Book Image

Mastering 5G Network Design, Implementation, and Operations

By : Shyam Varan Nath, Ananya Simlai, Oğuzhan Kara
5 (1)
Book Image

Mastering 5G Network Design, Implementation, and Operations

5 (1)
By: Shyam Varan Nath, Ananya Simlai, Oğuzhan Kara

Overview of this book

We are living in an era where ultra-fast internet speed is not a want, but a necessity. As applications continue to evolve, they demand a reliable network with low latency and high speed. With the widespread commercial adoption of driverless cars, robotic factory floors, and AR/VR-based immersive sporting events, speed and reliability are becoming more crucial than ever before. Fortunately, the power of 5G technology enables all this and much more. This book helps you understand the fundamental building blocks that enable 5G technology. You’ll explore the unique aspects that make 5G capable of meeting high-quality demands, including technologies that back 5G, enhancements in the air interface, and packet core, which come together to create a network with unparalleled performance. As you advance, you’ll discover how to design and implement both 5G macro and private networks, while also learning about the various design and deployment options available and which option is best suited for specific use cases. After that, you’ll check out the operational and maintenance aspects of such networks and how 5G works together with fixed wireline and satellite technologies. By the end of this book, you’ll understand the theoretical and practical aspects of 5G, enabling you to use it as a handbook to establish a 5G network.
Table of Contents (23 chapters)
1
Part 1:Introduction to 5G
Free Chapter
2
Chapter 1: Introduction to 5G
10
Part 2:5G Network Design, Deployment Models, and Advanced Use Cases

FMC security considerations

Let us look at the security considerations for FMC. Potential adopters of FMC, especially enterprise users, often ask whether having their data travel wirelessly over long distances makes it more vulnerable to cybersecurity breaches. Once the data leaves the enterprise wired network and enters the 4G or 5G wireless network, it relies on the encryption of the wireless network.

Let us look at the potential security risks of FMC. Overall, cybersecurity risks for mobile operators are on the rise. In July 2022, the French mobile operator La Poste Mobile experienced a ransomware attack. La Poste Mobile was a victim of the LockBit ransomware operation (see https://cybersecurityworldconference.com/2022/07/10/french-telephone-operator-la-poste-mobile-suffered-a-ransomware-attack for more details).

Since FMC depends on many protocols and technologies, such as SIP and UMA, it is dependent on the underlying security of those technologies.

SIP security

SIP...