|
|
Àâòîðèçàöèÿ |
|
|
Ïîèñê ïî óêàçàòåëÿì |
|
|
|
|
|
|
|
|
|
|
Ahson S., Ilyas M. (Ed) — WiMAX: Standards and Security |
|
|
Ïðåäìåòíûé óêàçàòåëü |
3rd plugfest test architecture, configurations for 184—187
5th plugfest architecture, WiMAX system, testing 187—189
Abstract test suite (ATS), WiMAX Forum system 182—183
Access methods, functionality and performance testing 178
Access points (APs), WiMAX security threats 234
Active service flows, media access (MAC) layer 50—51
Adaptive antenna system (AAS), IEEE 802.16-2004 standard 24—25
Adaptive antenna system (AAS), IEEE 802.16e-2005 standard 2829
Adaptive modulation, IEEE 802.16-2004 standard 24
Addressing nodes, mesh topology, media access (MAC) layer 51—52
Addressing nodes, mesh topology, network addressing 164—165
Adjacent channel leakage ratio (ACLR), transmitter measurements 191—192
Admission control, IEEE 802.16 quality-of-service standard 67
Admission control, operation simulation 69—72
Admitted service flows, media access (MAC) layer 50
Advanced encryption standard (AES), modes for 223—226
Advanced encryption standard (AES), WiMAX Forum certi?cation 182
Advanced wireless services (AWS), WiMAX performance evaluation 81
Advertisement, network topology acquisition 109
Antenna bandwidth, propagation environments 83—84
Association procedure, handover operations 117
Association procedure, handover operations, levels of 131—133
Association procedure, network topology acquisition 111—114
Authentication protocols, mesh networking security 168—169
Authentication protocols, privacy key management version 1 236—237
Authentication protocols, WiMAX security standards 217—219
Authorization keys (AKs), mesh networking connections 169
Authorization keys (AKs), privacy key management (PKM) protocol 220—221
Authorization keys (AKs), privacy key management (PKM) protocol version 2 derivation 242—244
Authorization keys (AKs), vulnerabilities 227
Authorization keys (AKs), WiMAX security standards 216—217
Authorization security association, contents of 216—217
Authorization security association, WiMAX security system 200—203
Automatic repeat request (ARQ) 182
Automatic repeat request (ARQ), MPDU retransmission scheme 40—41
Backbone hop-by-hop security, mesh networking 169—170
Bandwidth allocation scheme, handover model simulation and results 141—143
Bandwidth allocation scheme, IEEE 802.16 quality-of-service standard, admission control simulation 69—72
Bandwidth allocation scheme, media access (MAC) layer 44—45
Bandwidth allocation scheme, media access (MAC) layer, mesh topology 52—53
Bandwidth request header, MAC protocol, data units 211—213
Base station (BS), 5th plugfest testing of 187—189
Base station (BS), handover operations, downlink targeting 116—117
Base station (BS), handover operations, fast BS switching 118 120—121
Base station (BS), handover operations, macro diversity handover 118—120
Base station (BS), handover operations, termination procedures 117
Base station (BS), media access (MAC) layer, point to multiple point (PMP) topology 36—37 212—213
Base station (BS), mesh networking security 169
Base station (BS), mobility support functions 104
Base station (BS), network security properties 198—199
Base station (BS), network topology acquisition, advertisement 109
Base station (BS), network topology acquisition, neighbor BS scanning 109—111
Base station (BS), plugfest testing of 184—187
Base station (BS), transmission scheduling 154
Base station (BS), transmitter power level controls 189—190
Basic channels, mesh networking, TDMA framing and transmission timing 153—154
Basic service set (BSS), IEEE 802.11 standard 7—8
Best-effort (BE) service, IEEE 802.16 quality-of-service standard 66
Best-effort (BE) service, IEEE 802.16 quality-of-service standard, scheduling 69
Best-effort (BE) service, media access (MAC) layer, uplink, scheduling 44
Best-effort (BE) service, mesh networking, broadcast channel 158
Best-effort (BE) service, power-saving mechanisms 105—109
Bit error rate (BER), receiver testing 192
Blocking probability, IEEE 802.16 quality-of-service standard, admission control simulation 69—72
Bluetooth standard, evolution of 4—6
Bluetooth standard, structure and properties 12—14
Broadband wireless access (BWA) systems, IEEE 802.11 standard and 206
Broadband wireless access (BWA) systems, voice over Internet protocol (VoIP) 129—131
Broadband wireless access (BWA) systems, WiMAX performance evaluation 80
Broadcast channels, mesh networking, TDMA framing and transmission timing 153—154
Cancellation, handover operations 116
Carrier sense multiple access (CSMA), WiMAX security 234
Carrier to interference noise ratio (CINR), network topology acquisition, neighbor BS scanning 109—111
CBC message authentication code (CCM), advanced encryption standard 223—226
Cell reselection, handover operations 115—116
Cellular networks, competing technologies 15—16
Cellular networks, cost issues 15
Cellular networks, design issues 15
Cellular networks, evolution of 8—11
Cellular networks, IEEE 802.16e standard for 209
Cellular networks, throughput performance 15—16
Cellular networks, WiMAX standardization for 209
Centralized scheduling, media access (MAC) layer, mesh topology 53—54
Centralized scheduling, mesh networking 149—150
Centralized scheduling, mesh networking, data channels 158—161
Centralized scheduling, mesh networking, quality-of-service convergence sublayer 165—167
Certification profiles, interoperability and certification testing 180—183
Certification program, abstract test suite 183
Certification program, WiMAX systems 179—183 206—207
Channel quality information channel identifier (CQICH_ID), mobile subscriber stations 140—141
Channel utilization, IEEE 802.16 quality-of-service standard, scheduling simulation 72—74
Channel utilization, mesh logical channels, transmission scheduling 154—161
Code division multiple access (CDMA), cellular networks 8—11
Code division multiple access (CDMA), handover operations, association levels 132—133
Code division multiple access (CDMA), predicted handover scheme 138—141
Common part sublayer, MAC architecture 25—27
Complementary error function, propagation environments 85—87
Conformance testing, defined 176
Conformance testing, WiMAX systems 177—178
Connection identifiers (CID), IEEE 802.16 PMP 26—27
Connection identifiers (CID), media access (MAC) layer, bandwidth allocation requests and grants 44—45
Connection identifiers (CID), media access (MAC) layer, mesh topology 51—52
Connection identifiers (CID), media access (MAC) layer, point to multiple point (PMP) topology 36—37 213
Connection identifiers (CID), media access (MAC) layer, service flows 50—51
Connection identifiers (CID), mesh networking connections 162—164
Connection identifiers (CID), network security properties 198—199
Connection maintenance, media access (MAC) layer 47—49
Constellation error, transmitter testing for 190
Contention resolution, media access (MAC) layer, request transmission 46—47
Control subframes, mesh networking, TDMA, framing and transmission timing 152—154
Convergence sublayer, MAC architecture 25—26
Convergence sublayer, mesh networking 149—150
Convergence sublayer, mesh networking, quality-of-service (QoS) levels 165—167
Coordinated distributed scheduling messages, mesh networking, distributed election scheduling broadcast channels 154—157
Cumulative distribution function (CDF), propagation environments 87—90
Cyclic redundancy check (CRC), MAC layer threats 233—234
Data channels, mesh networking, quality-of-service convergence sublayer 165—167
Data channels, mesh networking, TDMA framing and transmission timing 153—154
Data channels, mesh networking, transmission scheduling 158—161
Data encryption standard (DES), privacy key management version 1 238—240
Data encryption standard (DES), WiMAX security system, protocols for 222—223
Data encryption standard (DES), WiMAX security system, security associations and 216—217
Data rates, WiMAX system performance 90—92
Data security association, contents of 216—217
Data security association, WiMAX security system 200—203
Decentralized scheduling, mesh networking 149—150
Decision and initiation, handover operations 116
Demand assigned multiple access (DAMA), media access (MAC) layer, bandwidth allocation requests 44—45
Device under test (DUT) configuration, adjacent channel leakage ratio measurements 191—192
Device under test (DUT) configuration, receiver testing 192
Device under test (DUT) configuration, transmitter power level controls 189—190
Device under test (DUT) configuration, transmitter spectral flatness 190
Device under test (DUT) configuration, transmitter spectral mask 191
Direct-sequence spread spectrum (DSSS) waveform, IEEE 802.11 standard 6—8
Discontinuous reception, mobility support functions and 104
Disruption time (DT), handover model simulation and results 141—143
Disruption time (DT), handover procedures 130—131
Distributed election scheduling broadcast channels, mesh transmission scheduling 154—157
Distributed scheduling, media access (MAC) layer, mesh topology 52—53
Distributed scheduling, mesh networking, data channels 158—161
DOCSIS BPI+ protocol, WiMAX security and 197—198
Downlink channel descriptor (DCD), network topology advertisement 109
Downlink map (DL-MAP), media access (MAC) layer, point to multiple point (PMP) topology 213
