Home Page Icon
Home Page
Table of Contents for
Table of Contents
Close
Table of Contents
by Juho Pirskanen, Rainer Liebhart, Devaki Chandramouli
5G for the Connected World
Cover
About the Editors
List of Contributors
Foreword by Tommi Uitto
Foreword by Karri Kuoppamaki
Preface
Acknowledgements
Introduction
Terminology
1 Drivers and Motivation for 5G
1.1 Drivers for 5G
1.2 ITU‐R and IMT 2020 Vision
1.3 NGMN (Next Generation Mobile Networks)
1.4 5GPPP (5G Public‐Private Partnership)
1.5 Requirements for Support of Known and New Services
1.6 5G Use Cases
1.7 Business Models
1.8 Deployment Strategies
1.9 3GPP Role and Timelines
References
2 Wireless Spectrum for 5G
2.1 Current Spectrum for Mobile Communication
2.2 Spectrum Considerations for 5G
2.3 Identified New Spectrum
2.4 Spectrum Regulations
2.5 Characteristics of Spectrum Available for 5G
2.6 NR Bands Defined by 3GPP
References
3 Radio Access Technology
3.1 Evolution Toward 5G
3.2 Basic Building Blocks
3.3 Downlink Physical Layer
3.4 Uplink Physical Layer
3.5 Radio Protocols
3.6 Mobile Broadband
References
4 Next Generation Network Architecture
4.1 Drivers and Motivation for a New Architecture
4.2 Architecture Requirements and Principles
4.3 5G System Architecture
4.4 NG RAN Architecture
4.5 Non‐Standalone and Standalone Deployment Options
4.6 Identifiers
4.7 Network Slicing
4.8 Multi‐Access Edge Computing
4.9 Data Storage Architecture
4.10 Network Capability Exposure
4.11 Interworking and Migration
4.12 Non‐3GPP Access
4.13 Fixed Mobile Convergence
4.14 Network Function Service Framework
4.15 IMS Services
4.16 Emergency Services
4.17 Location Services
4.18 Short Message Service
4.19 Public Warning System
4.20 Protocol Stacks
4.21 Charging
4.22 Summary and Outlook of 5G System Features
4.23 Terminology and Definitions
References
5 Access Control and Mobility Management
5.1 General Principles
5.2 Mobility States and Functionalities
5.3 Initial Access and Registration
5.4 Connected Mode Mobility
5.5 Idle Mode mobility and UE Reachability
5.6 RRC Inactive State mobility and UE Reachability
5.7 Beam Level Mobility
5.8 Support for High Speed Mobility
5.9 Support for Ultralow Latency and Reliable Mobility
5.10 UE Mobility Restrictions and Special Modes
5.11 Inter‐System (5GS‐EPS) Mobility
5.12 Outlook
References
6 Sessions, User Plane, and QoS Management
6.1 Introduction
6.2 Basic Principles of PDU Sessions
6.3 Ultra‐reliable Low Latency Communication
6.4 QoS Management in 5GS
6.5 User Plane Transport
6.6 Policy Control and Application Impact on Traffic Routing
6.7 Session Management
6.8 SMF Programming UPF Capabilities
References
7 Security
7.1 Drivers, Requirements and High‐Level Security Vision
7.2 Overall 5G Security Architecture
7.3 3GPP Specific Security Mechanisms
7.4 SDN Security
7.5 NFV Security
7.6 Network Slicing Security
7.7 Private Network Infrastructure
References
8 Critical Machine Type Communication
8.1 Introduction
8.2 Key Performance Indicators
8.3 Solutions
References
9 Massive Machine Type Communication and the Internet of Things
9.1 Massive M2M Versus IoT
9.2 Requirements and Challenges
9.3 Technology Evolution
9.4 EPS Architecture Evolution
9.5 Cellular Internet of Things
9.6 GERAN
9.7 LTE‐M
9.8 NB‐IoT
9.9 5G for M2M
9.10 Comparison of EPS and 5GS
9.11 Future Enhancements
9.12 Other Technologies
References
10 Summary and Outlook
10.1 Summary
10.2 Outlook
Appendix of 3GPP Reference Points
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover
Next
Next Chapter
Title Page
Table of Contents
Cover
About the Editors
List of Contributors
Foreword by Tommi Uitto
Foreword by Karri Kuoppamaki
Preface
Acknowledgements
Introduction
Terminology
1 Drivers and Motivation for 5G
1.1 Drivers for 5G
1.2 ITU‐R and IMT 2020 Vision
1.3 NGMN (Next Generation Mobile Networks)
