¿Ü±¹µµ¼
´ëÇб³Àç/Àü¹®¼Àû
±â¼ú°úÇÐ ÀϹÝ
2013³â 9¿ù 9ÀÏ ÀÌÈÄ ´©Àû¼öÄ¡ÀÔ´Ï´Ù.
Á¤°¡ |
139,000¿ø |
---|
139,000¿ø
4,170P (3%Àû¸³)
ÇÒÀÎÇýÅÃ | |
---|---|
Àû¸³ÇýÅà |
|
|
|
Ãß°¡ÇýÅÃ |
|
À̺¥Æ®/±âȹÀü
¿¬°üµµ¼
»óÇ°±Ç
ÀÌ»óÇ°ÀÇ ºÐ·ù
¸ñÂ÷
1. Introduction 1
1.1 5G-A new era of connectivity 1
1.2 A step change 1
1.3 A new context for operators 2
1.4 The road to 5G network deployments 2
1.5 3GPP release 15 and 16 2
1.6 Core requirements 4
1.7 New service grades 4
1.8 Structure of this book 5
2. Drivers for 5G 7
2.1 Introduction 7
2.2 New use cases 7
2.3 New technologies 9
3. Architecture overview 15
3.1 Introduction 15
3.2 Two perspectives on 5G Core 19
3.3 Service-based architecture (SBA) 22
3.4 The core of the core 26
3.5 Connecting the core network to mobile devices and radio networks 28
3.6 Mobility and data connectivity 30
3.7 Policy control and charging 35
3.8 5GC interworking with EPC 37
3.9 Voice services 41
3.10 Messaging services 44
3.11 Exposure of network information 46
3.12 Device positioning services 48
3.13 Network analytics 49
3.14 Public warning system 50
3.15 Support for devices connected over non-3GPP access networks 52
3.16 Network slicing 54
3.17 Roaming 55
3.18 Storage of data 59
3.19 5G radio networks 59
4. EPC for 5G 73
4.1 Introduction 73
4.2 Key EPC functions 77
4.3 (Enhanced) Dedicated Core Networks ((e)DECOR) 84
4.4 Control and User Plane Separation (CUPS) 89
5. Key concepts 105
5.1 Architecture modeling 105
5.2 Service Based Architecture 105
5.3 Identifiers 107
6. Session management 111
6.1 PDU Session concepts 111
6.2 PDU Session types 114
6.3 User plane handling 121
6.4 Mechanisms to provide efficient user plane connectivity 126
6.5 Edge computing 132
6.6 Session authentication and authorization 134
6.7 Local Area Data Network 135
7. Mobility Management 137
7.1 Introduction 137
7.2 Establishing connectivity 138
7.3 Reachability 144
7.4 Additional MM related concepts 146
7.5 N2 management 150
7.6 Control of overload 157
7.7 Non-3GPP aspects 161
7.8 Interworking with EPC 162
8. Security 171
8.1 Introduction 171
8.2 Security requirements and security services of the 5G system 172
8.3 Network access security 176
8.4 Network domain security 192
8.5 User domain security 198
8.6 Lawful intercept 198
9. Quality-of-Service 203
9.1 Introduction 203
9.2 Flow based QoS framework 205
9.3 Signaling of QoS 207
9.4 Reflective QoS 210
9.5 QoS parameters and characteristics 213
10. Policy control and charging 217
10.1 Introduction 217
10.2 Overview of policy and charging control 217
10.3 Access and mobility related policy control 222
10.4 UE policy control 224
10.5 Management of Packet Flow Descriptions 227
10.6 Network status analytics 228
10.7 Negotiation for future background data transfer 228
10.8 Session Management related policy and charging control 229
10.9 Additional session related policy control features 237
10.10 Charging 242
11. Network slicing 247
11.1 Introduction 247
11.2 Management and orchestration 249
11.3 Network Slice selection framework 251
12. Dual connectivity 265
12.1 Introduction 265
12.2 Multi-RAT Dual Connectivity overall architecture 268
12.3 MR-DC: UE and RAN perspective 272
12.4 MR-DC: Subscription, QoS flows and E-RABs, MR-DC bearers 274
12.5 Managing secondary RAN node handling for mobility and session
management 278
12.6 Security 282
12.7 Reporting User Data Volume traversing via SN 283
13. Network functions and services 287
13.1 5G core network functions 287
13.2 Services and service operations 293
14. Protocols 337
14.1 Introduction 337
14.2 5G non-access stratum (5G NAS) 337
14.3 NG application protocol (NGAP) 343
14.4 Hypertext transfer protocol (HTTP) 347
14.5 Transport layer security (TLS) 360
14.6 Packet forwarding control protocol (PFCP) 363
14.7 GPRS tunneling protocol for the User Plane (GTP-U) 378
14.8 Extensible Authentication Protocol (EAP) 379
14.9 IP security (IPSec) 382
14.10 Stream Control Transmission Protocol (SCTP) 387
14.11 Generic routing encapsulation (GRE) 392
15. Selected call flows 395
15.1 Introduction 395
15.2 Registration and deregistration 396
15.3 Service Request 400
15.4 UE Configuration Update 404
15.5 PDU Session Establishment 407
15.6 Inter-NG-RAN handover 409
15.7 EPS interworking with N26 416
15.8 EPS fallback 422
15.9 Procedures for untrusted non-3GPP access 424
16. Architecture extensions and vertical industries 431
16.1 Overview 431
16.2 Architecture enhancements and extensions 431
16.3 New feature capabilities 437
17. Future outlook 465
References 467
Abbreviations 471
Index 475
Ã¥¼Ò°³
5G Core Networks: Powering Digitalization provides an overview of the 5G Core network architecture, as well as giving descriptions of cloud technologies and the key concepts in the 3GPP rel-15/16 specifications. Written by the authors who are heavily involved in development of the 5G standards and who wrote the successful book on EPC and 4G Packet Networks, this book provides an authoritative reference on the technologies and standards of the 3GPP 5G Core network.
Content includes:
An overview of the 5G Core Architecture
The Stand-Alone and Non-Stand-Alone Architectures
Detailed presentation of 5G Core key concepts
An overview of 5G Radio and Cloud technologies
Learn
The differences between the 5G Core network and previous core network generations
How the interworking with previous network standards is defined
Why certain functionality has been included and what is beyond the scope of 5G Core
How the specifications relate to state-of-the-art web-scale concepts and virtualization technologies
Details of the protocol and service descriptions
Examples of network deployment options
Provides a clear, concise and comprehensive view of 5GS/5GC
Written by established experts in the 5GS/5GC standardization process, all of whom have extensive experience and understanding of its goals, history and vision
Covers potential service and operator scenarios for each architecture
Explains the Service Based Architecture, Network Slicing and support of Edge Computing, describing the benefits they will bring
Explains what options and parts of the standards will initially be deployed in real networks, along with their migration paths
ÁÖ°£·©Å·
´õº¸±â»óÇ°Á¤º¸Á¦°ø°í½Ã
À̺¥Æ® ±âȹÀü
´ëÇб³Àç/Àü¹®¼Àû ºÐ¾ß¿¡¼ ¸¹Àº ȸ¿øÀÌ ±¸¸ÅÇÑ Ã¥
ÆǸÅÀÚÁ¤º¸
»óÈ£ |
(ÁÖ)±³º¸¹®°í |
---|---|
´ëÇ¥ÀÚ¸í |
¾Èº´Çö |
»ç¾÷ÀÚµî·Ï¹øÈ£ |
102-81-11670 |
¿¬¶ôó |
1544-1900 |
ÀüÀÚ¿ìÆíÁÖ¼Ò |
callcenter@kyobobook.co.kr |
Åë½ÅÆǸž÷½Å°í¹øÈ£ |
01-0653 |
¿µ¾÷¼ÒÀçÁö |
¼¿ïƯº°½Ã Á¾·Î±¸ Á¾·Î 1(Á¾·Î1°¡,±³º¸ºôµù) |
±³È¯/ȯºÒ
¹ÝÇ°/±³È¯ ¹æ¹ý |
¡®¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹ÝÇ°/±³È¯/ȯºÒ¡¯ ¿¡¼ ½Åû ¶Ç´Â 1:1 ¹®ÀÇ °Ô½ÃÆÇ ¹× °í°´¼¾ÅÍ(1577-2555)¿¡¼ ½Åû °¡´É |
---|---|
¹ÝÇ°/±³È¯°¡´É ±â°£ |
º¯½É ¹ÝÇ°ÀÇ °æ¿ì Ãâ°í¿Ï·á ÈÄ 6ÀÏ(¿µ¾÷ÀÏ ±âÁØ) À̳»±îÁö¸¸ °¡´É |
¹ÝÇ°/±³È¯ ºñ¿ë |
º¯½É ȤÀº ±¸¸ÅÂø¿À·Î ÀÎÇÑ ¹ÝÇ°/±³È¯Àº ¹Ý¼Û·á °í°´ ºÎ´ã |
¹ÝÇ°/±³È¯ ºÒ°¡ »çÀ¯ |
·¼ÒºñÀÚÀÇ Ã¥ÀÓ ÀÖ´Â »çÀ¯·Î »óÇ° µîÀÌ ¼Õ½Ç ¶Ç´Â ÈÑ¼ÕµÈ °æ¿ì ·¼ÒºñÀÚÀÇ »ç¿ë, Æ÷Àå °³ºÀ¿¡ ÀÇÇØ »óÇ° µîÀÇ °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì ·º¹Á¦°¡ °¡´ÉÇÑ »óÇ° µîÀÇ Æ÷ÀåÀ» ÈѼÕÇÑ °æ¿ì ·½Ã°£ÀÇ °æ°ú¿¡ ÀÇÇØ ÀçÆǸŰ¡ °ï¶õÇÑ Á¤µµ·Î °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì ·ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·üÀÌ Á¤ÇÏ´Â ¼ÒºñÀÚ Ã»¾àöȸ Á¦ÇÑ ³»¿ë¿¡ ÇØ´çµÇ´Â °æ¿ì |
»óÇ° Ç°Àý |
°ø±Þ»ç(ÃâÆÇ»ç) Àç°í »çÁ¤¿¡ ÀÇÇØ Ç°Àý/Áö¿¬µÉ ¼ö ÀÖÀ½ |
¼ÒºñÀÚ ÇÇÇغ¸»ó |
·»óÇ°ÀÇ ºÒ·®¿¡ ÀÇÇÑ ±³È¯, A/S, ȯºÒ, Ç°Áúº¸Áõ ¹× ÇÇÇغ¸»ó µî¿¡ °üÇÑ »çÇ×Àº¼ÒºñÀÚºÐÀïÇØ°á ±âÁØ (°øÁ¤°Å·¡À§¿øȸ °í½Ã)¿¡ ÁØÇÏ¿© ó¸®µÊ ·´ë±Ý ȯºÒ ¹× ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó±Ý Áö±Þ Á¶°Ç, ÀýÂ÷ µîÀº ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀǼҺñÀÚ º¸È£¿¡ °üÇÑ ¹ý·ü¿¡ µû¶ó ó¸®ÇÔ |
(ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º´Â ȸ¿ø´ÔµéÀÇ ¾ÈÀü°Å·¡¸¦ À§ÇØ ±¸¸Å±Ý¾×, °áÁ¦¼ö´Ü¿¡ »ó°ü¾øÀÌ (ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º¸¦ ÅëÇÑ ¸ðµç °Å·¡¿¡ ´ëÇÏ¿©
(ÁÖ)KGÀ̴Ͻýº°¡ Á¦°øÇÏ´Â ±¸¸Å¾ÈÀü¼ºñ½º¸¦ Àû¿ëÇÏ°í ÀÖ½À´Ï´Ù.
¹è¼Û¾È³»
±³º¸¹®°í »óÇ°Àº Åùè·Î ¹è¼ÛµÇ¸ç, Ãâ°í¿Ï·á 1~2Àϳ» »óÇ°À» ¹Þ¾Æ º¸½Ç ¼ö ÀÖ½À´Ï´Ù.
Ãâ°í°¡´É ½Ã°£ÀÌ ¼·Î ´Ù¸¥ »óÇ°À» ÇÔ²² ÁÖ¹®ÇÒ °æ¿ì Ãâ°í°¡´É ½Ã°£ÀÌ °¡Àå ±ä »óÇ°À» ±âÁØÀ¸·Î ¹è¼ÛµË´Ï´Ù.
±ººÎ´ë, ±³µµ¼Ò µî ƯÁ¤±â°üÀº ¿ìü±¹ Åù踸 ¹è¼Û°¡´ÉÇÕ´Ï´Ù.
¹è¼Ûºñ´Â ¾÷ü ¹è¼Ûºñ Á¤Ã¥¿¡ µû¸¨´Ï´Ù.