Downlink scheduling scheme, IEEE 802.16 quality-of-service standard simulation 72—74
Downlink targeting, handover synchronization 116—117
DREG-CMD message, paging operation 121—124
DREG-REQ, paging operation 121—124
Drops, in handover operations 117—118
Duplex techniques, MAC PDU transmission 39—40
Dynamic security associations, WiMAX system 215—216
| Educational broadband services (EBS), WiMAX performance evaluation 80
Emergency systems, IEEE 802.16e standard for 209
Emergency systems, WiMAX standardization for 209
Encapsulation technology, privacy sublayers 27—28
Enter network code, paging operation 124
Error vector magnitude (EVM), transmitter constellation error 190
ETSI HIPERLAN standard, structure and properties 11—12
Experimental data, WiMAX system performance 92
Extended real-time polling service (ErtPS), IEEE 802.16e-2005 standard 29
Extended service set (ESS), IEEE 802.11, standard 7—8
Extensible authentication protocol (EAP), message systems in 218
Extensible authentication protocol (EAP), WiMAX security system 203 219
Fading characteristics, propagation environments 84—85
Fast base station switching (FBSS), handover operations overview 118—119
Fast Fourier transform (FFT), handover model simulation and results 141—143
Fixed broadband access, propagation environments 83—84
Fixed WiMAX systems, performance evaluation 78—79
Forward error correction, receiver testing 192
Frequency bands, IEEE 802.16 standards for 207
Frequency bands, WiMAX performance evaluation 79—81
Frequency division duplex (FDD), MAC PDU transmission 39—40
Frequency division duplex (FDD), WiMAX system performance, data rates 90—92
Friis' power transmission formula, propagation environments 82—83
Gaussian distribution model, propagation environments 85—87
Generic MAC header (GMH), protocol data units 210—212
Generic packet convergence sublayer (GPCS), IEEE 802.16g standard 31
Global System for Mobile communications (GSM), cellular networks 8—11
Grant mechanisms, IEEE 802.16 quality-of-service standard 67
Guard channel method (GCM), handover procedures 130—131
Handover (HO) function, base station downlink synchronization 116—117
Handover (HO) function, base station termination 117
Handover (HO) function, cancellation operations 116
Handover (HO) function, cell reselection 115—116
Handover (HO) function, decision and initiation operations 116
Handover (HO) function, drops during 117—118
Handover (HO) function, fast BS switching 120—121
Handover (HO) function, IEEE 802.16e-2005 standard 29
Handover (HO) function, IEEE 802.16e-2005 standard, legacy procedures 131—133
Handover (HO) function, IEEE 802.16e-2005 standard, mobility support and 104
Handover (HO) function, macro diversity 118—120
Handover (HO) function, mobility support operations 114—115
Handover (HO) function, network entry/reentry 118
Handover (HO) function, network topology acquisition 109—114
Handover (HO) function, ranging operations 117
Handover (HO) function, scanning and association results 117
Handover (HO) function, simulation model and results 141—143
Harmonics, transmitter measurements with 192
Hashed message authentication code (HMAC), creation of 217—218
Hashed message authentication code (HMAC), mesh networking connections 163—164
Hashed message authentication code (HMAC), mesh networking connections, security authentication 169
Hashed message authentication code (HMAC), privacy key management version 1 237—238
Hashed message authentication code (HMAC), WiMAX security system 203
Hashed message authentication code (HMAC), WiMAX security system, authentication protocols 217—218
Hashed message authentication code (HMAC), WiMAX security system, authorization keys 217
High-speed downlink packet access (HSDPA), standard, cellular networks 10—11
HIPERLAN WLAN technology standard, evolution of 11—12
HiperMAN standard, development of 207
Identifiers, mesh networking connections 162—164
Idle mode, network reentry from 125—126
Idle mode, paging operation timer 121—124
IEEE 802 standards, structure and properties 4—8
IEEE 802.11 standard, broadband wireless access and 206
IEEE 802.11 standard, complementary technologies 16—17
IEEE 802.11 standard, network backbone 208—209
IEEE 802.11 standard, structure and properties 6—8
IEEE 802.15 standard, complementary technologies 17
IEEE 802.16 standard, evolution of 20 206
IEEE 802.16 standard, fixed and mobile standards 78—79
IEEE 802.16 standard, frequency bands 79—81
IEEE 802.16 standard, mesh topology 26—27
IEEE 802.16 standard, mesh topology, network security issues 168—171
IEEE 802.16 standard, mesh topology, networking applications 162—167
IEEE 802.16 standard, mesh topology, overview 147—150
IEEE 802.16 standard, mesh topology, physical layer specifications 150—151