1.4 5GPPP (5G Public‐Private Partnership)
1.5 Requirements for Support of Known and New Services
1.6 5G Use Cases
1.7 Business Models
1.8 Deployment Strategies
1.9 3GPP Role and Timelines
References
2 Wireless Spectrum for 5G
2.1 Current Spectrum for Mobile Communication
2.2 Spectrum Considerations for 5G
2.3 Identified New Spectrum
2.4 Spectrum Regulations
2.5 Characteristics of Spectrum Available for 5G
2.6 NR Bands Defined by 3GPP
References
3 Radio Access Technology
3.1 Evolution Toward 5G
3.2 Basic Building Blocks
3.3 Downlink Physical Layer
3.4 Uplink Physical Layer
3.5 Radio Protocols
3.6 Mobile Broadband
References
4 Next Generation Network Architecture
4.1 Drivers and Motivation for a New Architecture
4.2 Architecture Requirements and Principles
4.3 5G System Architecture
4.4 NG RAN Architecture
4.5 Non‐Standalone and Standalone Deployment Options
4.6 Identifiers
4.7 Network Slicing
4.8 Multi‐Access Edge Computing
4.9 Data Storage Architecture
4.10 Network Capability Exposure
4.11 Interworking and Migration
4.12 Non‐3GPP Access
4.13 Fixed Mobile Convergence
4.14 Network Function Service Framework
4.15 IMS Services
4.16 Emergency Services
4.17 Location Services
4.18 Short Message Service
4.19 Public Warning System
4.20 Protocol Stacks
4.21 Charging
4.22 Summary and Outlook of 5G System Features
4.23 Terminology and Definitions
References
5 Access Control and Mobility Management
5.1 General Principles
5.2 Mobility States and Functionalities
5.3 Initial Access and Registration
5.4 Connected Mode Mobility
5.5 Idle Mode mobility and UE Reachability
5.6 RRC Inactive State mobility and UE Reachability
5.7 Beam Level Mobility
5.8 Support for High Speed Mobility
5.9 Support for Ultralow Latency and Reliable Mobility
5.10 UE Mobility Restrictions and Special Modes
5.11 Inter‐System (5GS‐EPS) Mobility
5.12 Outlook
References
6 Sessions, User Plane, and QoS Management
6.1 Introduction
6.2 Basic Principles of PDU Sessions
6.3 Ultra‐reliable Low Latency Communication
6.4 QoS Management in 5GS
6.5 User Plane Transport
6.6 Policy Control and Application Impact on Traffic Routing
6.7 Session Management
6.8 SMF Programming UPF Capabilities
References
7 Security
7.1 Drivers, Requirements and High‐Level Security Vision
7.2 Overall 5G Security Architecture
7.3 3GPP Specific Security Mechanisms
7.4 SDN Security
7.5 NFV Security
7.6 Network Slicing Security
7.7 Private Network Infrastructure
References
8 Critical Machine Type Communication
8.1 Introduction
8.2 Key Performance Indicators
8.3 Solutions
References
9 Massive Machine Type Communication and the Internet of Things
9.1 Massive M2M Versus IoT
9.2 Requirements and Challenges
9.3 Technology Evolution
9.4 EPS Architecture Evolution
9.5 Cellular Internet of Things
9.6 GERAN
9.7 LTE‐M
9.8 NB‐IoT
9.9 5G for M2M
9.10 Comparison of EPS and 5GS
9.11 Future Enhancements
9.12 Other Technologies
References
10 Summary and Outlook
10.1 Summary
10.2 Outlook
Appendix of 3GPP Reference Points
Index
End User License Agreement
List of Tables
Chapter 1
Table 1.1 User experience requirements.
Table 1.2 System performance requirements.
Table 1.3 Performance requirements for time critical communication.
Table 1.4 Performance requirements for high data rate and traffic density scenar...
Table 1.5 Performance requirements for vehicles platooning.
Table 1.6 Performance requirements for advanced driving.
Table 1.7 Performance requirements for extended sensors.
Table 1.8 Performance requirements for remote driving.
Table 1.9 3GPP milestones up to Release 16.
Chapter 2
Table 2.1 Frequency bands studied for WRC‐19 and allocated for mobile service on...
Table 2.2 Frequency bands studied for WRC‐19 and not allocated for mobile servic...
Table 2.3 Main license‐exempt spectrum.
