| 
		        
			        |  |  
			        |  |  
					| Àâòîðèçàöèÿ |  
					|  |  
			        |  |  
			        | Ïîèñê ïî óêàçàòåëÿì |  
			        | 
 |  
			        |  |  
			        |  |  
			        |  |  
                    |  |  
			        |  |  
			        |  |  |  | 
		|  |  
                    | Ahson S., Ilyas M. (Ed) — WiMAX: Standards and Security |  
                    |  |  
			        |  |  
                    | Ïðåäìåòíûé óêàçàòåëü |  
                    | | 3rd plugfest test architecture, configurations for      184—187 5th plugfest architecture, WiMAX system, testing      187—189
 Abstract test suite (ATS), WiMAX Forum system      182—183
 Access methods, functionality and performance testing      178
 Access points (APs), WiMAX security threats      234
 Active service flows, media access (MAC) layer      50—51
 Adaptive antenna system (AAS), IEEE 802.16-2004 standard      24—25
 Adaptive antenna system (AAS), IEEE 802.16e-2005 standard      2829
 Adaptive modulation, IEEE 802.16-2004 standard      24
 Addressing nodes, mesh topology, media access (MAC) layer      51—52
 Addressing nodes, mesh topology, network addressing      164—165
 Adjacent channel leakage ratio (ACLR), transmitter measurements      191—192
 Admission control, IEEE 802.16 quality-of-service standard      67
 Admission control, operation simulation      69—72
 Admitted service flows, media access (MAC) layer      50
 Advanced encryption standard (AES), modes for      223—226
 Advanced encryption standard (AES), WiMAX Forum certi?cation      182
 Advanced wireless services (AWS), WiMAX performance evaluation      81
 Advertisement, network topology acquisition      109
 Antenna bandwidth, propagation environments      83—84
 Association procedure, handover operations      117
 Association procedure, handover operations, levels of      131—133
 Association procedure, network topology acquisition      111—114
 Authentication protocols, mesh networking security      168—169
 Authentication protocols, privacy key management version 1      236—237
 Authentication protocols, WiMAX security standards      217—219
 Authorization keys (AKs), mesh networking connections      169
 Authorization keys (AKs), privacy key management (PKM) protocol      220—221
 Authorization keys (AKs), privacy key management (PKM) protocol version 2 derivation      242—244
 Authorization keys (AKs), vulnerabilities      227
 Authorization keys (AKs), WiMAX security standards      216—217
 Authorization security association, contents of      216—217
 Authorization security association, WiMAX security system      200—203
 Automatic repeat request (ARQ)      182
 Automatic repeat request (ARQ), MPDU retransmission scheme      40—41
 Backbone hop-by-hop security, mesh networking      169—170
 Bandwidth allocation scheme, handover model simulation and results      141—143
 Bandwidth allocation scheme, IEEE 802.16 quality-of-service standard, admission control simulation      69—72
 Bandwidth allocation scheme, media access (MAC) layer      44—45
 Bandwidth allocation scheme, media access (MAC) layer, mesh topology      52—53
 Bandwidth request header, MAC protocol, data units      211—213
 Base station (BS), 5th plugfest testing of      187—189
 Base station (BS), handover operations, downlink targeting      116—117
 Base station (BS), handover operations, fast BS switching      118 120—121
 Base station (BS), handover operations, macro diversity handover      118—120
 Base station (BS), handover operations, termination procedures      117
 Base station (BS), media access (MAC) layer, point to multiple point (PMP) topology      36—37 212—213
 Base station (BS), mesh networking security      169
 Base station (BS), mobility support functions      104
 Base station (BS), network security properties      198—199
 Base station (BS), network topology acquisition, advertisement      109
 Base station (BS), network topology acquisition, neighbor BS scanning      109—111
 Base station (BS), plugfest testing of      184—187
 Base station (BS), transmission scheduling      154
 Base station (BS), transmitter power level controls      189—190
 Basic channels, mesh networking, TDMA framing and transmission timing      153—154
 Basic service set (BSS), IEEE 802.11 standard      7—8
 Best-effort (BE) service, IEEE 802.16 quality-of-service standard      66
 Best-effort (BE) service, IEEE 802.16 quality-of-service standard, scheduling      69
 Best-effort (BE) service, media access (MAC) layer, uplink, scheduling      44
 Best-effort (BE) service, mesh networking, broadcast channel      158
 Best-effort (BE) service, power-saving mechanisms      105—109
 Bit error rate (BER), receiver testing      192
 Blocking probability, IEEE 802.16 quality-of-service standard, admission control simulation      69—72
 Bluetooth standard, evolution of      4—6
 Bluetooth standard, structure and properties      12—14
 Broadband wireless access (BWA) systems, IEEE 802.11 standard and      206
 Broadband wireless access (BWA) systems, voice over Internet protocol (VoIP)      129—131
 Broadband wireless access (BWA) systems, WiMAX performance evaluation      80
 Broadcast channels, mesh networking, TDMA framing and transmission timing      153—154
 Cancellation, handover operations      116
 Carrier sense multiple access (CSMA), WiMAX security      234
 Carrier to interference noise ratio (CINR), network topology acquisition, neighbor BS scanning      109—111
 CBC message authentication code (CCM), advanced encryption standard      223—226
 Cell reselection, handover operations      115—116
 Cellular networks, competing technologies      15—16
 Cellular networks, cost issues      15
 Cellular networks, design issues      15
 Cellular networks, evolution of      8—11
 Cellular networks, IEEE 802.16e standard for      209
 Cellular networks, throughput performance      15—16
 Cellular networks, WiMAX standardization for      209
 Centralized scheduling, media access (MAC) layer, mesh topology      53—54
 Centralized scheduling, mesh networking      149—150
 Centralized scheduling, mesh networking, data channels      158—161
 Centralized scheduling, mesh networking, quality-of-service convergence sublayer      165—167
 Certification profiles, interoperability and certification testing      180—183
 Certification program, abstract test suite      183
 Certification program, WiMAX systems      179—183 206—207
 Channel quality information channel identifier (CQICH_ID), mobile subscriber stations      140—141
 Channel utilization, IEEE 802.16 quality-of-service standard, scheduling simulation      72—74
 Channel utilization, mesh logical channels, transmission scheduling      154—161
 Code division multiple access (CDMA), cellular networks      8—11
 Code division multiple access (CDMA), handover operations, association levels      132—133
 Code division multiple access (CDMA), predicted handover scheme      138—141
 Common part sublayer, MAC architecture      25—27
 Complementary error function, propagation environments      85—87
 Conformance testing, defined      176
 Conformance testing, WiMAX systems      177—178
 Connection identifiers (CID), IEEE 802.16 PMP      26—27
 Connection identifiers (CID), media access (MAC) layer, bandwidth allocation requests and grants      44—45
 Connection identifiers (CID), media access (MAC) layer, mesh topology      51—52
 Connection identifiers (CID), media access (MAC) layer, point to multiple point (PMP) topology      36—37 213
 Connection identifiers (CID), media access (MAC) layer, service flows      50—51
 Connection identifiers (CID), mesh networking connections      162—164
 Connection identifiers (CID), network security properties      198—199
 Connection maintenance, media access (MAC) layer      47—49
 Constellation error, transmitter testing for      190
 Contention resolution, media access (MAC) layer, request transmission      46—47
 Control subframes, mesh networking, TDMA, framing and transmission timing      152—154
 Convergence sublayer, MAC architecture      25—26
 Convergence sublayer, mesh networking      149—150
 Convergence sublayer, mesh networking, quality-of-service (QoS) levels      165—167
 Coordinated distributed scheduling messages, mesh networking, distributed election scheduling broadcast channels      154—157
 Cumulative distribution function (CDF), propagation environments      87—90
 Cyclic redundancy check (CRC), MAC layer threats      233—234
 Data channels, mesh networking, quality-of-service convergence sublayer      165—167
 Data channels, mesh networking, TDMA framing and transmission timing      153—154
 Data channels, mesh networking, transmission scheduling      158—161
 Data encryption standard (DES), privacy key management version 1      238—240
 Data encryption standard (DES), WiMAX security system, protocols for      222—223
 Data encryption standard (DES), WiMAX security system, security associations and      216—217
 Data rates, WiMAX system performance      90—92
 Data security association, contents of      216—217
 Data security association, WiMAX security system      200—203
 Decentralized scheduling, mesh networking      149—150
 Decision and initiation, handover operations      116
 Demand assigned multiple access (DAMA), media access (MAC) layer, bandwidth allocation requests      44—45
 Device under test (DUT) configuration, adjacent channel leakage ratio measurements      191—192
 Device under test (DUT) configuration, receiver testing      192
 Device under test (DUT) configuration, transmitter power level controls      189—190
 Device under test (DUT) configuration, transmitter spectral flatness      190
 Device under test (DUT) configuration, transmitter spectral mask      191
 Direct-sequence spread spectrum (DSSS) waveform, IEEE 802.11 standard      6—8
 Discontinuous reception, mobility support functions and      104
 Disruption time (DT), handover model simulation and results      141—143
 Disruption time (DT), handover procedures      130—131
 Distributed election scheduling broadcast channels, mesh transmission scheduling      154—157
 Distributed scheduling, media access (MAC) layer, mesh topology      52—53
 Distributed scheduling, mesh networking, data channels      158—161
 DOCSIS BPI+ protocol, WiMAX security and      197—198
 Downlink channel descriptor (DCD), network topology advertisement      109
 Downlink map (DL-MAP), media access (MAC) layer, point to multiple point (PMP) topology      213
 Downlink scheduling scheme, IEEE 802.16 quality-of-service standard simulation      72—74
 Downlink targeting, handover synchronization      116—117
 DREG-CMD message, paging operation      121—124
 DREG-REQ, paging operation      121—124
 Drops, in handover operations      117—118
 Duplex techniques, MAC PDU transmission      39—40
 Dynamic security associations, WiMAX system      215—216
 
 | Educational broadband services (EBS), WiMAX performance evaluation      80 Emergency systems, IEEE 802.16e standard for      209
 Emergency systems, WiMAX standardization for      209
 Encapsulation technology, privacy sublayers      27—28
 Enter network code, paging operation      124
 Error vector magnitude (EVM), transmitter constellation error      190
 ETSI HIPERLAN standard, structure and properties      11—12
 Experimental data, WiMAX system performance      92
 Extended real-time polling service (ErtPS), IEEE 802.16e-2005 standard      29
 Extended service set (ESS), IEEE 802.11, standard      7—8
 Extensible authentication protocol (EAP), message systems in      218
 Extensible authentication protocol (EAP), WiMAX security system      203 219
 Fading characteristics, propagation environments      84—85
 Fast base station switching (FBSS), handover operations overview      118—119
 Fast Fourier transform (FFT), handover model simulation and results      141—143
 Fixed broadband access, propagation environments      83—84
 Fixed WiMAX systems, performance evaluation      78—79
 Forward error correction, receiver testing      192
 Frequency bands, IEEE 802.16 standards for      207
 Frequency bands, WiMAX performance evaluation      79—81
 Frequency division duplex (FDD), MAC PDU transmission      39—40
 Frequency division duplex (FDD), WiMAX system performance, data rates      90—92
 Friis' power transmission formula, propagation environments      82—83
 Gaussian distribution model, propagation environments      85—87
 Generic MAC header (GMH), protocol data units      210—212
 Generic packet convergence sublayer (GPCS), IEEE 802.16g standard      31
 Global System for Mobile communications (GSM), cellular networks      8—11
 Grant mechanisms, IEEE 802.16 quality-of-service standard      67
 Guard channel method (GCM), handover procedures      130—131
 Handover (HO) function, base station downlink synchronization      116—117
 Handover (HO) function, base station termination      117
 Handover (HO) function, cancellation operations      116
 Handover (HO) function, cell reselection      115—116
 Handover (HO) function, decision and initiation operations      116
 Handover (HO) function, drops during      117—118
 Handover (HO) function, fast BS switching      120—121
 Handover (HO) function, IEEE 802.16e-2005 standard      29
 Handover (HO) function, IEEE 802.16e-2005 standard, legacy procedures      131—133
 Handover (HO) function, IEEE 802.16e-2005 standard, mobility support and      104
 Handover (HO) function, macro diversity      118—120
 Handover (HO) function, mobility support operations      114—115
 Handover (HO) function, network entry/reentry      118
 Handover (HO) function, network topology acquisition      109—114
 Handover (HO) function, ranging operations      117
 Handover (HO) function, scanning and association results      117
 Handover (HO) function, simulation model and results      141—143
 Harmonics, transmitter measurements with      192
 Hashed message authentication code (HMAC), creation of      217—218
 Hashed message authentication code (HMAC), mesh networking connections      163—164
 Hashed message authentication code (HMAC), mesh networking connections, security authentication      169
 Hashed message authentication code (HMAC), privacy key management version 1      237—238
 Hashed message authentication code (HMAC), WiMAX security system      203
 Hashed message authentication code (HMAC), WiMAX security system, authentication protocols      217—218
 Hashed message authentication code (HMAC), WiMAX security system, authorization keys      217
 High-speed downlink packet access (HSDPA), standard, cellular networks      10—11
 HIPERLAN WLAN technology standard, evolution of      11—12
 HiperMAN standard, development of      207
 Identifiers, mesh networking connections      162—164
 Idle mode, network reentry from      125—126
 Idle mode, paging operation timer      121—124
 IEEE 802 standards, structure and properties      4—8
 IEEE 802.11 standard, broadband wireless access and      206
 IEEE 802.11 standard, complementary technologies      16—17
 IEEE 802.11 standard, network backbone      208—209
 IEEE 802.11 standard, structure and properties      6—8
 IEEE 802.15 standard, complementary technologies      17
 IEEE 802.16 standard, evolution of      20 206
 IEEE 802.16 standard, fixed and mobile standards      78—79
 IEEE 802.16 standard, frequency bands      79—81
 IEEE 802.16 standard, mesh topology      26—27
 IEEE 802.16 standard, mesh topology, network security issues      168—171
 IEEE 802.16 standard, mesh topology, networking applications      162—167
 IEEE 802.16 standard, mesh topology, overview      147—150
 IEEE 802.16 standard, mesh topology, physical layer specifications      150—151
 IEEE 802.16 standard, mesh topology, time division multiple access      150—162
 IEEE 802.16 standard, overview of      21—22
 IEEE 802.16 standard, proprietary solutions vs.      20—21
 IEEE 802.16 standard, WiMAX security and      197—198
 IEEE 802.16 Task Group E, competing technologies      14—15
 IEEE 802.16-2001 standard, development of      230
 IEEE 802.16-2004 standard, adaptive antenna system (AAS)      24
 IEEE 802.16-2004 standard, adaptive modulation      24
 IEEE 802.16-2004 standard, evolution of      22—28
 IEEE 802.16-2004 standard, interoperability and certification testing      179—183
 IEEE 802.16-2004 standard, MAC layer      25—28
 IEEE 802.16-2004 standard, nonline-of-sight (NLOS) operation      230—231
 IEEE 802.16-2004 standard, physical layer specifications      23—24
 IEEE 802.16-2004 standard, space time coding      24—25
 IEEE 802.16a standard, evolution of      22—23
 IEEE 802.16b standard, evolution of      22
 IEEE 802.16c standard, evolution of      21—22
 IEEE 802.16d standard, media access (MAC), layer, point to multiple point (PMP) topology      37—38
 IEEE 802.16e-2005 standard, evolution of      28—30
 IEEE 802.16e-2005 standard, handover procedures      130—131
 IEEE 802.16e-2005 standard, handover procedures, legacy procedures      131—133
 IEEE 802.16e-2005 standard, mobility support, handover mechanisms      109—121
 IEEE 802.16e-2005 standard, mobility support, location update      124—126
 IEEE 802.16e-2005 standard, mobility support, network reentry from idle model      126—127
 IEEE 802.16e-2005 standard, mobility support, overview      104
 IEEE 802.16e-2005 standard, mobility support, paging operations      121—124
 IEEE 802.16e-2005 standard, mobility support, power-saving mechanisms      105—109
 IEEE 802.16f standard, evolution of      30
 IEEE 802.16g standard, evolution of      30—31
 IEEE 802.16h standard, evolution of      32
 IEEE 802.16i standard, evolution of      30
 IEEE 802.16j standard      33
 IEEE 802.16k standard, evolution of      31—32
 IEEE 802.20 standard, competing technologies      14—15
 IEEE 802.20 standard, structure and properties      8
 IEEE 802.22 standard, wireless regional area network (WRAN)      14
 Implementation extra information for testing (IXIT) protocol, abstract test suite      182—183
 In-building penetration, propagation environments      87—88
 Independent basic service set (IBSS), IEEE 802.11 standard      7—8
 Industrial, scienti?c, and medical (ISM) band, IEEE 802.11 standard      6—8
 Interoperability testing, WiMAX systems      179—183
 Jamming threats, WiMAX security      232—233
 Key encryption keys (KEKs), mesh networking connections      169
 Key encryption keys (KEKs), privacy key management version 1      237—238
 Key encryption keys (KEKs), WiMAX security associations      217
 License-Exempt (LE) Task Group, IEEE 802.16h standard      32
 Line-of-sight (LOS) communication, IEEE 802.16-2004      22—23
 Line-of-sight (LOS) communication, IEEE 802.16-2004, frequency limitations      207
 Line-of-sight (LOS) communication, signal-aware mechanisms      134—136
 Line-of-sight (LOS) communication, single carrier (SC) physical layer (PHY), specifications      209—210
 Link budgets, propagation environments      84—90
 Link identifiers (link IDs), media access, (MAC) layer, mesh topology      51—52
 Local multipoint distribution service (LMDS), IEEE 802.16c standard and      21—22
 Local multipoint distribution service (LMDS), voice over Internet protocol (VoIP)      129—131
 Location update, handover operations      124—125
 Log-normal shadowing deviation, propagation environments      85—87
 Logical connections, mesh networking      149—160
 Logical connections, mesh networking, TDMA framing and transmission timing      153—154
 Logical connections, mesh networking, transmission scheduling in      154—161
 Logical link control (LLC) sublayer, IEEE 802.11 standard      7—8
 Low-density parity check (LDPC), IEEE 802.16e-2005 standard      28—29
 MAC protocol data units (MPDUs), security threats to      233—234
 MAC protocol data units (MPDUs), standard protocol structure      231—232
 Macro diversity handover (MDHO), basic principles      118—120
 Management information base (MIB), IEEE 802.16f standard      30
 Management messages, power-saving mechanisms, mobility support      106—109
 Maximum latency, IEEE 802.16 quality-of-service standard      66
 Maximum sustained traffic rate (MSTR), IEEE 802.16 quality-of-service standard      66
 Maximum traffic burst, IEEE 802.16 quality-of-service standard      66
 Maximum transmission distance, signal-aware mechanisms      134—136
 Measurement-based priority scheme (MBPS), handover procedures      130—131
 Media access control (MAC) layer, certification      179—180
 Media access control (MAC) layer, hash skip threshold update      124
 Media access control (MAC) layer, IEEE 802 standards      4—5
 Media access control (MAC) layer, IEEE 802.16-2004 standard      23 25—26 206
 Media access control (MAC) layer, IEEE 802.16-2004 standard mesh networking connections      162—164
 
 | 
 |  |  |  | Ðåêëàìà |  |  |  |  |  |