دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: ارتباطات: ارتباطات از راه دور ویرایش: نویسندگان: Jyrki T. J. Penttinen سری: ISBN (شابک) : 1119275687, 9781119275688 ناشر: John Wiley & Sons, Inc. سال نشر: 2019 تعداد صفحات: 0 زبان: English فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 3 مگابایت
در صورت تبدیل فایل کتاب 5G Explained: Security and Deployment of Advanced Mobile Communications به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب 5G توضیح داد: امنیت و استقرار ارتباطات پیشرفته موبایل نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Practical Guide Provides Students and Industry Professionals
with Latest Information on 5G Mobile Networks
Continuing the tradition established in his previous
publications, Jyrki Penttinen offers5G Explainedas a
thorough yet concise introduction to recent advancements and
growing trends in mobile telecommunications. In this case,
Penttinen focuses on the development and employment of 5G
mobile networks and, more specifically, the challenges inherent
in adjusting to new global standardization requirements and in
maintaining a high level of security even as mobile technology
expands to new horizons. The text discusses, for example, the
Internet of Things (IoT) and how to keep networks reliable and
secure when they are constantly accessed by many different
devices with varying levels of user involvement and
competence.
5G Explainedis primarily designed for specialists who
need rapid acclimation to the possibilities and concerns
presented by 5G adoption. Therefore, it assumes some prior
knowledge of mobile communications. However, earlier chapters
are structured so that even relative newcomers will gain useful
information. Other notable features include:
Three modules each consisting of three chapters: Introduction,
Technical Network Description and Planning of Security and
Deployment Comprehensive coverage of topics such as technical
requirements for 5G, network architecture, radio and core
networks and services/applications Discussion of specific
security techniques in addition to common-sense guidelines for
planning, deploying, managing and optimizing 5G networks5G
Explainedoffers crucial updates for anyone involved in
designing, deploying or working with 5G networks. It should
prove a valuable guide for operators, equipment manufacturers
and other professionals in mobile equipment engineering and
security, network planning and optimization, and mobile
application development, or anyone looking to break into these
fields.
Content: Author Biography xvPreface xviiAcknowledgments xixAbbreviation List xxi1 Introduction 11.1 Overview 11.2 What Is 5G? 21.3 Background 31.4 Research 41.5 Challenges for Electronics 41.6 Expected 5G in Practice 51.7 5G and Security 71.8 Motivations 71.9 5G Standardization and Regulation 71.10 Global Standardization in 5G Era 111.11 Introduction to the Book 17References 182 Requirements 212.1 Overview 212.2 Background 222.3 5G Requirements Based on ITU 232.4 The Technical Specifications of 3GPP 292.5 NGMN 382.6 Mobile Network Operators 432.7 Mobile Device Manufacturers 43References 443 Positioning of 5G 473.1 Overview 473.2 Mobile Generations 473.3 The Role of 3GPP in LPWA and IoT 563.4 The Role of 5G in Automotive (V2X) 633.5 The Role of 5G in the Cyber-World 63References 694 Architecture 714.1 Overview 714.2 Architecture 724.3 Renewed Functionality of the 5G System 924.4 Supporting Solutions for 5G 974.5 Control and User Plane Separation of EPC Nodes (CUPS) 100References 1025 Radio Network 1055.1 Overview 1055.2 5G Performance 1065.3 5G Spectrum 1075.4 5G Radio Access Technologies 1125.5 Uplink OFDM of 5G: CP-OFDM and DFT-s-OFDM 1245.6 Downlink 1245.7 New Radio (NR) Interface of 3GPP 1265.8 User Devices 1335.9 Other Aspects 1345.10 CBRS 134References 1376 Core Network 1396.1 Overview 1396.2 Preparing the Core for 5G 1416.3 5G Core Network Elements 1546.4 5G Functionalities Implemented in 5G Core 1656.5 Transport Network 1706.6 Protocols and Interfaces 173References 1857 Services and Applications 1877.1 Overview 1877.2 5G Services 1887.3 Network Function-Related Cases 1957.4 Vehicle Communications 1977.5 Machine Learning and Artificial Intelligence 202References 2028 Security 2058.1 Overview 2058.2 5G Security Threats and Challenges 2088.3 Development 2138.4 Security Implications in 5G Environments and Use Cases 2148.5 5G Security Layers 2198.6 Device Security 2208.7 Security between Network Entities 2268.8 Security Opportunities for Stakeholders 2278.9 5G Security Architecture for 3GPP Networks 2298.10 UICC Evolution 2398.11 5G Security Development 2438.12 UICC Variants 243References 2529 5G Network Planning and Optimization 2559.1 Overview 2559.2 5G Core and Transmission Network Dimensioning 2559.3 5G Radio Network Planning 259References 26810 Deployment 27110.1 Overview 27110.2 Trials and Early Adopters Prior to 2020 27110.3 5G Frequency Bands 27210.4 Core and Radio Network Deployment Scenarios 27310.5 Standalone and Non-Standalone Deployment Scenarios 27610.6 5G Network Interfaces and Elements 28110.7 Core Deployment 28210.8 CoMP 28310.9 Measurements 284References 290Index 293