Practical LTE Based Security Forces PMR Networks.

Security forces PMR networks are moving from proprietary technologies for their Mission Critical Push-To-Talk basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own r...

Full description

Saved in:
Bibliographic Details
Online Access: Full text (MCPHS users only)
Full text (MCPHS users only)
Main Author: Henry-Labordère, A.
Format: Electronic eBook
Language:English
Published: Aalborg : River Publishers, 2018
Series:River Publishers series in security and digital forensics.
Subjects:
Local Note:ProQuest Ebook Central
Description
Summary:Security forces PMR networks are moving from proprietary technologies for their Mission Critical Push-To-Talk basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based Security Forces PMR Networks assumes that the reader has a basic knowledge of the 4G network architecture and services, and the book focusses on the specific features and choices required to fulfill the need of security forces PMR networks. These include tactical and centralized, including LTE based voice services VoLTE and IMS. It can be used as a reference or textbook, with many detailed call flows and traces being included. The author, who has also a long teaching career in Operations Research, provides mathematical models for the optimization of tactical network federations, multicast coverage and allocation of preemptive priorities to PMR group members. He is a pioneer in the area of Virtual Roaming, an application of graph theory and telecommunications to provide roaming without direct relations, having previously published books on SMS Hubs, SS7 Hubs, Diameter Hubs, GTP Hubs. The use of M2M (monitoring devices) for security forces with mobility is covered in detail in the book, including the new LoRa virtual roaming which goes beyond the scope of PMR.
Item Description:4.1 Classical UICC, eUICC M2M, or eUICC "consumer" SIM cards.
Physical Description:1 online resource (356 pages)
ISBN:8793609787
9788793609785
9781003339120
1003339123
9781000793451
1000793451
9781000796223
1000796221
Source of Description, Etc. Note:Print version record.
Biographical or Historical Data:Arnaud Henry-Labordr̈e