pdf_gross.gifLTE - Interworking with WiFi

[2-day course, Euro 2,350.- (net) per participant]

backtotop.gifOverview & Applicability

Course Description
  • Reasoning & Necessity of Interworking
    • Operator's Perspective at a Glance
    • Parties involved and their primary Interests
      • End User, UE Vendor
    • Geographical View
      • Nomadic vs. Mobile Users, Real-time vs non-real time Services
  • Network Architecture Issues
    • Coupling Options
      • Loose Coupling, Tight Coupling
    • Necessity of Anchoring
      • Overview, Positioning of the Anchor
  • The Perspective of the UE
    • User Interface and Network Selection
    • Seamless Mobility Options and their Characteristics
      • Intra-RAT Mobility, Inter-RAT Mobility (w/o Optimizations), Inter-RAT Mobility (with Optimizations)

backtotop.gifImplementation Options of Interworking

  • Implementation of WiFi as I-WLAN
    • Interconnection Options for Alternative RAT’s (R6/7)
    • Details of I-WLAN Direct IP-Access
      • Network Architecture
    • Attachment and Operation
    • Details of I-WLAN 3GPP IP-Access
      • Network Architecture, Protocol Stack, Attachment and Operation, I-WLAN Operation from the User’s Perspective
  • Security Procedures in case of alternative RAT’s
    • The EAP-SIM Procedure
    • The EAP-AKA Procedure
    • IKEv2
      • The IKEv2-Procedure (Example: GAN/UMAN)
  • Overview GAN/UMAN
    • Network Architecture
    • Protocol Stacks
      • Circuit-Switched Control Plane, Circuit-Switched User Plane
    • Network Architecture in case of VOLGA
  • WISPr
    • Important Facts of WISPr
    • WISPr Logon Procedure
    • The Welcome and Logon Screens
    • Difficulty of WISPr with respect to Support of the UE
  • Implementation of WiFi as non-trusted Non-3GPP Access Network
    • Evolved Packet Core in Context
      • EPC vs. EPS, Non-3GPP Access Networks (trusted / non-trusted)
    • Related Network Architecture
    • Signaling Procedures if IKEv2 and PMIPv6 are used
    • Signaling Procedures if IKEv2 and DSMIPv6 are used
  • Implementation of WiFi as another IP-CAN in the IMS-Context
    • Network Architecture
    • Operation: Network Attachment
    • Operation: IMS-Registration

backtotop.gif Inside WiFi

  • The IEEE 802.11 Alphabet
    • IEEE 802.11-1999, IEEE 802.11b, IEEE 802.11g, IEEE 802.11a, IEEE 802.11e, IEEE 802.11i, IEEE 802.11n
  • The Physical Resource
    • The ISM Band in 2.4 GHz and 5 GHz
    • Channel Numbers and Allocation / 2.4 GHz
    • Channel Numbers and Allocation / 5 GHz
  • Network Architecture
    • Infrastructure Mode, Ad-hoc Mode
  • Protocol Stack of IEEE 802.11 in Context
    • PDU-Types in the Protocol Stack, MSDU, MPDU, PPDU
    • Example of an IEEE 802.11 MPDU
  • Operation of IEEE 802.11
    • CSMA/CA - Resource Sharing and Network Access
      • Principle Operation, Behavior in case of Collisions, Format and Content of the PLCP-PDU, Physical vs. Virtual Carrier Sensing, Physical Carrier Sensing, Virtual Carrier Sensing, Network Allocation Vector
    • The Different MAC-Access Coordination Functions
      • Overview, Distributed Coordination Function / Example Operation, SIFS-, Slot- and CW-Values for different PHY's, DCF with RTS/CTS-Enhancement, Point Coordination Function (PCF), Indication of an AP whether PCF is supported, Indication whether the AP supports 802.11e QoS, Enhanced Distributed Channel Access (EDCA), Parameterization of QoS-Settings, Calculating CW(min) / CW(max) from ECWmin and ECWmax, HCF Controlled Channel Access (HCCA), Example of a QoS-Data+CF-Ack+CF-Poll-Frame
  • Security Technologies for IEEE 802.11
    • Overview
      • Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA and WPA2), Virtual Private Networking (VPN)
    • EAP and PSK: How to Create the Key Material
      • Master Keys (PSK, MK, PMK), Pairwise Transient Key (PTK), KCK, KEK and TK
    • Pre - RSNA Procedures
      • Open System Authentication, Shared Key Authentication, Authentication challenge, The “Wired Equivalent Privacy” Procedure
    • RSNA Procedures
      • RSNA Policy Selection, Probe Response frames and Beacon frames, Open System authentication, Association
    • Advanced Authentication
      • Network Overview: Supplicant, Authenticator, Authentication Server, Redirection, Uncontrolled port, Controlled port, Session Phase 1: Probing & Association, Beacon frames, Exchange of Probe Request and Probe Response Frames, Open System authentication, Association, Session Phase 2: EAP Authentication, EAPOL start, EAPOL identity exchange, EAPOL challenge, EAPOL success, Session Phase 3: EAPOL 4-Way Handshake, 1st EAPOL message, The 2nd EAPOL message, The 3rd EAPOL message, The 4th EAPOL message, Session Phase 4 & 5: Active Session & Disassociation
    • Power Saving Techniques in WiFi
    • Overview
      • Legacy Modes: APSD and TIM-based Power Save Mode, SM Power Save, PSMP (Power Save Multi Poll)
    • Case Study: Operation of PSMP
      • Format and Content of the PSMP-Frame

backtotop.gifTInterworking Issues within the Physical Layer

  • The Perspective of the UE
    • Constraints
      • Multiple Radio Issue, Measurements, Supported / Preferred Handover Types
    • Handover Types: Make before Break vs. Break before Make
    • Physical and Time Behavior during Network Transition
      • Case 1: Preferred Network fades away, Case 2: Preferred Network becomes available
    • Support though the ANDSF
      • Problem Description, Interworking with the ANDSF
    • The Connection Manager
  • The Perspective of the Network Operator
    • Constraints
      • Variety of Implementation Choices, Quality of Service, Competition from UE Manufacturers, Mobility Support through the EPC, Related Network Architecture, Signaling Procedure (NBM / PMIPv6 on S2b)

v1.000

pdf_gross.gif

Search:

Advanced Search

More Info:

General Information about this course
Schedule of this training course
Buy this book


INACON eBooks

Please have a look at our full offer

ebook_covers_small.jpg

Read more ...