期刊论文详细信息
EURASIP Journal on Wireless Communications and Networking
Beyond private 5G networks: applications, architectures, operator models and technological enablers
Jen-Sheng Huang1  Daniele Munaretto2  Marco Centenaro2  Nicola di Pietro2  Jiun-Cheng Huang3  Ling-Chih Kao3  Wilhelm Keusgen4  Thomas Haustein4  Mathis Schmieder4  Sven Wittig4  Kuan-Yi Chih5  Shuo-Peng Liang5  Jack Shi-Jie Luo5  Tzu-Ya Wang6  Henrik Klessig7  Savita Vitthalrao Kendre7  Francesca Costanzo8  Mattia Merluzzi8  Sergio Barbarossa8  Stefania Sardellitti8  Emilio Calvanese-Strinati9  Lam Ngoc Dinh9  Mickael Maman9 
[1]Alpha Networks Inc.
[2]Athonet Srl
[3]Chunghwa Telecom
[4]Fraunhofer Heinrich Hertz Institute
[5]ITRI
[6]Institute for Information Industry
[7]Robert Bosch GmbH
[8]Sapienza University of Rome
[9]Univ. Grenoble Alpes, CEA, Leti
关键词: Beyond-5G;    Private networks;    Operator models;    Application requirements;   
DOI  :  10.1186/s13638-021-02067-2
来源: DOAJ
【 摘 要 】
Abstract Private networks will play a key role in 5G and beyond to enable smart factories with the required better deployment, operation and flexible usage of available resource and infrastructure. 5G private networks will offer a lean and agile solution to effectively deploy and operate services with stringent and heterogeneous constraints in terms of reliability, latency, re-configurability and re-deployment of resources as well as issues related to governance and ownership of 5G components, and elements. In this paper, we present a novel approach to operator models, specifically targeting 5G and beyond private networks. We apply the proposed operator models to different network architecture options and to a selection of relevant use cases offering mixed private–public network operator governance and ownership. Moreover, several key enabling technologies have been identified for 5G private networks. Before the deployment, stakeholders should consider spectrum allocation and on-site channel measurements in order to fully understand the propagation characteristic of a given environment and to set up end-to-end system parameters. During the deployment, a monitoring tools will support to validate the deployment and to make sure that the end-to-end system meet the target KPI. Finally, some optimization can be made individually for service placement, network slicing and orchestration or jointly at radio access, multi-access edge computing or core network level.
【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:16次