Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Ahson S., Ilyas M. (Ed) — WiMAX: Standards and Security
Ahson S., Ilyas M. (Ed) — WiMAX: Standards and Security



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: WiMAX: Standards and Security

Àâòîðû: Ahson S., Ilyas M. (Ed)

Àííîòàöèÿ:

Part of the WiMAX Handbook, this volume focuses on the standards and security issues of WiMAX. The book examines standardized versus proprietary solutions for wireless broadband access, reviews the core medium access control protocol of WiMAX systems, and presents carriers' perspectives on wireless services. It also discusses the main mobility functions of the IEEE 802.16e standard, describes how to speed up WiMAX handover procedures, presents the 802.16 mesh protocol, and surveys the testing and certification processes used for WiMAX products. In addition, the book reviews the security features of both IEEE 802.16 and WiMAX


ßçûê: en

Ðóáðèêà: Òåõíîëîãèÿ/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Ãîä èçäàíèÿ: 2007

Êîëè÷åñòâî ñòðàíèö: 264

Äîáàâëåíà â êàòàëîã: 31.12.2007

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
3rd plugfest test architecture, configurations for      184—187
5th plugfest architecture, WiMAX system, testing      187—189
Abstract test suite (ATS), WiMAX Forum system      182—183
Access methods, functionality and performance testing      178
Access points (APs), WiMAX security threats      234
Active service flows, media access (MAC) layer      50—51
Adaptive antenna system (AAS), IEEE 802.16-2004 standard      24—25
Adaptive antenna system (AAS), IEEE 802.16e-2005 standard      2829
Adaptive modulation, IEEE 802.16-2004 standard      24
Addressing nodes, mesh topology, media access (MAC) layer      51—52
Addressing nodes, mesh topology, network addressing      164—165
Adjacent channel leakage ratio (ACLR), transmitter measurements      191—192
Admission control, IEEE 802.16 quality-of-service standard      67
Admission control, operation simulation      69—72
Admitted service flows, media access (MAC) layer      50
Advanced encryption standard (AES), modes for      223—226
Advanced encryption standard (AES), WiMAX Forum certi?cation      182
Advanced wireless services (AWS), WiMAX performance evaluation      81
Advertisement, network topology acquisition      109
Antenna bandwidth, propagation environments      83—84
Association procedure, handover operations      117
Association procedure, handover operations, levels of      131—133
Association procedure, network topology acquisition      111—114
Authentication protocols, mesh networking security      168—169
Authentication protocols, privacy key management version 1      236—237
Authentication protocols, WiMAX security standards      217—219
Authorization keys (AKs), mesh networking connections      169
Authorization keys (AKs), privacy key management (PKM) protocol      220—221
Authorization keys (AKs), privacy key management (PKM) protocol version 2 derivation      242—244
Authorization keys (AKs), vulnerabilities      227
Authorization keys (AKs), WiMAX security standards      216—217
Authorization security association, contents of      216—217
Authorization security association, WiMAX security system      200—203
Automatic repeat request (ARQ)      182
Automatic repeat request (ARQ), MPDU retransmission scheme      40—41
Backbone hop-by-hop security, mesh networking      169—170
Bandwidth allocation scheme, handover model simulation and results      141—143
Bandwidth allocation scheme, IEEE 802.16 quality-of-service standard, admission control simulation      69—72
Bandwidth allocation scheme, media access (MAC) layer      44—45
Bandwidth allocation scheme, media access (MAC) layer, mesh topology      52—53
Bandwidth request header, MAC protocol, data units      211—213
Base station (BS), 5th plugfest testing of      187—189
Base station (BS), handover operations, downlink targeting      116—117
Base station (BS), handover operations, fast BS switching      118 120—121
Base station (BS), handover operations, macro diversity handover      118—120
Base station (BS), handover operations, termination procedures      117
Base station (BS), media access (MAC) layer, point to multiple point (PMP) topology      36—37 212—213
Base station (BS), mesh networking security      169
Base station (BS), mobility support functions      104
Base station (BS), network security properties      198—199
Base station (BS), network topology acquisition, advertisement      109
Base station (BS), network topology acquisition, neighbor BS scanning      109—111
Base station (BS), plugfest testing of      184—187
Base station (BS), transmission scheduling      154
Base station (BS), transmitter power level controls      189—190
Basic channels, mesh networking, TDMA framing and transmission timing      153—154
Basic service set (BSS), IEEE 802.11 standard      7—8
Best-effort (BE) service, IEEE 802.16 quality-of-service standard      66
Best-effort (BE) service, IEEE 802.16 quality-of-service standard, scheduling      69
Best-effort (BE) service, media access (MAC) layer, uplink, scheduling      44
Best-effort (BE) service, mesh networking, broadcast channel      158
Best-effort (BE) service, power-saving mechanisms      105—109
Bit error rate (BER), receiver testing      192
Blocking probability, IEEE 802.16 quality-of-service standard, admission control simulation      69—72
Bluetooth standard, evolution of      4—6
Bluetooth standard, structure and properties      12—14
Broadband wireless access (BWA) systems, IEEE 802.11 standard and      206
Broadband wireless access (BWA) systems, voice over Internet protocol (VoIP)      129—131
Broadband wireless access (BWA) systems, WiMAX performance evaluation      80
Broadcast channels, mesh networking, TDMA framing and transmission timing      153—154
Cancellation, handover operations      116
Carrier sense multiple access (CSMA), WiMAX security      234
Carrier to interference noise ratio (CINR), network topology acquisition, neighbor BS scanning      109—111
CBC message authentication code (CCM), advanced encryption standard      223—226
Cell reselection, handover operations      115—116
Cellular networks, competing technologies      15—16
Cellular networks, cost issues      15
Cellular networks, design issues      15
Cellular networks, evolution of      8—11
Cellular networks, IEEE 802.16e standard for      209
Cellular networks, throughput performance      15—16
Cellular networks, WiMAX standardization for      209
Centralized scheduling, media access (MAC) layer, mesh topology      53—54
Centralized scheduling, mesh networking      149—150
Centralized scheduling, mesh networking, data channels      158—161
Centralized scheduling, mesh networking, quality-of-service convergence sublayer      165—167
Certification profiles, interoperability and certification testing      180—183
Certification program, abstract test suite      183
Certification program, WiMAX systems      179—183 206—207
Channel quality information channel identifier (CQICH_ID), mobile subscriber stations      140—141
Channel utilization, IEEE 802.16 quality-of-service standard, scheduling simulation      72—74
Channel utilization, mesh logical channels, transmission scheduling      154—161
Code division multiple access (CDMA), cellular networks      8—11
Code division multiple access (CDMA), handover operations, association levels      132—133
Code division multiple access (CDMA), predicted handover scheme      138—141
Common part sublayer, MAC architecture      25—27
Complementary error function, propagation environments      85—87
Conformance testing, defined      176
Conformance testing, WiMAX systems      177—178
Connection identifiers (CID), IEEE 802.16 PMP      26—27
Connection identifiers (CID), media access (MAC) layer, bandwidth allocation requests and grants      44—45
Connection identifiers (CID), media access (MAC) layer, mesh topology      51—52
Connection identifiers (CID), media access (MAC) layer, point to multiple point (PMP) topology      36—37 213
Connection identifiers (CID), media access (MAC) layer, service flows      50—51
Connection identifiers (CID), mesh networking connections      162—164
Connection identifiers (CID), network security properties      198—199
Connection maintenance, media access (MAC) layer      47—49
Constellation error, transmitter testing for      190
Contention resolution, media access (MAC) layer, request transmission      46—47
Control subframes, mesh networking, TDMA, framing and transmission timing      152—154
Convergence sublayer, MAC architecture      25—26
Convergence sublayer, mesh networking      149—150
Convergence sublayer, mesh networking, quality-of-service (QoS) levels      165—167
Coordinated distributed scheduling messages, mesh networking, distributed election scheduling broadcast channels      154—157
Cumulative distribution function (CDF), propagation environments      87—90
Cyclic redundancy check (CRC), MAC layer threats      233—234
Data channels, mesh networking, quality-of-service convergence sublayer      165—167
Data channels, mesh networking, TDMA framing and transmission timing      153—154
Data channels, mesh networking, transmission scheduling      158—161
Data encryption standard (DES), privacy key management version 1      238—240
Data encryption standard (DES), WiMAX security system, protocols for      222—223
Data encryption standard (DES), WiMAX security system, security associations and      216—217
Data rates, WiMAX system performance      90—92
Data security association, contents of      216—217
Data security association, WiMAX security system      200—203
Decentralized scheduling, mesh networking      149—150
Decision and initiation, handover operations      116
Demand assigned multiple access (DAMA), media access (MAC) layer, bandwidth allocation requests      44—45
Device under test (DUT) configuration, adjacent channel leakage ratio measurements      191—192
Device under test (DUT) configuration, receiver testing      192
Device under test (DUT) configuration, transmitter power level controls      189—190
Device under test (DUT) configuration, transmitter spectral flatness      190
Device under test (DUT) configuration, transmitter spectral mask      191
Direct-sequence spread spectrum (DSSS) waveform, IEEE 802.11 standard      6—8
Discontinuous reception, mobility support functions and      104
Disruption time (DT), handover model simulation and results      141—143
Disruption time (DT), handover procedures      130—131
Distributed election scheduling broadcast channels, mesh transmission scheduling      154—157
Distributed scheduling, media access (MAC) layer, mesh topology      52—53
Distributed scheduling, mesh networking, data channels      158—161
DOCSIS BPI+ protocol, WiMAX security and      197—198
Downlink channel descriptor (DCD), network topology advertisement      109
Downlink map (DL-MAP), media access (MAC) layer, point to multiple point (PMP) topology      213
Downlink scheduling scheme, IEEE 802.16 quality-of-service standard simulation      72—74
Downlink targeting, handover synchronization      116—117
DREG-CMD message, paging operation      121—124
DREG-REQ, paging operation      121—124
Drops, in handover operations      117—118
Duplex techniques, MAC PDU transmission      39—40
Dynamic security associations, WiMAX system      215—216
Educational broadband services (EBS), WiMAX performance evaluation      80
Emergency systems, IEEE 802.16e standard for      209
Emergency systems, WiMAX standardization for      209
Encapsulation technology, privacy sublayers      27—28
Enter network code, paging operation      124
Error vector magnitude (EVM), transmitter constellation error      190
ETSI HIPERLAN standard, structure and properties      11—12
Experimental data, WiMAX system performance      92
Extended real-time polling service (ErtPS), IEEE 802.16e-2005 standard      29
Extended service set (ESS), IEEE 802.11, standard      7—8
Extensible authentication protocol (EAP), message systems in      218
Extensible authentication protocol (EAP), WiMAX security system      203 219
Fading characteristics, propagation environments      84—85
Fast base station switching (FBSS), handover operations overview      118—119
Fast Fourier transform (FFT), handover model simulation and results      141—143
Fixed broadband access, propagation environments      83—84
Fixed WiMAX systems, performance evaluation      78—79
Forward error correction, receiver testing      192
Frequency bands, IEEE 802.16 standards for      207
Frequency bands, WiMAX performance evaluation      79—81
Frequency division duplex (FDD), MAC PDU transmission      39—40
