Muutke küpsiste eelistusi

E-raamat: User-Centric Ultra-Dense Networks for 5G

  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This is the first book to introduce UUDN for 5G, including the concept, challenges, architecture and key technologies.





The new network architecture based on de-cellular and user-centric is proposed with three kinds of decoupling: user plane and control plane decoupling from radio access, control and transmission decoupling from network, local service and network service decoupling.





Key characteristics of UUDN are provided, including four aspects: Intelligent network knows user, Moving network follows user, Dynamic network serves user, and Secured network protects user.





Four promising technology directions are discussed in detail, including dynamic APs grouping (DAPGing) method, intelligent networking, advanced interference management and user-centric security.





The authors also include a UUDN solution, illustrated with numerology and evaluation results as a practical example. Finally, further research directions of UUDN are analyzed.





This book gives an overall introduction of UUDN for people who are interested and just begin their study, as well as some suggestions on further research for experts involved in academic, industrial and standardization activities on relative fields.
1 User-Centric Ultra-Dense Networks for 5G
1(4)
1.1 Introduction
1(4)
References
2(3)
2 5G Requirement and UDN
5(6)
2.1 5G Scenarios and Requirements
5(2)
2.2 UDN in 5G
7(4)
2.2.1 UDN Deployment Scenarios
7(1)
2.2.2 UDN Technologies in 5G
8(1)
References
9(2)
3 Concept and Challenge of UUDN
11(6)
3.1 Concept of UUDN
11(1)
3.2 Characteristics of UUDN
11(1)
3.3 Challenge of UUDN
12(5)
3.3.1 Challenges of Network Architecture
12(1)
3.3.2 Challenges of Mobility Management
13(1)
3.3.3 Challenges of Network Engineering
14(1)
3.3.4 Challenges of Interference Management
15(1)
References
16(1)
4 Architecture of UUDN
17(6)
4.1 Trends on Architecture
17(1)
4.2 Architecture and Function Entities
18(2)
4.3 Technologies Direction
20(3)
References
21(2)
5 Key Technologies of UUDN
23(24)
5.1 APG
23(9)
5.1.1 DAPGing Method
23(7)
5.1.2 Virtual Cell
30(2)
5.2 Intelligent Networking
32(8)
5.2.1 Management-Control-User Plane (MCU) Structure
33(4)
5.2.2 Backhaul Management and Optimization
37(1)
5.2.3 Other Technologies for SON
38(2)
5.3 Advanced Interference Management
40(7)
5.3.1 Requirements for the Interference Management Design
41(1)
5.3.2 Research Directions
41(2)
5.3.3 Proposed Approaches
43(2)
References
45(2)
6 Security
47(10)
6.1 Security Domain
47(2)
6.2 Access Security of APs
49(1)
6.3 APG Security
49(2)
6.4 Expanded Key Derived Hierarchy
51(2)
6.5 Dual Authentication Method
53(4)
References
55(2)
7 Simulation and System Solution
57(16)
7.1 APG Simulation
57(6)
7.1.1 Introduction
57(1)
7.1.2 Simulation Assumptions
58(1)
7.1.3 Simulation Results and Conclusions
58(5)
7.2 Advanced Interference Management
63(4)
7.2.1 Simulation Assumptions
64(1)
7.2.2 Simulation Results and Conclusions
65(2)
7.3 Solution Example
67(6)
7.3.1 Deployment Scenarios
67(1)
7.3.2 System Architecture
68(1)
7.3.3 Key Technology Characteristics
69(1)
7.3.4 Testing Results
70(1)
References
71(2)
8 Summary
73(2)
Appendix 75