Home Page Icon
Home Page
Table of Contents for
Table of Contents
Close
Table of Contents
by André Pérez
Wi-Fi Integration to the 4G Mobile Network
Cover
Title
Copyright
List of Abbreviations
Introduction
I.1. 4G mobile network
I.2. Wi-Fi network
I.3. Wi-Fi integration into the 4G mobile network
I.4. Wi-Fi and LTE access aggregation
1 Architecture Based on Wi-Fi Access
1.1. Functional architecture
1.2. Tunnel establishment
1.3. DIAMETER protocol
2 MAC Layer
2.1. Frame structure
2.2. Procedures
2.3. Security
2.4. Quality of service
3 802.11a/g Interfaces
3.1. 802.11a interface
3.2. 802.11g interface
4 802.11n Interface
4.1. MAC layer evolution
4.2. PLCP sub-layer
4.3. PMD sub-layer
5 802.11ac Interface
5.1. MAC layer
5.2. PLCP sub-layer
5.3. PMD sub-layer
6 Mutual Authentication
6.1. 802.1x mechanism
6.2. Key management
6.3. Application to the 4G mobile network
7 SWu Tunnel Establishment
7.1. IPSec mechanism
7.2. Application to the 4G mobile network
8 S2a/S2b Tunnel Establishment
8.1. PMIPv6 mechanism
8.2. GTPv2 mechanism
8.3. MIPv4 FA mechanism
9 S2c Tunnel Establishment
9.1. MIPv6 mechanism
9.2. DSMIPv6 mechanism
9.3. Application to the 4G mobile network
10 Network Discovery and Selection
10.1. Mechanisms defined by 3GPP organization
10.2. Mechanisms defined by IEEE and WFA organizations
11 Carrier Aggregation
11.1. Functional architecture
11.2. Protocol architecture
11.3. Procedures
11.4. PDCP
12 MPTCP Aggregation
12.1. Functional architecture
12.2. TCP
12.3. MPTCP
Bibliography
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover
Next
Next Chapter
Title
Table of Contents
Cover
Title
Copyright
List of Abbreviations
Introduction
I.1. 4G mobile network
I.2. Wi-Fi network
I.3. Wi-Fi integration into the 4G mobile network
I.4. Wi-Fi and LTE access aggregation
1 Architecture Based on Wi-Fi Access
1.1. Functional architecture
1.2. Tunnel establishment
1.3. DIAMETER protocol
2 MAC Layer
2.1. Frame structure
2.2. Procedures
2.3. Security
2.4. Quality of service
3 802.11a/g Interfaces
3.1. 802.11a interface
3.2. 802.11g interface
4 802.11n Interface
4.1. MAC layer evolution
4.2. PLCP sub-layer
4.3. PMD sub-layer
5 802.11ac Interface
5.1. MAC layer
5.2. PLCP sub-layer
5.3. PMD sub-layer
6 Mutual Authentication
6.1. 802.1x mechanism
6.2. Key management
6.3. Application to the 4G mobile network
7 SWu Tunnel Establishment
7.1. IPSec mechanism
7.2. Application to the 4G mobile network
8 S2a/S2b Tunnel Establishment
8.1. PMIPv6 mechanism
8.2. GTPv2 mechanism
8.3. MIPv4 FA mechanism
9 S2c Tunnel Establishment
9.1. MIPv6 mechanism
9.2. DSMIPv6 mechanism
9.3. Application to the 4G mobile network
10 Network Discovery and Selection
10.1. Mechanisms defined by 3GPP organization
10.2. Mechanisms defined by IEEE and WFA organizations
11 Carrier Aggregation
11.1. Functional architecture
11.2. Protocol architecture
11.3. Procedures
11.4. PDCP
12 MPTCP Aggregation
12.1. Functional architecture
12.2. TCP
12.3. MPTCP
Bibliography
Index
End User License Agreement
List of Tables
Chapter 1 Architecture Based on Wi-Fi Access
Table 1.1. DIAMETER messages on the SWx interface
Table 1.2. DIAMETER messages on the STa and SWa interfaces
Table 1.3. DIAMETER messages on the S6b interface
Table 1.4. DIAMETER messages on the SWm interface
Table 1.5. DIAMETER messages on the Gx, Gxa and Gxb interfaces
Chapter 2 MAC Layer
Table 2.1. To DS and From DS subfield values
Table 2.2. Meaning of Address fields
Table 2.3. Correspondence between the priority levels and the access categories
Table 2.4. Default values of EDCA parameters
Chapter 3 802.11a/g Interfaces
Table 3.1. Rates of DATA field
Table 3.2. Parameters of the modulation and coding scheme
Table 3.3. Values of the duration of the different parameters
Table 3.4. Parameters of OFDM multiplexing
Table 3.5. U-NII band at 5 GHz
Table 3.6. European regulations
Chapter 4 802.11n Interface
Table 4.1. Features of MAC layer
Table 4.2. Information of HT Capabilities Info field
Table 4.3. Information of Link Adaptation Control field
Table 4.4. HT-SIG field structure
Table 4.5. Characteristics of PMD sub-layer
Table 4.6. OFDM multiplexing parameters
Table 4.7. Parameters of the modulation and coding scheme 20 MHz bandwidth
Table 4.8. Parameters of the modulation and coding scheme 40 MHz bandwidth
Table 4.9. MCS 32 parameters
Chapter 5 802.11ac Interface
Table 5.1. Subfields of the VHT Capabilities Info field
Table 5.2. Subfields of Control Middle field
Table 5.3. Structure of VHT-SIG-A field
Table 5.4. Parameters of the modulation and coding scheme – Bandwidth of 20 MHz
Table 5.5. Parameters of the modulation and coding scheme – Bandwidth of 40 MHz
Table 5.6. Parameters of the modulation and coding scheme – Bandwidth of 80 MHz
Table 5.7. Parameters of the modulation and coding scheme Bandwidth of 160 MHz and 80+80 MHz
Chapter 7 SWu Tunnel Establishment
Table 7.1. Block types
Chapter 8 S2a/S2b Tunnel Establishment
Table 8.1. GTPv2-C messages
Table 8.2. Data transfer: CN to MN
Chapter 9 S2c Tunnel Establishment
Table 9.1. Correspondence table between the HoA and CoA addresses
Table 9.2. Correspondence table between the BID and FID identifiers
Chapter 10 Network Discovery and Selection
Table 10.1. ANQP information elements
Chapter 12 MPTCP Aggregation
Table 12.1. ECN field in IP header
Table 12.2. MPTCP options
List of Illustrations
Introduction
Figure I.1. 4G mobile network architecture
Figure I.2. Bearer establishment
Figure I.3. Wi-Fi network architecture
Figure I.4. Protocol architecture
Figure I.5. Session establishment – Architecture based on S2a interface
Figure I.6. Session establishment – Architecture based on S2b interface
Figure I.7. Session establishment – Architecture based on S2c interface
Figure I.8. Wi-Fi and LTE access aggregation
Chapter 1 Architecture Based on Wi-Fi Access
Figure 1.1. Functional architecture based on the S2a interface
Figure 1.2. Connection to the PDN network for architecture based on the S2a interface
Figure 1.3. Functional architecture based on the S2b interface
Figure 1.4. Connection to the PDN network for architecture based on S2b interface
Figure 1.5. Functional architecture based on S2c interface Trusted Wi-Fi access
Figure 1.6. Functional architecture based on S2c interface Untrusted Wi-Fi access
Figure 1.7. Protocol architecture based on S2a interface Control plane for PMIPv6 mechanism
Figure 1.8. Protocol architecture based on S2a interface User plane for PMIPv6 mechanism
Figure 1.9. Protocol architecture based on S2a interface Control plane for MIPv4 FA mechanism
Figure 1.10. Protocol architecture based on S2a interface User plane for MIPv4 FA mechanism
Figure 1.11. Protocol architecture based on S2a interface Control plane for GTPv2 mechanism
Figure 1.12. Protocol architecture based on S2a interface User plane for GTPv2 mechanism
Figure 1.13. Protocol architecture based on S2b interface Control plane for PMIPv6 mechanism
Figure 1.14. Protocol architecture based on S2b interface User plane for PMIPv6 mechanism
Figure 1.15. Protocol architecture based on S2c interface Control plane for trusted Wi-Fi access
Figure 1.16. Protocol architecture based on S2c interface User plane for trusted Wi-Fi access
Figure 1.17. AAA server interfaces using the DIAMETER protocol
Figure 1.18. PCRF interfaces using the DIAMETER protocol
Chapter 2 MAC Layer
Figure 2.1. MAC header structure
Figure 2.2. Structure of control frames
Figure 2.3. Structure of the BEACON management frame
Figure 2.4. Structure of the AUTHENTICATION management frame