Frequency division duplex (FDD), WiMAX system performance, data rates      90—92
Friis' power transmission formula, propagation environments      82—83
Gaussian distribution model, propagation environments      85—87
Generic MAC header (GMH), protocol data units      210—212
Generic packet convergence sublayer (GPCS), IEEE 802.16g standard      31
Global System for Mobile communications (GSM), cellular networks      8—11
Grant mechanisms, IEEE 802.16 quality-of-service standard      67
Guard channel method (GCM), handover procedures      130—131
Handover (HO) function, base station downlink synchronization      116—117
Handover (HO) function, base station termination      117
Handover (HO) function, cancellation operations      116
Handover (HO) function, cell reselection      115—116
Handover (HO) function, decision and initiation operations      116
Handover (HO) function, drops during      117—118
Handover (HO) function, fast BS switching      120—121
Handover (HO) function, IEEE 802.16e-2005 standard      29
Handover (HO) function, IEEE 802.16e-2005 standard, legacy procedures      131—133
Handover (HO) function, IEEE 802.16e-2005 standard, mobility support and      104
Handover (HO) function, macro diversity      118—120
Handover (HO) function, mobility support operations      114—115
Handover (HO) function, network entry/reentry      118
Handover (HO) function, network topology acquisition      109—114
Handover (HO) function, ranging operations      117
Handover (HO) function, scanning and association results      117
Handover (HO) function, simulation model and results      141—143
Harmonics, transmitter measurements with      192
Hashed message authentication code (HMAC), creation of      217—218
Hashed message authentication code (HMAC), mesh networking connections      163—164
Hashed message authentication code (HMAC), mesh networking connections, security authentication      169
Hashed message authentication code (HMAC), privacy key management version 1      237—238
Hashed message authentication code (HMAC), WiMAX security system      203
Hashed message authentication code (HMAC), WiMAX security system, authentication protocols      217—218
Hashed message authentication code (HMAC), WiMAX security system, authorization keys      217
High-speed downlink packet access (HSDPA), standard, cellular networks      10—11
HIPERLAN WLAN technology standard, evolution of      11—12
HiperMAN standard, development of      207
Identifiers, mesh networking connections      162—164
Idle mode, network reentry from      125—126
Idle mode, paging operation timer      121—124
IEEE 802 standards, structure and properties      4—8
IEEE 802.11 standard, broadband wireless access and      206
IEEE 802.11 standard, complementary technologies      16—17
IEEE 802.11 standard, network backbone      208—209
IEEE 802.11 standard, structure and properties      6—8
IEEE 802.15 standard, complementary technologies      17
IEEE 802.16 standard, evolution of      20 206
IEEE 802.16 standard, fixed and mobile standards      78—79
IEEE 802.16 standard, frequency bands      79—81
IEEE 802.16 standard, mesh topology      26—27
IEEE 802.16 standard, mesh topology, network security issues      168—171
IEEE 802.16 standard, mesh topology, networking applications      162—167
IEEE 802.16 standard, mesh topology, overview      147—150
IEEE 802.16 standard, mesh topology, physical layer specifications      150—151
IEEE 802.16 standard, mesh topology, time division multiple access      150—162
IEEE 802.16 standard, overview of      21—22
IEEE 802.16 standard, proprietary solutions vs.      20—21
IEEE 802.16 standard, WiMAX security and      197—198
IEEE 802.16 Task Group E, competing technologies      14—15
IEEE 802.16-2001 standard, development of      230
IEEE 802.16-2004 standard, adaptive antenna system (AAS)      24
IEEE 802.16-2004 standard, adaptive modulation      24
IEEE 802.16-2004 standard, evolution of      22—28
IEEE 802.16-2004 standard, interoperability and certification testing      179—183
IEEE 802.16-2004 standard, MAC layer      25—28
IEEE 802.16-2004 standard, nonline-of-sight (NLOS) operation      230—231
IEEE 802.16-2004 standard, physical layer specifications      23—24
IEEE 802.16-2004 standard, space time coding      24—25
IEEE 802.16a standard, evolution of      22—23
IEEE 802.16b standard, evolution of      22
IEEE 802.16c standard, evolution of      21—22
IEEE 802.16d standard, media access (MAC), layer, point to multiple point (PMP) topology      37—38
IEEE 802.16e-2005 standard, evolution of      28—30
IEEE 802.16e-2005 standard, handover procedures      130—131
IEEE 802.16e-2005 standard, handover procedures, legacy procedures      131—133
IEEE 802.16e-2005 standard, mobility support, handover mechanisms      109—121
IEEE 802.16e-2005 standard, mobility support, location update      124—126
IEEE 802.16e-2005 standard, mobility support, network reentry from idle model      126—127
IEEE 802.16e-2005 standard, mobility support, overview      104
IEEE 802.16e-2005 standard, mobility support, paging operations      121—124
IEEE 802.16e-2005 standard, mobility support, power-saving mechanisms      105—109
IEEE 802.16f standard, evolution of      30
IEEE 802.16g standard, evolution of      30—31
IEEE 802.16h standard, evolution of      32
IEEE 802.16i standard, evolution of      30
IEEE 802.16j standard      33
IEEE 802.16k standard, evolution of      31—32
IEEE 802.20 standard, competing technologies      14—15
IEEE 802.20 standard, structure and properties      8
IEEE 802.22 standard, wireless regional area network (WRAN)      14
Implementation extra information for testing (IXIT) protocol, abstract test suite      182—183
In-building penetration, propagation environments      87—88
Independent basic service set (IBSS), IEEE 802.11 standard      7—8
Industrial, scienti?c, and medical (ISM) band, IEEE 802.11 standard      6—8
Interoperability testing, WiMAX systems      179—183
Jamming threats, WiMAX security      232—233
Key encryption keys (KEKs), mesh networking connections      169
Key encryption keys (KEKs), privacy key management version 1      237—238
Key encryption keys (KEKs), WiMAX security associations      217
License-Exempt (LE) Task Group, IEEE 802.16h standard      32
Line-of-sight (LOS) communication, IEEE 802.16-2004      22—23
Line-of-sight (LOS) communication, IEEE 802.16-2004, frequency limitations      207
Line-of-sight (LOS) communication, signal-aware mechanisms      134—136
Line-of-sight (LOS) communication, single carrier (SC) physical layer (PHY), specifications      209—210
Link budgets, propagation environments      84—90
Link identifiers (link IDs), media access, (MAC) layer, mesh topology      51—52
Local multipoint distribution service (LMDS), IEEE 802.16c standard and      21—22
Local multipoint distribution service (LMDS), voice over Internet protocol (VoIP)      129—131
Location update, handover operations      124—125
Log-normal shadowing deviation, propagation environments      85—87
Logical connections, mesh networking      149—160
Logical connections, mesh networking, TDMA framing and transmission timing      153—154
Logical connections, mesh networking, transmission scheduling in      154—161
Logical link control (LLC) sublayer, IEEE 802.11 standard      7—8
Low-density parity check (LDPC), IEEE 802.16e-2005 standard      28—29
MAC protocol data units (MPDUs), security threats to      233—234
MAC protocol data units (MPDUs), standard protocol structure      231—232
Macro diversity handover (MDHO), basic principles      118—120
Management information base (MIB), IEEE 802.16f standard      30
Management messages, power-saving mechanisms, mobility support      106—109
Maximum latency, IEEE 802.16 quality-of-service standard      66
Maximum sustained traffic rate (MSTR), IEEE 802.16 quality-of-service standard      66
Maximum traffic burst, IEEE 802.16 quality-of-service standard      66
Maximum transmission distance, signal-aware mechanisms      134—136
Measurement-based priority scheme (MBPS), handover procedures      130—131
Media access control (MAC) layer, certification      179—180
Media access control (MAC) layer, hash skip threshold update      124
Media access control (MAC) layer, IEEE 802 standards      4—5
Media access control (MAC) layer, IEEE 802.16-2004 standard      23 25—26 206
Media access control (MAC) layer, IEEE 802.16-2004 standard mesh networking connections      162—164
1 2 3
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå