Details
Wi-Fi Integration to the 4G Mobile Network
1. Aufl.
139,99 € |
|
Verlag: | Wiley |
Format: | |
Veröffentl.: | 15.03.2018 |
ISBN/EAN: | 9781119516484 |
Sprache: | englisch |
Anzahl Seiten: | 288 |
DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.
Beschreibungen
The adoption of smartphones has had as a corollary the use of services that require streaming, such as video streaming, which is a constraint for the 4G mobile network. The integration of the network of Wi-Fi hotspots deployed by the operators adds capacity to the 4G mobile network.<br />The use of Wi-Fi technology in carrier networks is the result of developments coordinated by the IEEE, WFA and WBA standardization bodies. For its part, the 3GPP standardization body has been working to integrate Wi-Fi technology into the 4G mobile network.<br />The first part of this book presents the characteristics of the Wi-Fi radio interface. The different IEEE 802.11b / g / n / ac physical layers characterize the implementation in the 2.4 GHz ISM frequency bands and U- NII at 5 GHz. The MAC layer defines a number of media access procedures such as scanning, associating, or transferring data.<br />The second part of this book deals with the architecture of the 4G network based on the Wi-Fi interface. This architecture defines several models corresponding, on the one hand, to Wi-Fi access controlled or not, On the other hand, to a handover controlled by the network or by the mobile. The integration of Wi-Fi technology resulted in a redefinition of attachment and session set-up procedures.<br />Smartphones have the ability to activate simultaneously the two radio interfaces, LTE and Wi-Fi, which allows to direct certain services to one and / or the other of the interfaces. The ANDSF and HotSpot 2.0 functions provide the mobile with rules for network selection and traffic control to determine which traffic is to be routed to what type of interface.
<p>List of Abbreviations xi</p> <p>Introduction xxiii</p> <p><b>Chapter 1 Architecture Based on Wi-Fi Access 1</b></p> <p>1.1 Functional architecture 1</p> <p>1.1.1 Architecture based on the S2a interface 1</p> <p>1.1.2 Architecture based on the S2b interface 4</p> <p>1.1.3 Architecture based on the S2c interface 7</p> <p>1.2 Tunnel establishment 8</p> <p>1.2.1 Architecture based on the S2a interface 8</p> <p>1.2.2 Architecture based on the S2b interface 12</p> <p>1.2.3 Architecture based on the S2c interface 13</p> <p>1.3 DIAMETER protocol 14</p> <p>1.3.1 AAA server interfaces 15</p> <p>1.3.2 PCRF interfaces 20</p> <p><b>Chapter 2 MAC Layer 23</b></p> <p>2.1 Frame structure 23</p> <p>2.1.1 Frame header 23</p> <p>2.1.2 Structure of control frames 25</p> <p>2.1.3 Structure of management frames 26</p> <p>2.2 Procedures 30</p> <p>2.2.1 Timers 30</p> <p>2.2.2 Mobile registration 30</p> <p>2.2.3 Data transfer 32</p> <p>2.2.4 Clear channel assessment 34</p> <p>2.2.5 Frame fragmentation 36</p> <p>2.2.6 Standby management 36</p> <p>2.3 Security 38</p> <p>2.3.1 Security mechanism 38</p> <p>2.3.2 Security policies 39</p> <p>2.3.3 MAC header extension 39</p> <p>2.4 Quality of service 46</p> <p>2.4.1 EDCA mechanism 46</p> <p>2.4.2 Impact on the MAC header 48</p> <p><b>Chapter 3 802.11a/g Interfaces 49</b></p> <p>3.1 802.11a interface 49</p> <p>3.1.1 PLCP sub-layer 49</p> <p>3.1.2 PMD sub-layer 51</p> <p>3.2 802.11g interface 58</p> <p>3.2.1 PLCP sub-layer 58</p> <p>3.2.2 PMD sub-layer 61</p> <p><b>Chapter 4 802.11n Interface 63</b></p> <p>4.1 MAC layer evolution 63</p> <p>4.1.1 Management frames 64</p> <p>4.1.2 Structure of the MAC header 66</p> <p>4.1.3 Frame aggregation 68</p> <p>4.1.4 Control frames 70</p> <p>4.2 PLCP sub-layer 72</p> <p>4.3 PMD sub-layer 75</p> <p>4.3.1 Transmission chain 75</p> <p>4.3.2 Frequency plan 78</p> <p>4.3.3 Frequency multiplexing 78</p> <p>4.3.4 Space multiplexing 79</p> <p>4.3.5 Modulation and coding scheme 81</p> <p><b>Chapter 5 802.11ac Interface 85</b></p> <p>5.1 MAC layer 85</p> <p>5.1.1 Management frame evolution 85</p> <p>5.1.2 Control frames 89</p> <p>5.1.3 MAC header structure 90</p> <p>5.2 PLCP sub-layer 92</p> <p>5.3 PMD sub-layer 94</p> <p>5.3.1 Transmission chain 94</p> <p>5.3.2 Frequency plan 99</p> <p>5.3.3 Frequency multiplexing 100</p> <p>5.3.4 Spatial multiplexing 101</p> <p>5.3.5 Modulation and coding scheme 102</p> <p><b>Chapter 6 Mutual Authentication 105</b></p> <p>6.1 802.1x mechanism 105</p> <p>6.1.1 EAPOL protocol 107</p> <p>6.1.2 EAP 109</p> <p>6.1.3 RADIUS messages 111</p> <p>6.1.4 Authentication procedure 112</p> <p>6.2 Key management 114</p> <p>6.2.1 Key hierarchy 114</p> <p>6.2.2 Four-way handshake procedure 115</p> <p>6.2.3 Group Key Handshake procedure 116</p> <p>6.3 Application to the 4G mobile network 117</p> <p>6.3.1 EAP-AKA method 117</p> <p>6.3.2 Mutual authentication procedure 118</p> <p>6.3.3 Procedure for rapid renewal of authentication 121</p> <p>6.3.4 Application to the MIPv4 FA mechanism 122</p> <p><b>Chapter 7 SWu Tunnel Establishment 125</b></p> <p>7.1 IPSec mechanism 125</p> <p>7.1.1 Header extensions 127</p> <p>7.1.2 IKEv2 protocol 131</p> <p>7.1.3 Procedure 137</p> <p>7.2 Application to the 4G mobile network 142</p> <p>7.2.1 SWu tunnel establishment procedure 142</p> <p>7.2.2 Procedure for rapid renewal of authentication 145</p> <p><b>Chapter 8 S2a/S2b Tunnel Establishment 147</b></p> <p>8.1 PMIPv6 mechanism 147</p> <p>8.1.1 Mobility extension 148</p> <p>8.1.2 Procedures 149</p> <p>8.1.3 Application to the 4G mobile network 151</p> <p>8.2 GTPv2 mechanism 155</p> <p>8.2.1 Trusted Wi-Fi access 156</p> <p>8.2.2 Untrusted Wi-Fi access 158</p> <p>8.3 MIPv4 FA mechanism 158</p> <p>8.3.1 Components of mobility 158</p> <p>8.3.2 Foreign agent discovery 159</p> <p>8.3.3 Registration 160</p> <p>8.3.4 Procedure 160</p> <p>8.3.5 Application to the 4G mobile network 162</p> <p><b>Chapter 9 S2c Tunnel Establishment 165</b></p> <p>9.1 MIPv6 mechanism 165</p> <p>9.1.1 IPv6 header extensions 166</p> <p>9.1.2 ICMPv6 messages 169</p> <p>9.1.3 Procedures 171</p> <p>9.2 DSMIPv6 mechanism 177</p> <p>9.3 Application to the 4G mobile network 178</p> <p>9.3.1 Trusted Wi-Fi access 178</p> <p>9.3.2 Untrusted Wi-Fi access 179</p> <p>9.3.3 IFOM function 180</p> <p><b>Chapter 10 Network Discovery and Selection 183</b></p> <p>10.1 Mechanisms defined by 3GPP organization 183</p> <p>10.1.1 ANDSF function 183</p> <p>10.1.2 RAN assistance 191</p> <p>10.2 Mechanisms defined by IEEE and WFA organizations 192</p> <p>10.2.1 Information elements provided by the beacon 194</p> <p>10.2.2 Information elements provided by the ANQP server 195</p> <p><b>Chapter 11 Carrier Aggregation 201</b></p> <p>11.1 Functional architecture 201</p> <p>11.2 Protocol architecture 202</p> <p>11.2.1 LWA 202</p> <p>11.2.2 LWIP aggregation 205</p> <p>11.2.3 LAA aggregation 207</p> <p>11.3 Procedures 207</p> <p>11.3.1 LWA 207</p> <p>11.3.2 LWIP aggregation 211</p> <p>11.3.3 LAA aggregation 212</p> <p>11.4 PDCP 214</p> <p><b>Chapter 12 MPTCP Aggregation 217</b></p> <p>12.1 Functional architecture 217</p> <p>12.2 TCP 218</p> <p>12.2.1 TCP header 218</p> <p>12.2.2 Opening and closing a connection 220</p> <p>12.2.3 Data transfer 221</p> <p>12.2.4 Slow Start and Congestion Avoidance mechanisms 221</p> <p>12.2.5 Fast Retransmit and Fast Recovery mechanisms 222</p> <p>12.2.6 ECN mechanism 224</p> <p>12.3 MPTCP 226</p> <p>12.3.1 Establishment of MPTCP connection 227</p> <p>12.3.2 Adding a TCP connection 227</p> <p>12.3.3 Data transfer 229</p> <p>12.3.4 Closing an MPTCP connection 231</p> <p>12.3.5 Adding and removing an address 233</p> <p>12.3.6 Return to the TCP connection 234</p> <p>Bibliography 235</p> <p>Index 239</p>
PEREZ, ANDRE - Consultant
Diese Produkte könnten Sie auch interessieren:
Ermittlung der Wicklungstemperatur einer neunphasigen Synchronmaschine mit COMSOL
von: Yvonne Schröder
18,99 €