2 Chapter 2Figure 2.1 Representation of multiple KPIs of 6G use cases and improvements ...
3 Chapter 3Figure 3.1 IMTs and different generations of mobile network technology.Figure 3.2 3GPP alignment with IMT‐2030.
4 Chapter 4Figure 4.1 The EE of ultradense networks with directional transmissions. The...Figure 4.2 (left) Reinforcement learning formulation of BS sleeping control ...Figure 4.3 Improve the EE via VNF consolidation and SFC migration.Figure 4.4 Accuracy of the energy‐efficient model aggregation policy propose...Figure 4.5 An illustration of joint pruning and model partition for co‐infer...
5 Chapter 6Figure 6.1 Potential applications of “intelligent” reflectors.Figure 6.2 RIS‐enhanced network coverage.Figure 6.3 Planar structures classified by homogenization property. Here, a ...Figure 6.4 Data rate of RISs and relays versus the transmission distance....Figure 6.5 Data rate of RISs and relays versus the size of the RIS.Figure 6.6 The RFocus prototype surface. Source: Arun [63].Figure 6.7 The ScatterMIMO hardware prototype. Source: [27].Figure 6.8 Aalto‐fabricated metasurface. Source: [23].Figure 6.9 DOCOMO prototype of transparent dynamic metasurface. Source: [28]...
6 Chapter 7Figure 7.1 Vision of the EU‐Project 6G‐BRAINS for THz applications in the in...Figure 7.2 Schematic representation of various approaches to handle the path...Figure 7.3 A 200 GHz channel measurement result in a meeting room at TU Ilme...
7 Chapter 8Figure 8.1 Satellite access network with 5G NR direct access to VSAT termina...Figure 8.2 Satellite with on‐board processor, supporting beamforming.Figure 8.3 ITU‐T Focus Group Technologies for Network 2030 (FG NET‐2030) vis...Figure 8.4 Heterogeneous network including various different ground, airborn...Figure 8.5 Total degradation of a single 5G NR downlink carrier over a satel...
8 Chapter 9Figure 9.1 The media evolution.Figure 9.2 Evolution of the edge computing architecture.Figure 9.3 New challenges for the IP network.Figure 9.4 Technique to guarantee deterministic performance at each layer.Figure 9.5 Coexistence of multiple namespaces in the Open Generalized Addres...Figure 9.6 The interconnection of heterogeneous networks with hierarchical a...
9 Chapter 11Figure 11.1 Automated service delivery procedure.Figure 11.2 Roles of and interactions between tenants of a multi‐domain serv...Figure 11.3 Using the IPv6 Address‐Specific Extended Community attribute to ...Figure 11.4 Multi‐domain service subscription framework with “n” business pa...Figure 11.5 Interfaces of a business owner’s computation logic.Figure 11.6 SFC‐based multi‐domain service traffic forwarding.
10 Chapter 12Figure 12.1 Revolutionary evolution of radio access networks.Figure 12.2 C‐RAN architecture [12].Figure 12.3 xHaul split options [17].Figure 12.4 FH and MH for a 5G gNB [18].Figure 12.5 Fog arch [24].Figure 12.6 New framework of radio access network [5].Figure 12.7 Network function virtualization (NFV) [27].Figure 12.8 (a) WAIA architecture of wireless big data analytics [29]. (b) O...Figure 12.9 The application realms and use cases of RAN intelligence.Figure 12.10 The AI‐embedded RAN architecture.Figure 12.11 The non‐RT RAN intelligent controller.Figure 12.12 The near‐RT RAN intelligent controller.Figure 12.13 O‐RAN overall logical architecture.Figure 12.14 Open‐source projects for edge and radio access network.Figure 12.15 Relationship between OSC projects and O‐RAN architecture compon...
11 Chapter 13Figure 13.1 Technology evolution triggers enabling a new extensive data laye...Figure 13.2 Major requirements of a 6G data layer.Figure 13.3 Data layer: a new middleware between the active systems and thei...Figure 13.4 Major benefits of the 6G data layer.Figure 13.5 Data layer high‐level functionality.
12 Chapter 14Figure 14.1 Collaborative compressive classification, where a scene is perce...Figure 14.2 Top: Reconstruction of a continuous loss map (right) from a spar...Figure 14.3 Quantizing three‐dimensional positions of scattering events impl...Figure 14.4 Strength of field for non‐line‐of‐sight paths visualized on a us...
13 Chapter 15Figure 15.1 O‐RAN architecture.
14 Chapter 16Figure 16.1 Hierarchical operating complex: message transmission and communi...Figure 16.2 Communication model for (a) Shannon’s scheme and (b) the identif...Figure 16.3 Geometric illustration of the classical message transmission. Th...Figure 16.4 Geometric illustration of the message identification paradigm wi...Figure 16.5 Geometric illustration of correct identification and type I and ...Figure 16.6 Illustration of a block code. Messages of k symbols are encoded ...Figure 16.7 Transmission of an identity over a channel.Figure 16.8 Wiretap channel model. An eavesdropper does not reduce the ident...Figure 16.9 CR are resources generated by observing a random experiment. The...Figure 16.10 System model of a sender–receiver pair that communicates over a...Figure 16.11 In the presence of the post‐Shannon resource of CR, a jammer ca...Figure 16.12 Transmission concept for the medium is the message as introduce...
Guide
6 Foreword Henning Schulzrinne
9 Acronyms
12 Index
13 Wiley End User License Agreement
Pages
1 iii
2 iv
3 xiii
4 xiv
5 xv
6 xvi
7 xvii