Limit search to available items
Book Cover
E-book
Author Henry-Labordère, A.

Title Practical LTE Based Security Forces PMR Networks
Published Aalborg : River Publishers, 2018

Copies

Description 1 online resource (356 pages)
Series River Publishers Series in Security and Digital Forensics Ser
River Publishers series in security and digital forensics.
Contents Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY ANDDIGITAL FORENSICS; Title Page; Copyright Page; Contents; From the Same Author; List of Figures; List of Tables; Chapter 1 -- Introduction; Chapter 2 -- LTE PMR Networks: Service, Seamless Federation of Tactical Networks, Backup by the Public Operators' Coverage, and Direct Calls; 2.1 PMR tactical network elements; 2.2 PMR tactical networks' federation; 2.2.1 Operational needs' summary; 2.2.2 Radio planning and IP addressing of the various federated tactical networks
2.2.3 Radio planning for mobility between tactical bubbles of a federation: Requirements and solution2.2.4 Initial configuration of a user to associate with its assigned group; 2.3 Federation method for N 1 concurrent networks with one taking the central role; 2.3.1 Architecture description; 2.4 Using the multicast for MCPTT and federating MBFSN areas; 2.4.1 Introduction to eMBMS; 2.4.1.1 Broadcast mode; 2.4.1.2 Multicast mode; 2.4.2 Attachment of a tactical network in an existing federation: GCS AS-centric architecture
2.5 MBMS extension of the radio coverage of the newjoining tactical network2.5.1 Crude basic federation (cross-copying) active service toanother service area; 2.5.2 Federated MCEs or central MCE?; 2.5.2.1 MBMS LTE channels; 2.5.2.2 Meaning of "MBMS synchronization," role of the central or coordinated MCE; 2.5.2.3 Behavior of an MBMS-enabled UE; 2.5.2.4 Optimization of the MBMS channel allocation between federated groups; 2.5.2.5 Meaning of MBMS synchronization, role of the MCE; 2.6 Overview of a PMR or local loop network architecture: inclusion of direct calls' support
2.6.1 PMR HLR-HSS capabilities and architecture2.6.2 Proximity services (ProSe); References; Chapter 3 -- Geo-Localization of PMR Group Members and Monitoring of the Quality of Service with the ECID Method; 3.1 Operational need for a geo-localization service in PMR networks; 3.2 Localization methods in tactical networks; 3.2.1 Enabling the LPP protocol in the UEs; 3.2.2 Using SUPL as main geo-localization protocol; 3.3 ECID positioning method (LPP control plane) using a graphic interface; 3.4 Cell database for the ECID method yielding the UE received signal level
3.5 Why not use GPS positioning method (LPP control plane)?3.6 ECID method: Calculation of the physical measures from the measurements received from the UE; 3.6.1 RSRP measurement! Dbm values for signal level at the UE; 3.6.2 UE Rx-Tx! distance estimate between UE and eNodeB; 3.6.3 Field results and coverage comparisons between various eNodeBs; 3.6.4 Operational use and presentation of the ECID method results in PMR tactical networks; References; Chapter 4 -- Choice of the SIM Card Type for PMR or M2M Networks and Automatic Profile Switching Possibilities
Summary Security forces PMR networks are moving from proprietary technologies for their Mission Critical Push-To-Talk basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based Security Forces PMR Networks assumes that the reader has a basic knowledge of the 4G network architecture and services, and the book focusses on the specific features and choices required to fulfill the need of security forces PMR networks. These include tactical and centralized, including LTE based voice services VoLTE and IMS. It can be used as a reference or textbook, with many detailed call flows and traces being included. The author, who has also a long teaching career in Operations Research, provides mathematical models for the optimization of tactical network federations, multicast coverage and allocation of preemptive priorities to PMR group members. He is a pioneer in the area of Virtual Roaming, an application of graph theory and telecommunications to provide roaming without direct relations, having previously published books on SMS Hubs, SS7 Hubs, Diameter Hubs, GTP Hubs. The use of M2M (monitoring devices) for security forces with mobility is covered in detail in the book, including the new LoRa virtual roaming which goes beyond the scope of PMR
Notes 4.1 Classical UICC, eUICC M2M, or eUICC "consumer" SIM cards
Arnaud Henry-Labordr̈e
Print version record
Subject Radio, Military.
Mobile communication systems.
Long-Term Evolution (Telecommunications)
SCIENCE / Energy
Long-Term Evolution (Telecommunications)
Mobile communication systems
Radio, Military
Genre/Form Electronic books
Form Electronic book
ISBN 8793609787
9788793609785
9781003339120
1003339123
9781000793451
1000793451
9781000796223
1000796221