
			6.4.3.1. General
			6.4.3.2. Up-link Classifier
			6.4.3.3. IPv6 multi-homing
		6.4.4. Application Function influence on traffic routing
	6.5. Edge computing
	6.6. Session authentication and authorization
	6.7. Local Area Data Network
Chapter 7: Mobility Management
	7.1. Introduction
	7.2. Establishing connectivity
		7.2.1. Network discovery and selection
		7.2.2. Registration and Mobility
		7.2.3. Cellular connected mode mobility
	7.3. Reachability
		7.3.1. Paging
		7.3.2. Mobile Initiated Connection Only (MICO) mode
		7.3.3. UE\'s reachability and location
	7.4. Additional MM related concepts
		7.4.1. RRC Inactive
	7.5. N2 management
		7.5.1. AMF management
		7.5.2. 5GC assistance for RAN optimizations
		7.5.3. Service Area and Mobility Restrictions
	7.6. Control of overload
		7.6.1. Unified Access Control
	7.7. Non-3GPP aspects
	7.8. Interworking with EPC
		7.8.1. General
		7.8.2. Interworking with EPC using 3GPP access
			7.8.2.1. General
			7.8.2.2. Interworking using the N26 interface
			7.8.2.3. Interworking without an N26 interface
Chapter 8: Security
	8.1. Introduction
	8.2. Security requirements and security services of the 5G system
		8.2.1. Security requirements
		8.2.2. Security services
		8.2.3. Security domains
			8.2.3.1. Overview
			8.2.3.2. Network access security
			8.2.3.3. Network domain security
			8.2.3.4. User domain security
			8.2.3.5. Application domain security
			8.2.3.6. SBA domain security
			8.2.3.7. Visibility and configurability of security
	8.3. Network access security
		8.3.1. General
		8.3.2. Flexibility is part of 5GS
		8.3.3. Security entities for network access security
		8.3.4. Access security in 5GS
			8.3.4.1. Introduction
			8.3.4.2. Access security overview
		8.3.5. Concealment of permanent subscription identifier
		8.3.6. Primary authentication and key derivation overview
			8.3.6.1. Overview
			8.3.6.2. Initiation of authentication and selection of authentication method
		8.3.7. 5G AKA based primary authentication
		8.3.8. EAP-AKA based primary authentication
		8.3.9. Key derivation and key hierarchy
		8.3.10. NAS security
		8.3.11. Updating of USIM content, including Steering of Roaming
		8.3.12. Interworking with EPS/4G
			8.3.12.1. General
			8.3.12.2. Single Registration mode
				Single Registration mode with N26
				Single Registration mode without N26
			8.3.12.3. Dual Registration mode
	8.4. Network domain security
		8.4.1. Introduction
		8.4.2. Security aspects of Service Based interfaces
		8.4.3. Service Based interfaces between PLMNs in roaming
		8.4.4. Network Domain Security for IP based communication
		8.4.5. Security aspects of N2 and N3 interfaces
		8.4.6. Security aspects of Network Exposure/NEF
	8.5. User domain security
	8.6. Lawful intercept
Chapter 9: Quality-of-Service
	9.1. Introduction
	9.2. Flow based QoS framework
	9.3. Signaling of QoS
	9.4. Reflective QoS
	9.5. QoS parameters and characteristics
		9.5.1. 5G QoS parameters
		9.5.2. 5G QoS characteristics
		9.5.3. Standardized 5QI to QoS characteristics mapping
Chapter 10: Policy control and charging
	10.1. Introduction
	10.2. Overview of policy and charging control
	10.3. Access and mobility related policy control
		10.3.1. Access and mobility management related policies
		10.3.2. Additional mobility related policy features
	10.4. UE policy control
		10.4.1. Overview
		10.4.2. Delivery of URSP and ANDSP to UE
	10.5. Management of Packet Flow Descriptions
	10.6. Network status analytics
	10.7. Negotiation for future background data transfer
	10.8. Session Management related policy and charging control
		10.8.1. Session Management related policy concepts
		10.8.2. Policy decisions and the PCC rule
		10.8.3. Use case with application authorization
		10.8.4. QoS Flow binding
		10.8.5. Service Data Flow detection
		10.8.6. SMF related policy authorization request triggers
	10.9. Additional session related policy control features
		10.9.1. Application detection
		10.9.2. Traffic steering control
		10.9.3. Usage Monitoring Control
		10.9.4. Policy decisions based on spending limits
		10.9.5. Sponsored connectivity
		10.9.6. Event reporting from the PCF
	10.10. Charging
Chapter 11: Network slicing
	11.1. Introduction
	11.2. Management and orchestration
		11.2.1. Preparation
		11.2.2. Commissioning
		11.2.3. Operation
		11.2.4. Decommissioning
		11.2.5. Summary
	11.3. Network Slice selection framework
		11.3.1. Introduction
		11.3.2. Identifiers
		11.3.3. Network Slice availability
		11.3.4. Network Slice selection
		11.3.5. Network Slice selection at interworking with EPS
Chapter 12: Dual connectivity
	12.1. Introduction
	12.2. Multi-RAT Dual Connectivity overall architecture
	12.3. MR-DC: UE and RAN perspective
	12.4. MR-DC: Subscription, QoS flows and E-RABs, MR-DC bearers
	12.5. Managing secondary RAN node handling for mobility and session management
	12.6. Security
	12.7. Reporting User Data Volume traversing via SN
Chapter 13: Network functions and services
	13.1. 5G core network functions
		13.1.1. AMF-Access and mobility management function
		13.1.2. SMF-Session management function
		13.1.3. UPF-User plane function
		13.1.4. NRF-Network repository function
		13.1.5. UDM-Unified data management function
		13.1.6. UDR-Unified data repository
		13.1.7. UDSF-Unstructured data storage function
		13.1.8. AUSF-AUthentication server function
		13.1.9. 5G-EIR-5G equipment identity registry
		13.1.10. PCF-Policy control function
		13.1.11. NSSF-Network slice selection function
		13.1.12. NEF-Network exposure function
		13.1.13. NWDAF-Network data analytics function
		13.1.14. SEPP-Security edge protection proxy
		13.1.15. N3IWF-Non-3GPP inter working function
		13.1.16. AF-Application function
		13.1.17. SMSF-Short message service function
		13.1.18. LMF-Location management function
	13.2. Services and service operations
		13.2.1. AMF services
			13.2.1.1. Namf_Communication service
				Namf_Communication_UEContextTransfer service operation
				Namf_Communication_RegistrationCompleteNotify service operation
					Namf_Communication_N1MessageSubscribe service operation
				Namf_Communication_N1MessageNotify service operation
				Namf_Communication_N1MessageUnSubscribe service operation
				Namf_Communication_N1N2MessageTransfer service operation
				Namf_Communication_N1N2TransferFailureNotification service operation
				Namf_Communication_N2InfoSubscribe service operation
				Namf_Communication_N2InfoUnSubscribe service operation
				Namf_Communication_N2InfoNotify service operation
				Namf_Communication_CreateUEContext service operation
				Namf_Communication_ReleaseUEContext service operation
				Namf_Communication_EBIAssignment service operation
				Namf_Communication_AMFStatusChangeSubscribe service operation
				Namf_Communication_AMFStatusChangeUnSubscribe service operation
				Namf_Communication_AMFStatusChangeNotify service operation
			13.2.1.2. Namf_EventExposure service
				Namf_EventExposure_Subscribe service operation
				Namf_EventExposure_UnSubscribe service operation
				Namf_EventExposure_Notify service operation
			13.2.1.3. Namf_MT service
				Namf_MT_EnableUEReachability service operation
				Namf_MT_ProvideDomainSelectionInfo service operation
			13.2.1.4. Namf_Location service
				Namf_Location_ProvidePositioningInfo service operation
				Namf_Location_EventNotify service operation
				Namf_Location_ProvideLocationInfo service operation
		13.2.2. SMF services
			13.2.2.1. Nsmf_PDUSession_CreateSMContext service operation
			13.2.2.2. Nsmf_PDUSession_UpdateSMContext service operation
			13.2.2.3. Nsmf_PDUSession_ReleaseSMContext service operation
			13.2.2.4. Nsmf_PDUSession_SMContextStatusNotify service operation
			13.2.2.5. Nsmf_PDUSession_Create service operation
			13.2.2.6. Nsmf_PDUSession_Update service operation
			13.2.2.7. Nsmf_PDUSession_Release service operation
			13.2.2.8. Nsmf_PDUSession_StatusNotify service operation
			13.2.2.9. Nsmf_PDUSession_ContextRequest service operation
			13.2.2.10. Nsmf_EventExposure service
				Nsmf_EventExposure_Subscribe service operation
				Nsmf_EventExposure_UnSubscribe service operation
				Nsmf_EventExposure_Notify service operation
		13.2.3. PCF services
			13.2.3.1. Npcf_AMPolicyControl service
				Npcf_AMPolicyControl_Create service operation
				Npcf_AMPolicyControl_Update service operation
				Npcf_AMPolicyControl_UpdateNotify service operation
				Npcf_AMPolicyControl_Delete service operation
			13.2.3.2. Npcf_PolicyAuthorization service
				Npcf_PolicyAuthorization_Create service operation
				Npcf_PolicyAuthorization_Update service operation
				Npcf_PolicyAuthorization_Delete service operation
				Npcf_PolicyAuthorization_Notify service operation
				Npcf_PolicyAuthorization_Subscribe service operation
				Npcf_PolicyAuthorization_Unsubscribe service operation
			13.2.3.3. Npcf_SMPolicyControl service
				Npcf_SMPolicyControl_Create service operation
				Npcf_SMPolicyControl_UpdateNotify service operation
				Npcf_SMPolicyControl_Delete service operation
				Npcf_SMPolicyControl_Update service operation
			13.2.3.4. Npcf_BDTPolicyControl service
				Npcf_BDTPolicyControl_Create service operation
				Npcf_BDTPolicyControl_Update service operation
			13.2.3.5. Npcf_UEPolicyControl service
				Npcf_UEPolicyControl_Create service operation
				Npcf_UEPolicyControl_UpdateNotify service operation
				Npcf_UEPolicyControl_Delete service operation
				Npcf_UEPolicyControl_Update service operation
			13.2.3.6. Npcf_EventExposure service
				Npcf_EventExposure_Subscribe service operation
				Npcf_EventExposure_UnSubscribe service operation
				Npcf_EventExposure_Notify service operation
		13.2.4. UDM services
			13.2.4.1. Nudm_UECM (Nudm_UEContextManagement) service
				Nudm_UECM_Registration service operation
				Nudm_UECM_DeregistrationNotification service operation
				Nudm_UECM_Deregistration service operation
				Nudm_UECM_Get service operation
				Nudm_UECM_Update service operation
				Nudm_UECM_PCscfRestoration service operation
			13.2.4.2. Nudm_SubscriberDataManagement (SDM) service
				Nudm_SDM_Get service operation
				Nudm_SDM_Notification service operation
				Nudm_SDM_Subscribe service operation
				Nudm_SDM_Unsubscribe service operation
				Nudm_SDM_Info service operation
			13.2.4.3. Nudm_UEAuthentication service
				Nudm_UEAuthentication_Get service operation
				UEAuthentication_ResultConfirmation service operation
			13.2.4.4. Nudm_EventExposure service
				Nudm_EventExposure_Subscribe service operation
				Nudm_EventExposure_Unsubscribe service operation
				Nudm_EventExposure_Notify service operation
			13.2.4.5. Nudm_ParameterProvision service
				Nudm_ParameterProvision_Update service operation
		13.2.5. NRF services
			13.2.5.1. Nnrf_NFManagement service
				Nnrf_NFManagement_NFRegister service operation
				Nnrf_NFManagement_NFUpdate service operation
				Nnrf_NFManagement_NFDeregister service operation
				Nnrf_NFManagement_NFStatusSubscribe service operation
				Nnrf_NFManagement_NFStatusNotify service operation
				Nnrf_NFManagement_NFStatusUnsubscribe service operation
			13.2.5.2. Nnrf_NFDiscovery service
				Nnrf_NFDiscovery_Request service operation
			13.2.5.3. Nnrf_AccessToken service
				Nnrf_AccessToken_Get service operation
		13.2.6. AUSF services
			13.2.6.1. Nausf_UEAuthentication service
				Nausf_UEAuthentication service operation
			13.2.6.2. Nausf_SoRProtection service
				Nausf_SoRProtection service operation
			13.2.6.3. Nausf_UPUProtection service
				Nausf_UPUProtection service operation
		13.2.7. SMSF services
			13.2.7.1. Nsmsf_SMService service
				Nsmsf_SMService_Activate service operation
				Nsmsf_SMService_Deactivate service operation
				Nsmsf_SMService_UplinkSMS service operation
		13.2.8. UDR services
			13.2.8.1. Nudr_DataManagement (DM) service
				Nudr_DM_Query service operation
				Nudr_DM_Create service operation
				Nudr_DM_Delete service operation
				Nudr_DM_Update service operation
				Nudr_DM_Subscribe service operation
