Explore chapters and articles related to this topic
Algorithms and Performance Analysis for Narrowband Internet of Things and Broadband Long-Term Evolution Coexisting System
Published in Yulei Wu, Haojun Huang, Cheng-Xiang Wang, Yi Pan, 5G-Enabled Internet of Things, 2019
Bowen Yang, Lei Zhang, Yansha Deng, Deli Qiao, Muhammad Imran
In order to achieve the possibility of quick deployment, the NB-IoT is designed to operate on existing cellular networks, for example, the Evolved Universal Mobile Telecommunications System Terrestrial Radio Access (E-UTRA) and Global System for Mobile Communication (GSM). In addition, three different modes could be assigned for NB-IoT operation—stand-alone mode, in-band mode, and guard-band mode—so that the spectrum resource could be utilized efficiently and flexibly. The stand-alone mode is shown in Figure 9.1a, where the frequency band for GSM as well as the scattered spectrum for potential IoT deployment will be allocated for NB-IoT operation. The in-band mode, shown in Figure 9.1b, allows NB-IoT devices to utilize the resource blocks (RBs) within LTE carriers, whereas in the guard-band mode, shown in Figure 9.1c, NB-IoT devices will be assigned to operate on the LTE carriers’ guard band [3]. The in-band and guard-band modes enable the reuse of the LTE BS only by updating their software. Nevertheless, for the sake of low cost (NB-IoT devices have much lower sampling rate than that of LTE BS), the reuse of the LTE BS radio frequency (RF) and baseband processing chain may destroy the orthogonality of the orthogonal frequency division multiplexing (OFDM) system. In consequence, the extensively used algorithms (e.g., channel equalization and synchronization) and performance analysis method might no longer be valid.
4G and 5G Systems
Published in Hossam Fattah, 5G LTE Narrowband Internet of Things (NB-IoT), 2018
LTE has evolved as an enhancement to its predecessor system known as UMTSTM. Enhanced UMTSTM Terrestrial Radio Access and Network (E-UTRA and E-UTRAN) are the official name used by 3GPP for LTE UE and its core network, respectively. E-UTRAN consists of an eNodeB that acts as a central controller (e.g., base station) connected to a large number of NB-IoT devices. Different eNodeBs are connected to each other and to the core network through protocols such as S1 and X2 protocols. The term E-UTRAN refers to the network side (eNodeB and core network), while the term E-UTRA refers to the UE side. Figure 2.10 illustrates this architecture. Each eNodeB is responsible for providing radio covering to a geographical area, and all NB-IoT devices in this area can be connected to this eNodeB. A single or multiple eNodeBs belong to a mobile operator (e.g., AT&T, T-Mobile). All NB-IoT devices within the service area of a mobile operator are equipped and provided with an USIM card to enable their services on the mobile operator network.
Baseband Signaling and Pulse Shaping
Published in Jerry D. Gibson, Mobile Communications Handbook, 2017
Michael L. Honig, Melbourne Barton
LTE is an evolution of UMTS, defined in the 3GPP Release 8 specification. Evolved UTRA (E-UTRA) is the air interface for LTE, which operates in both FDD and TDD modes, as well as half-duplex FDD with the same radio access technology. LTE uses Orthogonal Frequency Division Multiple Access (OFDMA) radio-access for the downlink and Single-Carrier Frequency Division Multiple Access (SC-FDMA) on the uplink. Unlike UTRA, which uses a square-root raised cosine pulse shaping filter, E-UTRA uses a rectangular transmit pulse shaping filter [12].
The digital ‘connected’ earth: open technology for providing location-based services on degraded communication environments
Published in International Journal of Digital Earth, 2018
Ramón Piedrafita, Rubén Béjar, Rubén Blasco, Alvaro Marco, F. Javier Zarazaga-Soria
The cellular industry has also introduced new standards such as long-term evolution for machine-to-machine communication (LTE-M) (Ratasuk et al. 2014), NB-IoT (narrowband Internet of the Things) (Ratasuk et al. 2016) or EC-GSM-IoT (extended coverage GSM IoT) (E-UTRA 2016), which aim to provide similar functionalities than these technologies, but from the operators’ perspective. LTE-M, or more precisely LTE-MTC (LTE for machine-type communications) may provide peak data rates up to 1 Mbps, but as it relays on the existing LTE infrastructure, LTE-M will have the same availability as high-speed communications. NB-IoT provides a lower data rate of 0.2 Mbps and will require operators’ APs to be adapted. EC-GSM-IoT is a new proposal to reuse existing GSM network that will provide data rates of 0.5 Mbps and first commercial launches are planned to 2017. Nevertheless, these technologies are still not available for general usage, and a suitable option easily available is to use GSM messaging capabilities.
A secure cluster-based authentication and key management protocol for machine-type communication in the LTE network
Published in International Journal of Computers and Applications, 2022
K. Krishna Jyothi, Shilpa Chaudhari
The network model of the proposed M2M communication is shown in Figure 1; it is divided into three major domains: MTC server, LTE-A network, and MTC device domains. In the MTC device, the MTC groups are formed (clusters) on the basis of their behavior, geographical locations, or whether the location bound up with the same applications. Each MTC group selects an MTC leader (cluster head) among the groups in the network. The LTE-A network consists of the evolved universal terrestrial radio access network (E-UTRAN) and the evolved packet core (EPC). The MTC application domain consists of the MTC server, the MTCS communicates with the MTCDs through the LTE-A network, and the MTC users communicate with the MTCS via an interface that is accessible to the MTC users.
Security challenges in the transition to 4G mobile systems in developing countries
Published in Cogent Engineering, 2023
Fanuel Melak Asmare, Lijaddis Getnet Ayalew
Each of the main LTE components can be targeted by a variety of hacks. User Equipment (UE), Evolved UMTS Terrestrial Radio Access Network (E-UTRAN), and Evolved Packet Core (EPC) comprise the LTE network architecture. Attackers target not only individual components but also the communication between them by exploiting vulnerabilities in the protocols. Because of design flaws, authentication parameters can be easily brute forced and Internal protocols that are not configured with integrity safeguards invite a variety of attack scenarios. For example, on-path attacks that result in eavesdropping or data modification, undetected fraudulent activity, denial-of-service, and much more (Shaik et al., 2015).