IEEE 802.16 standard, mesh topology, time division multiple access 150—162
IEEE 802.16 standard, overview of 21—22
IEEE 802.16 standard, proprietary solutions vs. 20—21
IEEE 802.16 standard, WiMAX security and 197—198
IEEE 802.16 Task Group E, competing technologies 14—15
IEEE 802.16-2001 standard, development of 230
IEEE 802.16-2004 standard, adaptive antenna system (AAS) 24
IEEE 802.16-2004 standard, adaptive modulation 24
IEEE 802.16-2004 standard, evolution of 22—28
IEEE 802.16-2004 standard, interoperability and certification testing 179—183
IEEE 802.16-2004 standard, MAC layer 25—28
IEEE 802.16-2004 standard, nonline-of-sight (NLOS) operation 230—231
IEEE 802.16-2004 standard, physical layer specifications 23—24
IEEE 802.16-2004 standard, space time coding 24—25
IEEE 802.16a standard, evolution of 22—23
IEEE 802.16b standard, evolution of 22
IEEE 802.16c standard, evolution of 21—22
IEEE 802.16d standard, media access (MAC), layer, point to multiple point (PMP) topology 37—38
IEEE 802.16e-2005 standard, evolution of 28—30
IEEE 802.16e-2005 standard, handover procedures 130—131
IEEE 802.16e-2005 standard, handover procedures, legacy procedures 131—133
IEEE 802.16e-2005 standard, mobility support, handover mechanisms 109—121
IEEE 802.16e-2005 standard, mobility support, location update 124—126
IEEE 802.16e-2005 standard, mobility support, network reentry from idle model 126—127
IEEE 802.16e-2005 standard, mobility support, overview 104
IEEE 802.16e-2005 standard, mobility support, paging operations 121—124
IEEE 802.16e-2005 standard, mobility support, power-saving mechanisms 105—109
IEEE 802.16f standard, evolution of 30
IEEE 802.16g standard, evolution of 30—31
IEEE 802.16h standard, evolution of 32
IEEE 802.16i standard, evolution of 30
IEEE 802.16j standard 33
IEEE 802.16k standard, evolution of 31—32
IEEE 802.20 standard, competing technologies 14—15
IEEE 802.20 standard, structure and properties 8
IEEE 802.22 standard, wireless regional area network (WRAN) 14
Implementation extra information for testing (IXIT) protocol, abstract test suite 182—183
In-building penetration, propagation environments 87—88
Independent basic service set (IBSS), IEEE 802.11 standard 7—8
Industrial, scienti?c, and medical (ISM) band, IEEE 802.11 standard 6—8
Interoperability testing, WiMAX systems 179—183
Jamming threats, WiMAX security 232—233
Key encryption keys (KEKs), mesh networking connections 169
Key encryption keys (KEKs), privacy key management version 1 237—238
Key encryption keys (KEKs), WiMAX security associations 217
License-Exempt (LE) Task Group, IEEE 802.16h standard 32
Line-of-sight (LOS) communication, IEEE 802.16-2004 22—23
Line-of-sight (LOS) communication, IEEE 802.16-2004, frequency limitations 207
Line-of-sight (LOS) communication, signal-aware mechanisms 134—136
Line-of-sight (LOS) communication, single carrier (SC) physical layer (PHY), specifications 209—210
Link budgets, propagation environments 84—90
Link identifiers (link IDs), media access, (MAC) layer, mesh topology 51—52
Local multipoint distribution service (LMDS), IEEE 802.16c standard and 21—22
Local multipoint distribution service (LMDS), voice over Internet protocol (VoIP) 129—131
Location update, handover operations 124—125
Log-normal shadowing deviation, propagation environments 85—87
Logical connections, mesh networking 149—160
Logical connections, mesh networking, TDMA framing and transmission timing 153—154
Logical connections, mesh networking, transmission scheduling in 154—161
Logical link control (LLC) sublayer, IEEE 802.11 standard 7—8
Low-density parity check (LDPC), IEEE 802.16e-2005 standard 28—29
MAC protocol data units (MPDUs), security threats to 233—234
MAC protocol data units (MPDUs), standard protocol structure 231—232
Macro diversity handover (MDHO), basic principles 118—120
Management information base (MIB), IEEE 802.16f standard 30
Management messages, power-saving mechanisms, mobility support 106—109
Maximum latency, IEEE 802.16 quality-of-service standard 66
Maximum sustained traffic rate (MSTR), IEEE 802.16 quality-of-service standard 66
Maximum traffic burst, IEEE 802.16 quality-of-service standard 66
Maximum transmission distance, signal-aware mechanisms 134—136
Measurement-based priority scheme (MBPS), handover procedures 130—131
Media access control (MAC) layer, certification 179—180
Media access control (MAC) layer, hash skip threshold update 124
Media access control (MAC) layer, IEEE 802 standards 4—5
Media access control (MAC) layer, IEEE 802.16-2004 standard 23 25—26 206
Media access control (MAC) layer, IEEE 802.16-2004 standard mesh networking connections 162—164
|
|
|
Ðåêëàìà |
|
|
|