LTE - Interworking with WiFi
[2-day course, Euro 2,350.- (net) per participant]
Overview & Applicability
- Reasoning & Necessity of Interworking
- Operator's Perspective at a Glance
- Parties involved and their primary Interests
- End User, UE Vendor
- End User, UE Vendor
- Geographical View
- Nomadic vs. Mobile Users, Real-time vs non-real time Services
- Nomadic vs. Mobile Users, Real-time vs non-real time Services
- Operator's Perspective at a Glance
- Network Architecture Issues
- Coupling Options
- Loose Coupling, Tight Coupling
- Loose Coupling, Tight Coupling
- Necessity of Anchoring
- Overview, Positioning of the Anchor
- Overview, Positioning of the Anchor
- Coupling Options
- The Perspective of the UE
- User Interface and Network Selection
- Seamless Mobility Options and their Characteristics
- Intra-RAT Mobility, Inter-RAT Mobility (w/o Optimizations), Inter-RAT Mobility (with Optimizations)
Implementation Options of Interworking
- Implementation of WiFi as I-WLAN
- Interconnection Options for Alternative RAT’s (R6/7)
- Details of I-WLAN Direct IP-Access
- Network Architecture
- Network Architecture
- Attachment and Operation
- Details of I-WLAN 3GPP IP-Access
- Network Architecture, Protocol Stack, Attachment and Operation, I-WLAN Operation from the User’s Perspective
- Network Architecture, Protocol Stack, Attachment and Operation, I-WLAN Operation from the User’s Perspective
- Interconnection Options for Alternative RAT’s (R6/7)
- Security Procedures in case of alternative RAT’s
- The EAP-SIM Procedure
- The EAP-AKA Procedure
- IKEv2
- The IKEv2-Procedure (Example: GAN/UMAN)
- The IKEv2-Procedure (Example: GAN/UMAN)
- The EAP-SIM Procedure
- Overview GAN/UMAN
- Network Architecture
- Protocol Stacks
- Circuit-Switched Control Plane, Circuit-Switched User Plane
- Circuit-Switched Control Plane, Circuit-Switched User Plane
- Network Architecture in case of VOLGA
- Network Architecture
- WISPr
- Important Facts of WISPr
- WISPr Logon Procedure
- The Welcome and Logon Screens
- Difficulty of WISPr with respect to Support of the UE
- Important Facts of WISPr
- Implementation of WiFi as non-trusted Non-3GPP Access Network
- Evolved Packet Core in Context
- EPC vs. EPS, Non-3GPP Access Networks (trusted / non-trusted)
- EPC vs. EPS, Non-3GPP Access Networks (trusted / non-trusted)
- Related Network Architecture
- Signaling Procedures if IKEv2 and PMIPv6 are used
- Signaling Procedures if IKEv2 and DSMIPv6 are used
- Evolved Packet Core in Context
- Implementation of WiFi as another IP-CAN in the IMS-Context
- Network Architecture
- Operation: Network Attachment
- Operation: IMS-Registration
- Network Architecture
Inside WiFi
- The IEEE 802.11 Alphabet
- IEEE 802.11-1999, IEEE 802.11b, IEEE 802.11g, IEEE 802.11a, IEEE 802.11e, IEEE 802.11i, IEEE 802.11n
- IEEE 802.11-1999, IEEE 802.11b, IEEE 802.11g, IEEE 802.11a, IEEE 802.11e, IEEE 802.11i, IEEE 802.11n
- The Physical Resource
- The ISM Band in 2.4 GHz and 5 GHz
- Channel Numbers and Allocation / 2.4 GHz
- Channel Numbers and Allocation / 5 GHz
- The ISM Band in 2.4 GHz and 5 GHz
- Network Architecture
- Infrastructure Mode, Ad-hoc Mode
- Infrastructure Mode, Ad-hoc Mode
- Protocol Stack of IEEE 802.11 in Context
- PDU-Types in the Protocol Stack, MSDU, MPDU, PPDU
- Example of an IEEE 802.11 MPDU
- PDU-Types in the Protocol Stack, MSDU, MPDU, PPDU
- Operation of IEEE 802.11
- CSMA/CA - Resource Sharing and Network Access
- Principle Operation, Behavior in case of Collisions, Format and Content of the PLCP-PDU, Physical vs. Virtual Carrier Sensing, Physical Carrier Sensing, Virtual Carrier Sensing, Network Allocation Vector
- Principle Operation, Behavior in case of Collisions, Format and Content of the PLCP-PDU, Physical vs. Virtual Carrier Sensing, Physical Carrier Sensing, Virtual Carrier Sensing, Network Allocation Vector
- The Different MAC-Access Coordination Functions
- Overview, Distributed Coordination Function / Example Operation, SIFS-, Slot- and CW-Values for different PHY's, DCF with RTS/CTS-Enhancement, Point Coordination Function (PCF), Indication of an AP whether PCF is supported, Indication whether the AP supports 802.11e QoS, Enhanced Distributed Channel Access (EDCA), Parameterization of QoS-Settings, Calculating CW(min) / CW(max) from ECWmin and ECWmax, HCF Controlled Channel Access (HCCA), Example of a QoS-Data+CF-Ack+CF-Poll-Frame
- Overview, Distributed Coordination Function / Example Operation, SIFS-, Slot- and CW-Values for different PHY's, DCF with RTS/CTS-Enhancement, Point Coordination Function (PCF), Indication of an AP whether PCF is supported, Indication whether the AP supports 802.11e QoS, Enhanced Distributed Channel Access (EDCA), Parameterization of QoS-Settings, Calculating CW(min) / CW(max) from ECWmin and ECWmax, HCF Controlled Channel Access (HCCA), Example of a QoS-Data+CF-Ack+CF-Poll-Frame
- CSMA/CA - Resource Sharing and Network Access
- Security Technologies for IEEE 802.11
- Overview
- Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA and WPA2), Virtual Private Networking (VPN)
- Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA and WPA2), Virtual Private Networking (VPN)
- EAP and PSK: How to Create the Key Material
- Master Keys (PSK, MK, PMK), Pairwise Transient Key (PTK), KCK, KEK and TK
- Master Keys (PSK, MK, PMK), Pairwise Transient Key (PTK), KCK, KEK and TK
- Pre - RSNA Procedures
- Open System Authentication, Shared Key Authentication, Authentication challenge, The “Wired Equivalent Privacy” Procedure
- Open System Authentication, Shared Key Authentication, Authentication challenge, The “Wired Equivalent Privacy” Procedure
- RSNA Procedures
- RSNA Policy Selection, Probe Response frames and Beacon frames, Open System authentication, Association
- RSNA Policy Selection, Probe Response frames and Beacon frames, Open System authentication, Association
- Advanced Authentication
- Network Overview: Supplicant, Authenticator, Authentication Server, Redirection, Uncontrolled port, Controlled port, Session Phase 1: Probing & Association, Beacon frames, Exchange of Probe Request and Probe Response Frames, Open System authentication, Association, Session Phase 2: EAP Authentication, EAPOL start, EAPOL identity exchange, EAPOL challenge, EAPOL success, Session Phase 3: EAPOL 4-Way Handshake, 1st EAPOL message, The 2nd EAPOL message, The 3rd EAPOL message, The 4th EAPOL message, Session Phase 4 & 5: Active Session & Disassociation
- Network Overview: Supplicant, Authenticator, Authentication Server, Redirection, Uncontrolled port, Controlled port, Session Phase 1: Probing & Association, Beacon frames, Exchange of Probe Request and Probe Response Frames, Open System authentication, Association, Session Phase 2: EAP Authentication, EAPOL start, EAPOL identity exchange, EAPOL challenge, EAPOL success, Session Phase 3: EAPOL 4-Way Handshake, 1st EAPOL message, The 2nd EAPOL message, The 3rd EAPOL message, The 4th EAPOL message, Session Phase 4 & 5: Active Session & Disassociation
- Power Saving Techniques in WiFi
- Overview
- Legacy Modes: APSD and TIM-based Power Save Mode, SM Power Save, PSMP (Power Save Multi Poll)
- Legacy Modes: APSD and TIM-based Power Save Mode, SM Power Save, PSMP (Power Save Multi Poll)
- Case Study: Operation of PSMP
- Format and Content of the PSMP-Frame
- Overview
TInterworking Issues within the Physical Layer
- The Perspective of the UE
- Constraints
- Multiple Radio Issue, Measurements, Supported / Preferred Handover Types
- Multiple Radio Issue, Measurements, Supported / Preferred Handover Types
- Handover Types: Make before Break vs. Break before Make
- Physical and Time Behavior during Network Transition
- Case 1: Preferred Network fades away, Case 2: Preferred Network becomes available
- Case 1: Preferred Network fades away, Case 2: Preferred Network becomes available
- Support though the ANDSF
- Problem Description, Interworking with the ANDSF
- Problem Description, Interworking with the ANDSF
- The Connection Manager
- Constraints
- The Perspective of the Network Operator
- Constraints
- Variety of Implementation Choices, Quality of Service, Competition from UE Manufacturers, Mobility Support through the EPC, Related Network Architecture, Signaling Procedure (NBM / PMIPv6 on S2b)
- Constraints
v1.000
Search:
Advanced SearchMore Info:
General Information about this course
Schedule of this training course
Buy this book
INACON eBooks
Please have a look at our full offer