Table 2.4 Mean EIRP (Equivalent Isotropic Radiated Power) limits for RF output p...
Table 2.5 Material penetration losses.
Table 2.6 Operating bands for NR at below 6 GHz defined in 3GPP Rel‐15.
Table 2.7 Operating bands for NR above 6 GHz defined in 3GPP Rel‐15.
Chapter 3
Table 3.1 Subcarrier spacing, nominal BW and frequency range.
Table 3.2 Implementation for single code rate and block size.
Table 3.3 Implementations for multiple code rates and block sizes.
Table 3.4 NR LDPC base graphs.
Table 3.5 Sets of LDPC lifting size.
Table 3.6 SS Block subcarrier spacings in given bands.
Table 3.7 PBCH content.
Table 3.8 Physical channels for messages in NR RACH procedure.
Table 3.9 Long sequence PRACH preambles.
Table 3.10 Base formats for short sequence‐based PRACH preambles.
Table 3.11 Number of RACH occasions within a slot.
Table 3.12 Supported header compression protocols and profiles.
Chapter 4
Table 4.1 NF types in terms of states.
Table 4.2 Used terminology.
Table 4.3 NF services provided by AMF.
Table 4.4 NF services provided by SMF.
Table 4.5 NF services provided by UDM.
Table 4.6 NF services provided by NRF.
Chapter 5
Table 5.1 Characteristics of RRC states in 5G.
Chapter 6
Table 6.1 Delay critical 5QI QoS characteristics.
Chapter 8
Table 8.1 Low latency and high reliability use cases.
Table 8.2 List of technology components for latency reduction.
Table 8.3 OFDM numerologies for 5G NR (normal CP length).
Table 8.4 Reduced processing time for slot‐based scheduling.
Table 8.5 Standardized delay critical 5G QoS values.
Table 8.6 List of technology components for enhancing reliability.
Table 8.7 SINR gain due to higher AL with 40‐bit DCI.
Table 8.8 Simulation parameters for compact DCI.
Table 8.9 SINR gain with 30‐bit DCI versus 40‐bit DCI.
Table 8.10 Overall error probability for different options of PDCCH repetition.
Chapter 9
Table 9.1 Radio and system architecture feature evolution for M2M.
Table 9.2 Set of logical channels for EC‐GSM‐IoT.
Table 9.3 CC parameters for EC‐GSM‐IoT packet traffic channel.
Table 9.4 CC parameters for EC‐GSM‐IoT DL common control channels (sent in TN 1,...
Table 9.5 CC parameters for EC‐GSM‐IoT UL common control channel (single timeslo...
Table 9.6 Radio parameters of DL channels for EC‐GSM‐IoT network synchronization...
Table 9.7 Coverage enhancement modes A and B.
Table 9.8 LTE‐M link budget.
Table 9.9 NB‐IoT channels and signals.
Table 9.10 Number of signalling messages for NB‐IoT data transmission.
Table 9.11 NB‐IoT link budget for in‐band deployment mode.
Table 9.12 Other technologies for M2M/IoT.
List of Illustrations
Chapter 1
Figure 1.1 Market characteristics (people and things).
Figure 1.2 IMT 2020 usage scenarios.
Figure 1.3 5G use case categories.
Figure 1.4 FWA using cmWave or mmWave 5G radio.
Figure 1.5 5G for in‐vehicle infotainment.
Figure 1.6 5G for truck platooning.
Figure 1.7 5G for Industry 4.0.
Figure 1.8 Non‐standalone and standalone deployment options.
Figure 1.9 3GPP organizational structure.
Figure 1.10 3GPP timeline for 5G.
Chapter 2
Figure 2.1 Data usage per mobile broadband subscription – average volume for OE...
Figure 2.2 METIS‐II concept for spectrum management and sharing for 5G mobile n...
Figure 2.3 Definition of distances for pathloss models.
Chapter 3
Figure 3.1 Data rate evolution from 3GPP UMTS Release '99 to 3GPP LTE Release ...
Figure 3.2 KT 5G‐SIG user plane protocol architecture [9].
Figure 3.3 5G‐TF system architecture.
Figure 3.4 Bi‐direction frame type in KT 5G‐SIG and 5GTF.
Figure 3.5 Conventional CP‐OFDMA transmitter block diagram.
Figure 3.6 Example PSD realizations for different waveform candidates.
Figure 3.7 Transmitter unit test setup.
Figure 3.8 Receiver unit test setup.
Figure 3.9 Spectrum allocation on 2.6 GHz in Germany.
Figure 3.10 Bi‐directional slot with DL symbol, flexible symbols and UL symbol.
Figure 3.11 System bandwidth, initial BWP and configured BWP.
Figure 3.12 Digital baseband beamforming architecture, with K input streams and...
Figure 3.13 RF beamforming architecture, with B input streams with B Transmitte...
Figure 3.14 Hybrid beamforming architecture, with B input streams with B Transm...
Figure 3.15 Tanner graph for parity check matrix in Eq. (3.1).
Figure 3.16 Dimensions of LDPC base graphs.
Figure 3.17 Coding chain for LDPC.
Figure 3.18 Basic building block of polar codes.
Figure 3.19 Encoding graph of length‐4 polar codes.
Figure 3.20 Coding chain of the NR polar coding.
Figure 3.21 SS Block structure.
Figure 3.22 PSS time and frequency offset ambiguity of (a) LTE PSS sequence (le...
Figure 3.23 Detection latency for LTE and NR for 5 ms PSS/SSS transmission peri...
Figure 3.24 Detection latency for LTE and NR when LTE is having 5 ms and NR 20 ...
Figure 3.25 DMRS mapping on REs in an PRB based on Physical Cell ID.
Figure 3.26 SS Block positions within a slot as a function of SS Block subcarri...
Figure 3.27 SS Block positions within a slot as a function of SS Block subcarri...
Figure 3.28 Time multiplexing of SS Block and RMSI transmission.
Figure 3.29 Option (a) Frequency multiplexing of SS Block and RMSI transmission...
Figure 3.30 Option (b) Frequency multiplexing of SS Block and RMSI transmission...
Figure 3.31 PRACH preamble formats A1 with two different starting symbols withi...
Figure 3.32 Control plane protocol stack.
Figure 3.33 User plane protocol stack.
Figure 3.34 MgNB bearers for dual connectivity [36].
Figure 3.35 Downlink logical channel mapping to transport channels.
Figure 3.36 Uplink logical channel mapping to transport channels.
Figure 3.37 MAC PDU structure in DL.
Figure 3.38 MAC PDU structure in UL.
Figure 3.39 MAC sub‐header structures.
Figure 3.40 Beam failure detection principle.
Figure 3.41 Beam failure recovery principle.
Figure 3.42 RLC SDU segmentation into RLC PDUs.
Figure 3.43 Wall penetration loss for O2I below 6GHz.
Figure 3.44 Wall penetration loss for O2I at mmWave frequencies.
Chapter 4
Figure 4.1 Architecture domains.
Figure 4.2 Flexible connectivity model.
Figure 4.3 Service based architecture – use of service discovery.
Figure 4.4 Exposure control.
Figure 4.5 RAN architecture principles.
Figure 4.6 Inter system, multi‐access interworking view.
Figure 4.7 Non‐roaming 5G system architecture.
Figure 4.8 Roaming 5G system architecture with local breakout.
Figure 4.9 5G core with SBA framework.
Figure 4.10 Compute and storage separation – data storage architecture.
Figure 4.11 5G RAN scenarios.
Figure 4.12 5G RAN functional architecture.
Figure 4.13 NG‐RAN architecture.
Figure 4.14 Logical NG‐RAN architecture with split options.
Figure 4.15 Lower‐layer split architecture and options.
Figure 4.16 Service‐aware placement of RAN functions.
Figure 4.17 Control‐plane architecture for MR‐DC with 5GC or EPC connectivity.
Figure 4.18 Control‐plane and user‐plane interfaces for MR‐DC with 5GC or EPC c...
Figure 4.19 User‐plane architecture for MR‐DC and EN‐DC.
Figure 4.20 3GPP Option 2 NR standalone architecture with 5G Core.
Figure 4.23 3GPP Option 7 E‐UTRA non‐standalone architecture with 5G Core.
Figure 4.24 NR non‐standalone architecture with EPS (also referred to as Option...
Figure 4.25 User plane architecture options.
Figure 4.26 Network slices.
Figure 4.27 Network slice with 5G system.
Figure 4.28 Network slice selection call flow.
Figure 4.29 Interworking between (e)Decor and 5G slicing.
Figure 4.30 Interworking between APN and 5G slicing.
Figure 4.31 Multi‐access edge computing framework.
Figure 4.32 Session establishment and initial UPF selection.
Figure 4.33 Reselection of UPF and application following UE mobility.
Figure 4.34 No state NF.
Figure 4.35 Stateless NFs.
Figure 4.36 State‐efficient NFs.
Figure 4.37 Stateful NFs.
Figure 4.38 AMF structure.
Figure 4.39 Routing N1/N2 messages to any AMF.
Figure 4.40 Network capability exposure with bulk subscription.
Figure 4.41 EPS to 5GS migration.
Figure 4.42 EPS to 5GS migration – system selection and routing.
Figure 4.43 5GS‐EPS interworking architecture.
Figure 4.44 Single registration mode UE.
Figure 4.45 Dual registration mode UE.
Figure 4.46 UE and network support.
Figure 4.47 5G common (multi‐access) core.
Figure 4.48 Establishment of the signaling connectivity between a UE and the 5G...
Figure 4.49 FMC use cases.
Figure 4.50 Integration of wireline access into the 5G Core.
Figure 4.51 NF and NF service.
Figure 4.52 NF, NF service and NF service operation.
Figure 4.53 System procedures and NF services.
Figure 4.54 Self‐contained service.
Figure 4.55 Re‐usable services.
Figure 4.56 Request‐Response NF service illustration.
Figure 4.57 Subscribe‐Notify NF service illustration 1.
Figure 4.58 Subscribe‐Notify NF service illustration 2.
Figure 4.59 Network function discovery framework.
Figure 4.60 System fallback toward E‐UTRAN/EPC (EPS fallback).
Figure 4.61 RAT fallback toward E‐UTRA/5GC.
Figure 4.62 Non‐roaming location services architecture.
Figure 4.63 Non‐roaming architecture for SMS over NAS.
Figure 4.64 PWS architecture.
Figure 4.65 NGAP protocol stack.
Figure 4.66 Control plane between AN and SMF.
Figure 4.67 NAS transport for SM, SMS and other services.
Figure 4.68 Control plane before the signaling IPsec SA is established between ...
Figure 4.69 Control plane after the signaling IPsec SA is established between U...
Figure 4.70 Control plane for establishment of user‐plane via N3IWF.
Figure 4.71 User plane protocol stack.
Figure 4.72 User plane protocol stack for untrusted non‐3GPP access.
Figure 4.73 NG‐RAN user plane protocol stack for gNB with F1 interface.
Figure 4.74 NG‐RAN user plane protocol stack for MN/SN in dual connectivity mod...
Figure 4.75 AS and NAS layer.
Chapter 5
Figure 5.1 States in the MM sublayer.
Figure 5.2 States for the CM.
Figure 5.3 States in the SM sublayer.
Figure 5.4 Traffic pattern illustration.
Figure 5.5 5G RRC state machine and state transitions.
Figure 5.6 5G RRC state machine embedded with NAS State machine.
Figure 5.7 UE states and state transitions for NR and interworking with E‐UTRA.
Figure 5.8 Initial registration procedure (UE context not fetched from another ...
Figure 5.9 Initial registration procedure (UE context fetched from the old AMF)...
Figure 5.10 Inter‐gNB‐DU mobility using SCG SRB (SRB3) for intra‐NR.
Figure 5.11 Inter‐gNB‐DU mobility using MCG SRB in EN‐DC.
Figure 5.12 Change of SN – MN initiated.
Figure 5.13 Change of SN – SN initiated.
Figure 5.14 SN change procedure – MN initiated.
Figure 5.15 SN change procedure – SN initiated.
Figure 5.16 MN initiated inter‐MN handover with or without SN change.
Figure 5.17 Inter‐MN handover with/without MN initiated SN change procedure.
Figure 5.18 Master node to eNB change procedure.
Figure 5.19 MN to ng‐eNB/gNB change procedure.
Figure 5.20 Xn based inter NG‐RAN handover.
Figure 5.21 Inter NG‐RAN node N2 based handover.
Figure 5.22 Conditional handover.
Figure 5.23 Registration procedure due to mobility or periodic update.
Figure 5.24 Paging procedure.
Figure 5.25 Configuration of a RRC inactive state.
Figure 5.26 Received signal shadowing when the UE passes a street corner at 30 ...
Figure 5.27 A multi‐connected UE executing make‐before‐break handover while hav...
Figure 5.28 Mobility of a multi‐connected UE consisting of two independent laye...
Figure 5.29 Inter‐system change for a UE operating in single registration mode.
Figure 5.30 Inter‐system change for a UE operating in dual registration mode.
Chapter 6
Figure 6.1 5GS user plane – a PDU Session topology example.
Figure 6.2 5G PDU Session management – impacted interfaces (as seen from SMF an...
Figure 6.3 5G User plane – multiple concurrent (e.g. local/central) access to t...
Figure 6.4 Uplink classifier solution for multiple concurrent access to the sam...
Figure 6.5 IPv6 multi‐homing solution for multiple concurrent access to the sam...
Figure 6.6 Home routed roaming mode for a PDU Session.
Figure 6.7 Local breakout roaming mode for a PDU Session.
Figure 6.8 User plane architecture and user plane topology.
Figure 6.9 5G flow based QoS framework.
Figure 6.10 Controlling UL user plane QoS.
Figure 6.11 N3 backhaul transparently carries traffic of different PDU Session ...
Figure 6.12 High‐level call flow for PDU Session establishment.
Chapter 7
Figure 7.1 Stakeholders providing 5G services.
Figure 7.2 5G high‐level security vision.
Figure 7.3 Elements of a 5G security architecture.
Figure 7.4 Mutual authentication between UE and network using EAP‐AKA′.
Figure 7.5 Mutual authentication between UE and network using 5G AKA.
Figure 7.6 5G key hierarchy.
Figure 7.7 SDN security mechanisms.
Chapter 8
Figure 8.1 V2X communication and Edge Clouds.
Figure 8.2 Example procedure for DL data transmission.
Figure 8.3 Reliability regions for downlink scheduling‐based data transmissions...
Figure 8.4 Logical network view with Edge and Telco Clouds.
Figure 8.5 Network distances.
Figure 8.6 Low latency configuration.
Figure 8.7 Micro‐operator network for verticals.
Figure 8.8 MEC platform architecture.
Figure 8.9 Flexible slot structure in 5G NR.
Figure 8.10 Mini‐slot PDSCH scheduling.
Figure 8.11 Resource allocation framework for URLLC and eMBB multiplexing: down...
Figure 8.12 Example of preemptive scheduling.
Figure 8.13 Pause‐resume scheduling mechanism in uplink.
Figure 8.14 Example of multiple SR resource configuration.
Figure 8.15 URLLC transmission with UL grant free resource.
Figure 8.16 Intra‐UE puncturing.
Figure 8.17 UL grant free transmission.
Figure 8.18 UDSF as part of the 5G core architecture.
Figure 8.19 Example of micro‐diversity operation.
Figure 8.20 Example of baseline transmission and joint‐transmission: (a) baseli...
Figure 8.21 Performance comparison between baseline (regular unicast based tran...
Figure 8.22 Illustration of decoding ACK/NACK signals.
Figure 8.23 Performance of CQI report.
Figure 8.24 Example of DL HARQ processing with multi‐slot scheduling (Option 1)...
Figure 8.25 Example of individual scheduling for each blind repetition independ...
Figure 8.26 Reliable transmission of DL assignment information (Option 3).
Figure 8.27 PDCCH repetition before data transmission (Option 4).
Figure 8.28 Error probability for PDSCH decoding.
Figure 8.29 Example of UL HARQ processing.
Figure 8.30 Example of UL HARQ processing with multi‐slot scheduling.
Figure 8.31 Example of DL HARQ processing with multi‐slot scheduling.
Figure 8.32 Example of make‐before‐break handover.
Chapter 9
Figure 9.1 System architecture feature evolution for M2M.
Figure 9.2 MTC architecture.
Figure 9.3 SMS in MME architecture.
Figure 9.4 CIoT architecture.
Figure 9.5 Control plane data over SCEF or P‐GW.
Figure 9.6 C‐plane via SCEF.
Figure 9.7 User plane CIoT EPS optimization.
Figure 9.8 Connection suspend procedure according 3GPP TS 23.401.
Figure 9.9 Connection resume procedure according 3GPP TS 23.401.
Figure 9.10 SMS data path.
Figure 9.11 UE requesting coverage enhancement.
Figure 9.12 Reliable data service.
Figure 9.13 MBMS delivery to UEs with non‐synchronous power saving cycles.
Figure 9.14 QoS differentiation.
Figure 9.15 Control plane overload control.
Figure 9.16 Illustration of the application of coverage classes in a sensitivit...
Figure 9.17 Burst phase shift on UL for overlaid CDMA (examples of multiplexing...
Figure 9.18 LTE‐M downlink operation.
Guide
Cover
Table of Contents
Begin Reading
Pages
iii
vi
xvii
xviii
xix
xx
xxi
xxii
xxiii
xxv
xxvi
xxvii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
xxxix
xl
xli
xlii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset