Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Mastering 5G Network Design, Implementation, and Operations
  • Table Of Contents Toc
  • Feedback & Rating feedback
Mastering 5G Network Design, Implementation, and Operations

Mastering 5G Network Design, Implementation, and Operations

By : Shyam Varan Nath, Ananya Simlai, Oğuzhan Kara
4.6 (8)
close
close
Mastering 5G Network Design, Implementation, and Operations

Mastering 5G Network Design, Implementation, and Operations

4.6 (8)
By: Shyam Varan Nath, Ananya Simlai, Oğuzhan Kara

Overview of this book

We are living in an era where ultra-fast internet speed is not a want, but a necessity. As applications continue to evolve, they demand a reliable network with low latency and high speed. With the widespread commercial adoption of driverless cars, robotic factory floors, and AR/VR-based immersive sporting events, speed and reliability are becoming more crucial than ever before. Fortunately, the power of 5G technology enables all this and much more. This book helps you understand the fundamental building blocks that enable 5G technology. You’ll explore the unique aspects that make 5G capable of meeting high-quality demands, including technologies that back 5G, enhancements in the air interface, and packet core, which come together to create a network with unparalleled performance. As you advance, you’ll discover how to design and implement both 5G macro and private networks, while also learning about the various design and deployment options available and which option is best suited for specific use cases. After that, you’ll check out the operational and maintenance aspects of such networks and how 5G works together with fixed wireline and satellite technologies. By the end of this book, you’ll understand the theoretical and practical aspects of 5G, enabling you to use it as a handbook to establish a 5G network.
Table of Contents (23 chapters)
close
close
1
Part 1:Introduction to 5G
Free Chapter
2
Chapter 1: Introduction to 5G
10
Part 2:5G Network Design, Deployment Models, and Advanced Use Cases

FMC security considerations

Let us look at the security considerations for FMC. Potential adopters of FMC, especially enterprise users, often ask whether having their data travel wirelessly over long distances makes it more vulnerable to cybersecurity breaches. Once the data leaves the enterprise wired network and enters the 4G or 5G wireless network, it relies on the encryption of the wireless network.

Let us look at the potential security risks of FMC. Overall, cybersecurity risks for mobile operators are on the rise. In July 2022, the French mobile operator La Poste Mobile experienced a ransomware attack. La Poste Mobile was a victim of the LockBit ransomware operation (see https://cybersecurityworldconference.com/2022/07/10/french-telephone-operator-la-poste-mobile-suffered-a-ransomware-attack for more details).

Since FMC depends on many protocols and technologies, such as SIP and UMA, it is dependent on the underlying security of those technologies.

SIP security

SIP...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY