Cutting-edge femtocell design and implementation techniques
This in-depth resource provides comprehensive coverage of femtocells and how they integrate with existing 3G and emerging wireless protocols and standards. Femtocells: Design & Application provides a technical roadmap for migrating to femtocell technology, covering network architecture, media protocols, system performance, and security issues. Detailed architectural diagrams illustrate various deployment options. This is a practical guide to the pioneering technology that enables extended indoor service coverage.
Femtocells: Design & Application covers:
- The impact on handset design with respect to cost, size, and power consumption
- Cellular candidate radio access technologies that aid in femtocell deployment, including 3GPP LTE
- System analysis, including indoor path loss models and 3GPP RF requirements
- Femtocell network architecture and analysis
- Registrations, call establishment, call release, and handoff scenarios
- VoIP and Session Initiation Protocol (SIP)
- Media protocols over IP
- Security vulnerabilities and solutions
- Managing Quality of Service in IP-based networks offering multimedia solutions
- 3GPP IP Multimedia Subsystem (IMS) network architecture
Author(s): Joseph Boccuzzi, Michael Ruggiero
Edition: 1
Publisher: McGraw-Hill Professional
Year: 2010
Language: English
Pages: 272
Tags: Связь и телекоммуникации;Мобильная связь;
Contents......Page 10
Introduction......Page 14
1 Femtocell Design......Page 16
1.1 The Femtocell Concept......Page 17
1.1.1 Market Overview and Direction......Page 22
1.1.2 Insights into the Cellular Roadmap......Page 23
1.2.1 Typical Deployment......Page 25
1.2.2 Advantages to the Femtocell User......Page 26
1.2.3 Advantages to the Network Provider......Page 29
1.3 Handset Impact......Page 30
1.3.1 Complexity Discussion......Page 32
1.3.2 Dual-Mode Designs (WLAN + Cellular)......Page 33
1.4.2 Femtocell Protocol Overview......Page 35
References......Page 37
2.1 WCDMA Overview......Page 38
2.1.2 Network Architecture......Page 40
2.1.3 HSPA Overview......Page 52
2.1.4 HSPA Evolution......Page 68
2.1.5 Long-Term Evolution (LTE) Overview......Page 73
References......Page 87
3.1 Deployment Scenarios......Page 88
3.1.1 Handoff Discussion......Page 90
3.2.1 Path Loss Model #1......Page 92
3.2.3 Path Loss Model #3......Page 93
3.2.5 Path Loss Model #5......Page 95
3.2.6 Path Loss Comparison......Page 96
3.3 Link Budget......Page 98
3.4 Example Capacity......Page 102
3.5.2 Frequency Bands......Page 103
3.5.3 Base Station Output Power......Page 104
3.5.5 Home Base Station Output Power for Adjacent Channel Protection......Page 105
3.6 Implementation Issues......Page 106
References......Page 109
4.1 Femtocell Reference Interfaces......Page 110
4.2 IMS Femtocell Architecture......Page 112
4.2.1 CDMA2000 Femtocells......Page 113
4.3 UMTS Femtocell Architecture......Page 129
4.3.1 UMTS Femtocell Signaling Protocols......Page 130
4.3.2 UMTS Femtocell Media Protocols......Page 131
4.3.4 HNB Registration......Page 132
4.3.5 User Endpoint Registration......Page 134
4.3.6 User Endpoint Call Origination over Iu-h......Page 135
4.4 LTE Femtocell Architecture......Page 137
4.5 Self-Organizing Femtocell Networks......Page 141
4.6 Femtozones......Page 142
References......Page 143
5.1 Why VoIP......Page 144
5.2.1 VoIP Termination-Based Signaling Protocols......Page 146
5.2.3 H.323......Page 159
5.2.5 SIP Details......Page 160
5.2.6 Session Description Protocol (SDP)......Page 169
5.2.7 SIP Offer/Answer Model......Page 171
References......Page 174
6.1 Voice Codecs......Page 176
6.1.1 PCM (Pulse Code Modulation)......Page 177
6.1.2 G.711 A-Law and μ-Law Companding......Page 178
6.1.4 AMR-WB (Adaptive Multirate Compression Wide Band)......Page 179
6.1.5 G.718......Page 180
6.2 Video Codecs......Page 181
6.2.1 MPEG......Page 183
6.2.2 H.261, H.262, H.263......Page 184
6.3 Text Encoding......Page 185
6.3.2 Instant Messaging......Page 186
6.3.3 MSRP......Page 187
6.3.4 Text over IP......Page 188
6.4.1 RTP......Page 191
6.4.2 RTCP......Page 193
6.4.3 SRTP/SRCTP......Page 194
References......Page 195
7.1 Femtocell Security Vulnerabilities......Page 198
7.2.1 Authentication Header (AH)......Page 200
7.2.2 Encapsulating Security Payload (ESP)......Page 203
7.3 Cryptographic Hash Algorithms......Page 206
7.4 Air Interface Ciphers......Page 208
7.4.1 Block Ciphers......Page 209
7.6 IKE......Page 210
7.7 UICC......Page 213
References......Page 214
8 Quality of Service......Page 216
8.1.1 Policy Servers......Page 217
8.2 Integrated Services......Page 218
8.2.1 RSVP......Page 219
8.3 DiffServ......Page 221
8.4 IntServ and DiffServ Compared......Page 223
8.5 Layer 2 QoS......Page 224
8.6 CAC......Page 225
8.7 Traffic Controls......Page 226
8.8 GPRS QoS......Page 230
References......Page 232
9.1 IMS History......Page 234
9.2.1 Access Network......Page 235
9.2.2 IMS Core......Page 236
9.2.3 Home vs. Visited Network Components......Page 245
9.3 IMS Interfaces......Page 246
9.4.1 Registration Procedure......Page 248
9.4.3 IMS Basic Call......Page 251
9.4.4 Ringing/PRACK/200 OK Exchanged......Page 256
9.4.5 Sample SIP Register Message......Page 261
9.4.6 Sample SIP INVITE Message......Page 262
References......Page 263
A......Page 264
D......Page 265
F......Page 266
H......Page 267
M......Page 268
P......Page 269
R......Page 270
T......Page 271
X......Page 272