				Nudr_DM_Unsubscribe service operation
				Nudr_DM_Notify service operation
		13.2.9. 5G-EIR services
			13.2.9.1. N5g-eir_EquipmentIdentityCheck_Get service operation
		13.2.10. NWDAF services
			13.2.10.1. Nnwdaf_EventsSubscription service
				Nnwdaf_EventsSubscription_Subscribe service operation
				Nnwdaf_EventsSubscription_Unsubscribe service operation
				Nnwdaf_EventsSubscription_Notify service operation
			13.2.10.2. Nnwdaf_Analytics_Info service
				Nnwdaf_AnalyticsInfo_Request service operation
		13.2.11. UDSF services
		13.2.12. NSSF services
			13.2.12.1. Nnssf_NSSelection service
				Nnssf_NSSelection_Get service operation
			13.2.12.2. Nnssf_NSSAIAvailability service
				Nnssf_NSSAIAvailability_Update service operation
				Nnssf_NSSAIAvailability_Notify service operation
		13.2.13. LMF services
			13.2.13.1. Nlmf_Location_DetermineLocation service operation
		13.2.14. NEF services
			13.2.14.1. Nnef_EventExposure service
				Nnef_EventExposure_Subscribe service operation
				Nnef_EventExposure_Unsubscribe service operation
				Nnef_EventExposure_Notify service operation
			13.2.14.2. Nnef_PFDManagement service
				Nnef_PFDManagement_Fetch service operation
				Nnef_PFDManagement_Subscribe service operation
				Nnef_PFDManagement_Notify service operation
				Nnef_PFDManagement_Unsubscribe service operation
				Nnef_PFDManagement_Create service operation
				Nnef_PFDManagement_Update service operation
				Nnef_PFDManagement_Delete service operation
			13.2.14.3. Nnef_ParameterProvision service
			13.2.14.4. Nnef_ParameterProvision_Update service operation
			13.2.14.5. Nnef_Trigger service
				Nnef_Trigger_Delivery service operation
				Nnef_Trigger_DeliveryNotify service operation
			13.2.14.6. Nnef_BDTPNegotiation service
				Nnef_BDTPNegotiation create service operation
				Nnef_BDTPNegotiation update service operation
			13.2.14.7. Nnef_TrafficInfluence service
				Nnef_TrafficInfluence_Create service operation
				Nnef_TrafficInfluence_Update service operation
				Nnef_TrafficInfluence_Delete service operation
				Nnef_TrafficInfluence_Notify service operation
			13.2.14.8. Nnef_ChargeableParty service
				Nnef_ChargeableParty create service operation
				Nnef_ChargeableParty update service operation
				Nnef_ChargeableParty notify service operation
			13.2.14.9. Nnef_AFsessionWithQoS service
				Nnef_AFsessionWithQoS create service operation
				Nnef_AFsessionWithQoS notify service operation
Chapter 14: Protocols
	14.1. Introduction
	14.2. 5G non-access stratum (5G NAS)
		14.2.1. Introduction
		14.2.2. 5G mobility management
		14.2.3. 5G session management
		14.2.4. Message structure
		14.2.5. Future extensions and backward compatibility
	14.3. NG application protocol (NGAP)
		14.3.1. Introduction
		14.3.2. Basic principles
		14.3.3. NGAP elementary procedures
	14.4. Hypertext transfer protocol (HTTP)
		14.4.1. Introduction
		14.4.2. Basic principles
		14.4.3. HTTP messages, methods, resources and URIs
		14.4.4. RESTful design
		14.4.5. HTTP protocol format
		14.4.6. Serialization protocol
		14.4.7. Interface definition language
	14.5. Transport layer security (TLS)
		14.5.1. Introduction
		14.5.2. TLS handshake protocol
		14.5.3. TLS record protocol
	14.6. Packet forwarding control protocol (PFCP)
		14.6.1. Introduction
		14.6.2. PFCP protocol stack and PFCP messages
		14.6.3. Packet forwarding model and PFCP rules
			14.6.3.1. General
			14.6.3.2. Packet Detection Rule (PDR)
			14.6.3.3. Forwarding Action Rule (FAR)
			14.6.3.4. QoS Enforcement Rule (QER)
			14.6.3.5. Usage Reporting Rule (URR)
			14.6.3.6. Buffering Action Rule (BAR)
		14.6.4. Reporting from UPF to SMF
		14.6.5. Data forwarding between SMF and UPF
	14.7. GPRS tunneling protocol for the User Plane (GTP-U)
	14.8. Extensible Authentication Protocol (EAP)
		14.8.1. General
		14.8.2. EAP operation
	14.9. IP security (IPSec)
		14.9.1. Introduction
		14.9.2. IPsec overview
		14.9.3. Encapsulated Security Payload and Authentication Header
		14.9.4. Internet key exchange
		14.9.5. IKEv2 mobility and multi-homing
	14.10. Stream Control Transmission Protocol (SCTP)
		14.10.1. Introduction
		14.10.2. Basic protocol features
		14.10.3. Multi-streaming
		14.10.4. Multi-homing
		14.10.5. Packet structure
	14.11. Generic routing encapsulation (GRE)
		14.11.1. Introduction
		14.11.2. Basic protocol aspects
		14.11.3. GRE packet format
Chapter 15: Selected call flows
	15.1. Introduction
	15.2. Registration and deregistration
		15.2.1. Registration (initial-, periodic-, mobility-registration)
		15.2.2. Deregistration
	15.3. Service Request
		15.3.1. Introduction
		15.3.2. UE triggered Service Request
		15.3.3. Network triggered Service Request
	15.4. UE Configuration Update
		15.4.1. Introduction
		15.4.2. UE Configuration Update for access and mobility related parameters
		15.4.3. UE Configuration Update Procedure for transparent UE policy delivery
	15.5. PDU Session Establishment
	15.6. Inter-NG-RAN handover
		15.6.1. Introduction
		15.6.2. Xn-based inter-NG-RAN handover
		15.6.3. N2-based inter-NG-RAN handover
			15.6.3.1. General
			15.6.3.2. Preparation phase
			15.6.3.3. Execution phase
	15.7. EPS interworking with N26
		15.7.1. Introduction
		15.7.2. Handover from 5GS to EPS
		15.7.3. Handover from EPS to 5GS
			15.7.3.1. General
			15.7.3.2. Preparation phase
			15.7.3.3. Execution phase
		15.7.4. Idle mode mobility from 5GS to EPS
		15.7.5. Idle mode mobility from EPS to 5GS
	15.8. EPS fallback
	15.9. Procedures for untrusted non-3GPP access
		15.9.1. Introduction
		15.9.2. Registration over untrusted non-3GPP access
		15.9.3. PDU Session Establishment over untrusted non-3GPP access
		15.9.4. Handover of a PDU Session procedure from untrusted non-3GPP to 3GPP access
		15.9.5. Handover of a PDU Session procedure from 3GPP to untrusted non-3GPP access
Chapter 16: Architecture extensions and vertical industries
	16.1. Overview
	16.2. Architecture enhancements and extensions
		16.2.1. Enhancing the service based architecture
			16.2.1.1. Indirect communication and delegated discovery
			16.2.1.2. NF Sets and NF Service Sets
			16.2.1.3. Context Transfer
		16.2.2. Network automation
		16.2.3. Enhanced network slicing
			16.2.3.1. Introduction
			16.2.3.2. Network Slice-Specific Authentication and Authorization
		16.2.4. Enhanced SMF/UPF deployment flexibility
			16.2.4.1. Background
			16.2.4.2. Architectures with I-SMF
			16.2.4.3. Inter-PLMN mobility
			16.2.4.4. Traffic breakout in architectures with I-SMF
	16.3. New feature capabilities
		16.3.1. Support for industrial IOT applications
			16.3.1.1. Background/drivers for IIoT in 5GS
		16.3.2. 5G LAN-type services
			16.3.2.1. Introduction
			16.3.2.2. 5G VN group management
			16.3.2.3. 5G VN User Plane handling
		16.3.3. Support for Non-Public Networks
			16.3.3.1. Introduction
			16.3.3.2. Stand-alone Non-Public Networks
			16.3.3.3. Access to PLMN services via an SNPN, and access to SNPN services via a PLMN
			16.3.3.4. Public network integrated NPN
		16.3.4. Ultra-Reliable Low-Latency Communication (URLLC)
			16.3.4.1. Overall architectural aspects
			16.3.4.2. Dual connectivity based end to end redundant user plane paths
			16.3.4.3. Redundant user plane paths based on multiple UEs per device
			16.3.4.4. Support of redundant transmission on N3/N9 interfaces
			16.3.4.5. Support for redundant transmission at transport layer
		16.3.5. Time Sensitive Networks in 5GS
		16.3.6. Automotive use cases
			16.3.6.1. Background: V2X in EPS
			16.3.6.2. V2X in 5GS for NR
		16.3.7. Integration of fixed access
			16.3.7.1. Background and drivers
			16.3.7.2. Migration considerations
			16.3.7.3. Network architecture
			16.3.7.4. Fixed wireless access and hybrid access
			16.3.7.5. Conclusions
		16.3.8. Multi-access PDU Sessions
			16.3.8.1. Introduction
			16.3.8.2. Multi-access PDU session
			16.3.8.3. Steering functionality and performance measurements
Chapter 17: Future outlook
References
Abbreviations
Index
Back Cover




نظرات کاربران