Figure 2.5. Structure of management frames relating to the association phase
Figure 2.6. Structure of the management frames DISASSOCIATION and DEAUTHENTICATION
Figure 2.7. Active scanning
Figure 2.8. Use of control frames for data transfer
Figure 2.9. Backoff mechanism
Figure 2.10. Duration field for RTS and CTS control frames
Figure 2.11. Duration field for ACK control frame
Figure 2.12. Duration field for the PS-POLL control frame
Figure 2.13. Frame fragmentation
Figure 2.14. Standby management
Figure 2.15. Format of WEP encapsulation
Figure 2.16. WEP processing of the transmission chain
Figure 2.17. WEP processing of the reception chain
Figure 2.18. Format of TKIP encapsulation
Figure 2.19. TKIP processing of the transmission chain
Figure 2.20. TKIP processing of the reception chain
Figure 2.21. Format of CCMP encapsulation
Figure 2.22. CCMP processing of the transmission chain
Figure 2.23. CCMP processing of the reception chain
Figure 2.24. Evolution of MAC header structure
Chapter 3 802.11a/g Interfaces
Figure 3.1. Format of PLCP frame
Figure 3.2. Transmission and reception chain
Figure 3.3. Scrambler diagram
Figure 3.4. Convolutional encoder diagram
Figure 3.5. Structure of the preamble and OFDM symbols
Figure 3.6. PLCP frame for ERP-HR / DSSS mode
Figure 3.7. PLCP frame for ERP-OFDM mode
Figure 3.8. PLCP frame for DSSS-OFDM mode
Figure 3.9. ISM band at 2.4 GHz
Chapter 4 802.11n Interface
Figure 4.1. Structure of MAC header
Figure 4.2. Structure of A-MPDU frame
Figure 4.3. Structure of A-MSDU frame
Figure 4.4. Block acknowledgment
Figure 4.5. Control frame structure
Figure 4.6. PLCP frame structure
Figure 4.7. Transmission chain – Diagram 1
Figure 4.8. Transmission chain – Diagram 2
Figure 4.9. Frequency plan
Figure 4.10. MIMO mechanism
Figure 4.11. STBC mechanism
Figure 4.12. Beamforming mechanism
Chapter 5 802.11ac Interface
Figure 5.1. Bandwidth negotiation
Figure 5.2. MAC header structure
Figure 5.3. PLCP frame structure
Figure 5.4. Generation of L-SIG and VHT-SIG-A fields
Figure 5.5. Generation of VHT-SIG-B field – Data unit for a single user Radio channel bandwidths of 20, 40, and 80 MHz
Figure 5.6. Generation of VHT-SIG-B field – Data unit for multi-user Radio channel bandwidths of 20, 40, and 80 MHz
Figure 5.7. Generation of VHT-SIG-B field – Data unit for a single user Radio channel bandwidth of 160 MHz
Figure 5.8. Generation of VHT-SIG-B field – Data unit for a single user Radio channel bandwidth of 80+80 MHz
Figure 5.9. Generation of DATA field – Data unit for a single user BCC encoder – Radio channel bandwidths of 20, 40 and 80 MHz radio
Figure 5.10. Generation of DATA field – Data unit for a single user LDPC encoder – Radio channel bandwidths of 20, 40 and 80 MHz radio
Figure 5.11. Generation of DATA field – Data unit for multi-user Radio channel bandwidths of the of 20, 40 and 80 MHz
Figure 5.12. Generation of DATA field – Data unit for a single user BCC encoder – Radio channel bandwidth of the 160 MHz
Figure 5.13. Generation of DATA field – Data for a single user LDPC encoder – Radio channel bandwidth of the 160 MHz
Figure 5.14. Generation of DATA field – Data unit for a single user BCC encoder – Radio channel bandwidth of 80 + 80 MHz
Figure 5.15. Generation of DATA field – Data unit for a single user LDPC encoder – Radio channel bandwidth of 80 + 80 MHz
Figure 5.16. Frequency plan Channel bandwidths of 20, 40, 80 and 160 MHz
Figure 5.17. Frequency plan Channel bandwidths of 80+80 MHz
Figure 5.18. SU-MIMO and MU-MIMO mechanism
Chapter 6 Mutual Authentication
Figure 6.1. Components of 802.1x mechanism
Figure 6.2. Protocol architecture for 802.1x mechanism
Figure 6.3. Structure of EAPOL message
Figure 6.4. EAP message structure
Figure 6.5. Common exchanges in the authentication procedure
Figure 6.6. Four-way handshake procedure
Figure 6.7. Group key handshake procedure
Figure 6.8. Mutual authentication procedure
Figure 6.9. Procedure for rapid renewal of authentication
Chapter 7 SWu Tunnel Establishment
Figure 7.1. AH extension format
Figure 7.2. ESP extension format
Figure 7.3. Position of AH extension
Figure 7.4. Position of ESP extension
Figure 7.5. IKE message header format
Figure 7.6. Format of generic block header
Figure 7.7. IKE_SA_INIT exchange
Figure 7.8. IKE_AUTH exchange
Figure 7.9. CREATE_CHILD_SA exchange creation of ESP/AH SA
Figure 7.10. CREATE_CHILD_SA exchange renewal of IKE SA key
Figure 7.11. CREATE_CHILD_SA exchange renewal of ESP/AH SA key
Figure 7.12. SWu tunnel establishment procedure
Figure 7.13. Procedure for rapid renewal of authentication
Chapter 8 S2a/S2b Tunnel Establishment
Figure 8.1. PMIPv6 architecture
Figure 8.2. Mobile node attachment to the LMA function IPv6 configuration
Figure 8.3. MAG function change
Figure 8.4. S2a tunnel establishment using PMIPv6 mechanism
Figure 8.5. S2b tunnel establishment using PMIPv6 mechanism
Figure 8.6. S2a tunnel establishment using GTPv2 mechanism
Figure 8.7. Components of mobility
Figure 8.8. Data transfer
Figure 8.9. S2a tunnel establishment using MIPv4 FA mechanism
Chapter 9 S2c Tunnel Establishment
Figure 9.1. Components for MIPv6 mechanism
Figure 9.2. Mobility extension format
Figure 9.3. Attachment of the mobile node to the home agent
Figure 9.4. Data transfer
Figure 9.5. Network change of the mobile node
Figure 9.6. Return of the mobile node to the host network
Figure 9.7. Return Routability procedure
Figure 9.8. S2c tunnel establishment Trusted Wi-Fi access
Figure 9.9. S2c tunnel establishment Untrusted Wi-Fi access
Chapter 10 Network Discovery and Selection
Figure 10.1. ANDI information
Figure 10.2. ISMP policy
Figure 10.3. IFOM rules
Figure 10.4. MAPCOM rules
Figure 10.5. NSWO rules
Figure 10.6. IARP rules
Figure 10.7. WLANSP policy
Figure 10.8. Wi-Fi access network preferences
Figure 10.9. GAS/ANQP exchanges
Chapter 11 Carrier Aggregation
Figure 11.1. Functional architecture for LTE and Wi-Fi carrier aggregation
Figure 11.2. Protocol architecture for LWA aggregation eNB and AP entities are collocated
Figure 11.3. Protocol architecture for LWA aggregation eNB and AP entities are distant
Figure 11.4. Protocol architecture for LWIP aggregation
Figure 11.5. WT Addition procedure
Figure 11.6. WT Modification procedure initiated by the eNB entity
Figure 11.7. WT Modification procedure initiated by the access point
Figure 11.8. WT Release procedure initiated by the eNB entity
Figure 11.9. WT Release procedure initiated by the access point
Figure 11.10. LWIP and IPSec tunnel establishment
Figure 11.11. LBT mechanism –FBE option
Figure 11.12. LBT mechanism –LBE option
Figure 11.13. PDCP frame structure containing IP packets or RRC messages
Figure 11.14. PDCP frame structure containing Status Report messages
Chapter 12 MPTCP Aggregation
Figure 12.1. Architecture for MPTCP aggregation
Figure 12.2. Format of TCP header
Figure 12.3. Slow Start and Congestion Avoidance mechanisms
Figure 12.4. Fast Retransmit and Fast Recovery mechanisms
Figure 12.5. ECN field in IP header
Figure 12.6. ECN field in TCP header
Figure 12.7. Format of MPTCP option
Figure 12.8. Establishment of an MPTCP connection
Figure 12.9. Adding a TCP connection
Figure 12.10. Data transfer
Figure 12.11. Closing a MPTCP connection
Figure 12.12. Abrupt closure of MPTCP connection
Guide
Cover
Table of Contents
Begin Reading
Pages
C1
iii
iv
v
xi
xii
xiii
xiv
xv
xvi
xvii
xviii
xix
xx
xxi
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
G1
G2
G3
G4
G5
G6
G7
e1
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset