Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
5G wireless: a comprehensive introduction
Stallings W., Pearson, Hoboken, NJ, 2021. 672 pp. Type: Book (978-1-367671-41-6)
Date Reviewed: Sep 20 2022

The tremendous growth of mobile technology from first generation (1G) to fifth generation (5G) includes the development of mobile networks, user interfaces, and real-time implementation. The COVID-19 pandemic of the last couple years highlighted an immediate need for efficient communication. With advanced technologies like 5G mobile and cellular networks, physical presence has been replaced by online or virtual presence. Much of society has transitioned from face-to-face interactions to online and distant interfaces, and most of us are now familiar with the new concept of “work from home.”

This book presents the concepts, architecture, and implementation of 5G cellular networks and delivers more technical descriptions of 5G mobile technology. It consists of five parts spread over 15 chapters, three appendices, and an index.

Part 1, “Overview,” consists of three chapters. Chapter 1 explores the first four generations of cellular networks, that is, first (1G), second (2G), third (3G), and fourth (4G) generations. Chapter 2 illustrates the requirements, objectives, specifications, and standards for 5G, and describes International Telecommunication Union (ITU) sectors, namely radiocommunication (R) and telecommunication (T) standardization. Chapter 3 presents details about types of next-generation mobile network 5G architecture and third-generation partnership project network architecture such as core and radio access.

Part 2, “Use Cases and Applications,” adds three chapters. Chapter 4 refers to an instructional design process of enhanced mobile broadband, including development, implementation, and evaluation. Chapter 5 highlights five components of the Internet of Things (IoT): sensor, actuator, microcontroller, transceiver, and power supply. Further, the chapter looks at use cases for smart agriculture, precision crop management, and smart city involving biometrics identification. Chapter 6 identifies throughput, latency, and availability as the preferred requirements for ultra-reliable and low-latency communications, with its implementation on an unmanned aircraft system traffic management use case.

Part 3, “5G NextGen Core Network,” consists of four chapters. Chapter 7 explains software-defined networking (SDN) and its architecture and planes (including data, control, and application planes). The chapter covers SDN application plane functions such as data center networking, mobility and wireless, information-centric networking, traffic engineering, measurement and monitoring, and security and dependability. Chapter 8 describes infrastructure, architecture, requirements, and benefits of network functions virtualization (NFV) and its relation with SDN. Chapter 9 summarizes priority, quality of service (QoS), and policy control--the core network functionalities of 5G services--and gives an overview of tunneling and network slicing. Chapter 10 discusses the role of multi-access edge computing in the factories of the future and video analytics in 5G use cases.

Part 4, “5G NR Air Interfaces and Radio Access Network,” constitutes four chapters. Chapter 11 discusses the mechanism of refraction, line-of-sight transmission, and the concept of fading with differences between optical and radio line of sight. Chapter 12 labels various types of antennas, namely dipoles and monopoles and directional and parabolic reflector antennas. It describes multiple-input multiple-output (MIMO) antennas and related principles and advanced cellular antennas. Chapter 13 depicts modulation schemes, specifically multicarrier modulation, fast Fourier transform, and inverse fast Fourier transform, and explains the term “numerology” in 5G services. It includes a short appendix on multiplexing and multiple access. Chapter 14 introduces transmission error, describes the operation of low-density parity-check (LDPC) and polar codes, and presents basic concepts of forward error correction (FEC). Chapter 15 deploys various nodes, like gNB, ng-eNB, en-gNB, and eNB, in radio access network (RAN) architecture and covers three elements of a RAN transport network (fronthaul, midhaul, and backhaul).

Part 5 comprises three appendices: review questions and solutions, a glossary, and acronyms, which leans more toward technical aspects and makes this book worth reading. 5G wireless will be useful to professionals, including technical workers, software and cellular experts, and research students working in the area of 5G services and real-time implementations.

More reviews about this item: Amazon

Reviewer:  Lalit Saxena Review #: CR147496 (2211-0139)
Bookmark and Share
  Editor Recommended
Security and Protection (C.2.0 ... )
Would you recommend this review?
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy