Mobile Communications Systems Development. Rajib Taid. Читать онлайн. Newlib. NEWLIB.NET

Автор: Rajib Taid
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Техническая литература
Год издания: 0
isbn: 9781119778707
Скачать книгу
Illustration: A working model of protocol layer.Figure 3.18 Illustration: general protocol layer model of UTRAN, E‐UTRAN, an...Figure 3.19 Illustration: general protocol layer model of UTRAN and E‐UTRAN....Figure 3.20 Iu interface transport network: data link layers.Figure 3.21 Illustration: GSM air interface Layer 3 protocol stack.Figure 3.22 Illustration: LTE/EPS NAS transport between eNodeB and MME over ...

      4 Chapter 4Figure 4.1 Components of an IE of a protocol message.Figure 4.2 Presence requirements of an IE of a protocol message.Figure 4.3 Standard formats of air interface layer 3 messages IEs.Figure 4.4 LTE/EPS NAS layer 3 attach complete message.Figure 4.5 LTE/EPS NAS layer 3 ESM information request message.Figure 4.6 Illustration: encoding and transmission of air interface message....Figure 4.7 Illustration: TLV Vs PER encoding method.Figure 4.8 LTE/EPS MME‐ENodeB: S1‐AP: downlink NAS transport.

      5 Chapter 5Figure 5.1 Network identities, their persistency, and presence.Figure 5.2 Illustration: identities for LTE network elements.Figure 5.3 Illustration: components and derivation of a GUTI.Figure 5.4 Illustration: LTE physical layer cell identities (PCI) and groups...Figure 5.5 GPRS MS identity: mapping of an NRI and TLLI into a P‐TMSI.Figure 5.6 Illustration: UE identities mapping: GERAN/UTRAN to E‐UTRAN.

      6 Chapter 6Figure 6.1 Illustration: LTE network and IMS interworking for VoLTE call.Figure 6.2 Reference architecture of an IMS.Figure 6.3 Allocation of default bearer with QCI = 5 for IMS signaling.Figure 6.4 Illustration: registration of UE in an IMS.Figure 6.5 Illustration: VoLTE call between IMS registered UEs.Figure 6.6 Illustration: legacy and LTE network interworking for VoLTE call ...Figure 6.7 Illustration: VoLTE call HO through SRVCC feature.Figure 6.8 Illustration: legacy and LTE network interworking for CSFB.Figure 6.9 Illustration: LTE voice call: MO‐MT voice call through CSFB.Figure 6.10 Interworking of LTE/EPS with GERAN and UTRAN through legacy netw...Figure 6.11 LTE/EPS Roaming: routing of user data by the HPLMN for roaming u...Figure 6.12 LTE/EPS Roaming: routing of user data by the VPLMN for roaming u...Figure 6.13 Roaming through interoperation of legacy network elements.

      7 Chapter 7Figure 7.1 LTE/E‐UTRAN eNodeB connected to multiple core network (CN) elemen...Figure 7.2 Illustration: 5G NG‐RAN connected to multiple AMF sets.Figure 7.3 Illustration: typical MME selection and allocation to UEs using W...Figure 7.4 Illustration: core network (CN) node selection and allocation usi...Figure 7.5 Illustration: radio access network sharing and MOCN configuration...Figure 7.6 Illustration: GSM/GPRS CS/PS paging through Gs interface between ...Figure 7.7 Illustration: supporting UE signaling flow for RAN sharing throug...Figure 7.8 Illustration: non‐supporting UE signaling flow for RAN sharing th...Figure 7.9 Illustration: 5G NG‐RAN sharing through MOCN feature.

      8 Chapter 8Figure 8.1 Illustration: packet encapsulation using GTP.Figure 8.2 Components of GTP user plane G‐PDU.Figure 8.3 Illustration: LTE/EPC GTP‐C message over UDP/IP interface.Figure 8.4 Illustration: GTP‐C message exchanged during inter‐RAT handover....Figure 8.5 Illustration: user data/IP packets encapsulations and tunneling u...Figure 8.6 GPRS packet encapsulation, between MS and SGSN, over the air inte...Figure 8.7 Illustration: GPRS inter SGSNs routing area update procedure.Figure 8.8 Illustration: IP header compression for a VoIP call.

      9 Chapter 9Figure 9.1 Illustration: security features for protection of user traffic in...Figure 9.2 Illustration: security features for protection of signaling traff...Figure 9.3 Illustration of (a) ciphering and (b) integrity protection algori...Figure 9.4 Illustration: activation of GSM security procedure for a MOC.Figure 9.5 Illustration: LTE ciphering and integrity protection of AS and NA...Figure 9.6 Illustration: security mode command to activate ciphering and int...Figure 9.7 Illustration: LTE/EPS initial UE registration and its security fe...

      10 Chapter 10Figure 10.1 Illustration: a typical alarm management system.Figure 10.2 Illustration: protocol error reporting using STATUS PDU.Figure 10.3 Illustration: LTE/EPS protocol error reporting using ESM or EMM ...Figure 10.4 Illustration: normal GTP user plane echo request and response.Figure 10.5 Illustration: An abnormal scenario in LTE/EPS: GTP alarm generat...

      11 Chapter 11Figure 11.1 GSM CS voice call processing phases.Figure 11.2 Illustration: performances and optimizations management system f...Figure 11.3 Illustration: KPI various stages of a GSM call flow.Figure 11.4 Illustration: KPI areas of a network element.Figure 11.5 Illustration: KPI evaluation steps of a typical network element....Figure 11.6 Illustration: ideal and poor SLA and KPI for GSM MOC voice call....

      12 Chapter 12Figure 12.1 Application and transport layer with respect to IP troubleshooti...Figure 12.2 IP packets snipping through switch port mirroring.Figure 12.3 Illustration: GSM location area update procedure.Figure 12.4 Illustration: typical UE conformance test scenarios for GSM loca...Figure 12.5 Illustration: IP packet snipping tool setup for troubleshooting ...Figure 12.6 Illustration: air interface RLC layer data throughput.

      13 Chapter 13Figure 13.1 Phases of software development process and its SDLC.Figure 13.2 Illustration: embedded system development environment.Figure 13.3 Illustration: single core and multicore processor systems.Figure 13.4 Illustration: hash table and linked list of 5G UE context struct...Figure 13.5 Illustration: IPC among the processes running on Windows and UNI...Figure 13.6 Different types of signals available on the UNIX/LINUX OS.Figure 13.7 Different actions taken by a signal handler function.Figure 13.8 Illustration: typical software architecture for a GSM BSC.Figure 13.9 GSM RRM logical object model and its hierarchy.

      14 Chapter 14Figure 14.1 Components of a 3GPP TS for a protocol layer.Figure 14.2 Illustration: protocol layer procedure's case value.Figure 14.3 Illustration: 5G registration request procedure with reject caus...Figure 14.4 Illustration: protocol layer procedure and its result: (a) norma...Figure 14.5 Illustration: flow of a 3GPP protocol layer procedure.Figure 14.6 Illustration: protocol layer and sublayer architecture of a logi...Figure 14.7 Illustration of various types of service primitives.Figure 14.8 Illustration: service access point (SAP) and identifier (SAPI)....Figure 14.9 Illustration: