Wimax standards and Security The Wimax



Download 2,02 Mb.
bet4/186
Sana29.05.2022
Hajmi2,02 Mb.
#619147
1   2   3   4   5   6   7   8   9   ...   186
Bog'liq
CRC - WiMAX.Standards.and.Security

vii
viii Preface

robustness, end-to-end IP-based networks, secure mobility and broadband speeds for voice, data, and video, support for fixed and mobile systems, efficient and adaptive coding and modulation techniques, scalable channel sizes, subchannelization schemes, multiple-input-multiple-output antenna systems, and quality of service. WiMAX enables wireless broadband access anywhere, anytime, and on virtually any device.


The WiMAX handbook provides technical information about all aspects of WiMAX. The areas covered in the handbook range from basic concepts to research-grade material including future directions. The WiMAX hand- book captures the current state of wireless local area networks, and serves as a source of comprehensive reference material on this subject. The WiMAX handbook consists of three volumes: WiMAX: Applications; WiMAX: Standards and Security; and WiMAX: Technologies, Performance Analysis, and QoS. It has a total of 32 chapters authored by experts from around the world. WiMAX: Standards and Security includes 12 chapters authored by 22 experts.
Chapter 1 (The Emerging Wireless Internet Architecture: Competing and Complementary Standards to WiMAX Technology) describes other wireless networking technologies that complement and compete with WiMAX tech- nologies. This chapter provides an overview of the most prevalent current technologies in use today, as well as a description of the similarities and differences compared to WiMAX.
Chapter 2 (IEEE 802.16 Standards and Amendments) examines the pros and cons of standardized versus proprietary solutions for wireless broad- band access. An overview of WiMAX standards and amendments (IEEE 802.16-2001, IEEE 802.16b, IEEE 802.16c, IEEE 802.16d, IEEE 802.16-2004, IEEE 802.16e-2005, IEEE 802.16f, IEEE 802.16g, IEEE 802.16h, IEEE 802.16fi,
and IEEE 802.16j) is presented. Key WiMAX technologies such as physi- cal layer, medium access control layer, convergence sublayer, common part sublayer, point-to-multipoint and mesh mode, privacy sublayer, quality of service support, handover support, and power management are described in detail.
Chapter 3 (MAC Layer Protocol in WiMAX Systems) reviews the func- tions and features of the core medium access control protocol of the WiMAX systems including the point-to-multipoint topology and mesh topology. The fundamental part of the medium access control protocol of the WiMAX systems is summarized and presented.
Chapter 4 (Scheduling and Performance Analysis of QoS for IEEE 802.16 Broadband Wireless Access Network) presents an architecture and its imple- mentation of admission control and job scheduling based on the quality-of- service requirements of IEEE 802.16. This chapter presents the concept and requirements of quality of service as specified in the IEEE 802.16 standard, along with an architecture to implement quality of service in a simulation model.
Chapter 5 (Propagation and Performance) presents carriers’ perspectives for wireless services like fixed WiMAX access. This chapter presents vari- ous aspects of propagation and performance for WiMAX radio systems; it
Preface ix

reviews WiMAX radio system parameters such as link budgets, presents relevant propagation models, and finally, analyzes system throughput and performance for a typical suburban area.


Chapter 6 (Mobility Support for IEEE 802.16e System) discusses the main mobility functions defined in the IEEE 802.16e standard: power-saving mech- anism, handover operation, paging, and location update. Power-saving classes of type I, type II, and type III are discussed in great detail. Network topology acquisition, basic handover operation, macro-diversity handover, and fast base station switching are examined. Basic paging operation, location update, and network reentry from idle mode are described.
Chapter 7 (Measured Signal-Aware Mechanism for Fast Handover in WiMAX Networks) describes how to use a measured signal-aware mecha- nism to aid speeding up WiMAX handover procedures. A measured signal- aware mechanism for a base station initialized predicted handover scheme is investigated, which centralized a monitor-moving mobile subscriber station and prepared a CDMA ranging code of boundary mobile subscriber stations beforehand.
Chapter 8 (802.16 Mesh Networking) presents an overview of the 802.16 mesh protocol with a specific focus on the networking aspects of the pro- tocol. Addressing assignments for IEEE 802.16 mesh networks that allow the network layer to take advantage of quality of service provided by IEEE
802.16 mesh protocol is proposed. An overview of the security infrastructure of IEEE 802.16 mesh networks and their flaws is presented. An end-to-end security scheme that simplifies the design of IEEE 802.16 mesh routers is proposed.
Chapter 9 (WiMAX Testing) surveys the testing and certification processes used for WiMAX products. This chapter describes the general framework used for conformance and interoperability testing for the WiMAX technology. An overview of generic test equipment, test environments, and scenarios used for WiMAX certification testing is described. It also describes the WiMAX certification process and testing scenarios at the recently held WiMAX Forum “Plugfest’’ events.
Chapter 10 (An Overview of WiMAX Security) presents an overview of the security aspects of IEEE 802.16. Unified modeling language class and sequence diagrams are used to describe architectural aspects. These are con- ceptual diagrams, intended to define the information in each unit and do not reflect implementation details. This chapter presents a high-level overview that can be read before getting into the details of the standard.
Chapter 11 (Privacy and Security in WiMAX Networks) presents an overview of WiMAX security features. Primary, static, and dynamic secu- rity associations, contents of data security association, and contents of authorization security association are described in detail. Hashed message authentication codes, X.509 certificates, and the extensible authentication pro- tocol are reviewed. Aspects of privacy and key management protocol such as authorization and authorization key exchange, and traffic encryption key exchange are examined.
x Preface

Chapter 12 (WiMAX Security: Privacy Key Management) presents a comprehensive overview of security issues encountered in WiMAX, including security challenges, user authentication, key exchanges, as well as data encryption through the fixed and mobile WiMAX channels. This chapter focuses on the privacy and key management protocols that play an impor- tant role in securing connection and transmission across broadband wireless access.


The targeted audience for the handbook includes professionals who are designers and planners for WiMAX networks, researchers (faculty members and graduate students), and those who would like to learn about this field.
The handbook has the following specific salient features:



  • To serve as a single comprehensive source of information and as reference material on WiMAX networks.

  • To deal with an important and timely topic of emerging communi- cation technology of today, tomorrow, and beyond.

  • To present accurate, up-to-date information on a broad range of topics related to WiMAX networks.

  • To present material authored by the experts in the field.

  • To present the information in an organized and well-structured manner.

Although the handbook is not precisely a textbook, it can certainly be used as a textbook for graduate and research-oriented courses that deal with WiMAX. Any comments from the readers will be highly appreciated.


Many people have contributed to this handbook in their unique ways. The first and foremost group that deserves immense gratitude is the group of highly talented and skilled researchers who have contributed 32 chapters to this handbook. All of them have been extremely cooperative and professional. It has also been a pleasure to work with Nora Konopka, Helena Redshaw, Jessica Vakili, and Joette Lynch of Taylor & Francis and we are extremely gratified for their support and professionalism. Our families have extended their unconditional love and strong support throughout this project and they all deserve very special thanks.
Syed Ahson
Plantation, FL, USA
Mohammad Ilyas Boca Raton, FL, USA


Editors



Download 2,02 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   186




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish