98,99 €
WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements. Security is an essential element in the wireless world and Part B is fully dedicated to this topic. Part C provides an in depth analysis of QoS, including mobility management in WiMAX. Finally, Part D introduces the reader to advanced and future topics. * One of the first texts to cover security, QoS and deployments of WiMAX in the same book. * Introduces the primary concepts of the interdisciplinary nature of WiMAX security and QoS, and also includes discussion of hot topics in the field. * Written for engineers and researchers, answering practical questions from industry and the experimental field in academia. * Explains how WiMAX applications' security and QoS are interconnected and interworked among the cross layers.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 757
Veröffentlichungsjahr: 2011
Contents
Preface
Acknowledgement
List of Contributors
List of Acronyms
List of Figures
List of Tables
Part A Introduction
Chapter 1: Overview of End-to-End WiMAX Network Architecture
1.1 Introduction
1.2 Wireless Primer
1.3 Introduction to WiMAX Technology
1.4 Mobile WiMAX
1.5 Overview of End-to-End WiMAX Network Architecture
1.6 Radio Interface Specifications for WiMAX
1.7 Interoperability Issues in WiMAX
1.8 Summary
References
Part B Security
Chapter 2: WiMAX Security Defined in 802.16 Standards
2.1 Introduction
2.2 Overview of 802.16 WMAN Networks
2.3 Security Requirements for Broadband Access in WMAN Networks
2.4 Security Mechanisms in Initial 802.16 Networks
2.5 Analysis of Security Weaknesses in Initial Versions of 802.16
2.6 Security Amendments in Recent Versions if IEEE 802.16
2.7 Analysis of Security Weaknesses in 802.16e
2.8 Further Reading
2.9 Summary
References
Chapter 3: Key Management in 802.16e
3.1 Introduction
3.2 Privacy Key Management Protocol
3.3 PKM Version 1
3.4 PKM Version 2
3.5 Vulnerabilities and Countermeasures
3.6 Comparisons with 802.11/UMTS
3.7 Summary
References
Chapter 4: WiMAX Network Security
4.1 Introduction
4.2 WiMAX Network Reference Model
4.3 The RADIUS Server
4.4 WiMAX Networking Procedures and Security
4.5 Further Reading
4.6 Summary
References
Part C Quality of Service
Chapter 5: Cross-Layer End-to-End QoS Architecture:
5.1 Introduction
5.2 QoS Definitions
5.3 QoS Mechanisms Offered by IEEE 802.16
5.4 What is Missing in the WiMAX Features?
5.5 Future Challenges
5.6 Summary
References
Chapter 6: QoS in Mobile WiMAX
6.1 Introduction
6.2 Architectural QoS Requirements
6.3 Mobile WiMAX Service Flows
6.4 Admission Control
6.5 Scheduling Service
6.6 Maintaining QoS During Handover
6.7 Enhancing WiMAX QoS Issues: Research Work
6.8 Further Reading
6.9 Summary
References
Chapter 7: Mobility Management in WiMAX Networks
7.1 Mobile WiMAX Architecture
7.2 Horizontal Handover in 802.16e
7.3 Optimized 802.16e Handover Schemes
7.4 Vertical Handover
7.5 Roaming
7.6 Mobility Management in WiMESH Networks
7.7 Conclusion
7.8 Summary
References
Part D Advanced Topics
Chapter 8: QoS Challenges in the Handover Process
8.1 Introduction
8.2 Handover in WiMAX
8.3 The IEEE802.16 Handover Process
8.4 The Media Independent Handover Initiative – IEEE 802.21
8.5 Enhancing the Handover Process
8.6 Handover Scheduling
8.7 Handover Performance Analysis
8.8 Summary
References
Chapter 9: Resource Allocation in Mobile WiMAX Networks
9.1 Introduction
9.2 Background on IEEE 802.16e
9.3 System Model
9.4 OFDMA Key Principles–Analysis and Performance Characterizations
9.5 Cross-Layer Resource Allocation in Mobile WiMAX
9.6 Channel Aware Class Based Queue (CACBQ) – The Proposed Solution
9.7 Summary and Conclusion
References
Chapter 10: QoS Issues and Challenges in WiMAX and WiMAX MMR Networks
10.1 Introduction
10.2 Multimedia Traffic
10.3 Multimedia: WiFi versus WiMAX
10.4 QoS Scheduling in WiMAX Networks
10.5 Voice Traffic Scheduling in WiMAX
10.6 Video Traffic Scheduling in WiMAX
10.7 Introduction to WiMAX MMR Networks
10.8 Scheduling in WiMAX MMR Networks
10.9 Basic Wireless Scheduling Algorithms
10.10 Scheduling Algorithms for WiMAX MMR Networks
10.11 Further Reading
10.12 Summary
References
Chapter 11: On the Integration of WiFi and WiMAX Networks
11.1 Introduction
11.2 General Design Principles of the Interworking Architecture
11.3 WiFi/Mobile WiMAX Interworking Architecture
11.4 Network Discovery and Selection
11.5 Authentication and Security Architecture
11.6 Security in WiFi and WiMAX Networks
11.7 Mobility Management
11.8 Quality of Service Architecture
11.9 Summary
References
Chapter 12: QoS Simulation and An Enhanced Solution of Cell Selection for WiMAX Network
12.1 Introduction
12.2 WiMAX Simulation Tools – Overview
12.3 QoS Simulation of WiMAX Network
12.4 Analysis of QoS Simulation Results
12.5 Enhancement – A New Solution of Cell Selection
12.6 Summary
References
Appendix List of Standards
Index
This edition first published 2010
© 2010 John Wiley & Sons Ltd.,
Registered office
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom
For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.
The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought.
Library of Congress Cataloging-in-Publication Data
WiMAX security and quality of service : an end-to-end perspective / edited by Seok-Yee Tang,Peter Müller, and Hamid Sharif.p. cm.Includes bibliographical references and index.ISBN 978-0-470-72197-1 (cloth)1. Wireless metropolitan area networks–Security measures. 2. IEEE 802.16 (Standard)I. Tang, Seok-Yee, 1968- II. Müller, Peter, 1961 July 8- III. Sharif, Hamid R. (Hamid Reza), 1958-TK5105.85.W55 2010621.382′1 – dc222010003319
A catalogue record for this book is available from the British Library.
ISBN 978-0-470-72197-1 (H/B)
Preface
The rapid increase in demand for high-speed broadband wireless networks has spurred the development of new technologies in recent years. Worldwide Interoperability for Microwave Access, known as WiMAX, is one of these technologies. WiMAX is based on the IEEE 802.16 family of standards and offers flexible fixed and mobile wireless solutions along with high-bandwidth services for extended distance coverage and a variety of applications including support of an array of multimedia functions.
IEEE 802.16e is the most popular implementation of this standard; it defines a path of evolution to support high throughput wireless technology for mobile systems. The WiMAX mobile wireless standard, which was defined originally by the IEEE 802.16e-2005 amendment, is now being deployed in more than 140 countries by more than 475 operators.
The 802.16 Medium Access Control (MAC) is designed to support high data transfer for uplink and downlink communications between a base station and a large number of clients for continuous and bursty traffic. WiMAX also supports significant flexible operations across a wide range of spectrum allocation including both licensed and license-exempt frequencies of 2 to 11 GHz. It provides an access system which is based on a request-grant mechanism designed to support service requirements, scalability and efficiency. Along with the bandwidth allocation task, the IEEE 802.16 access mechanism provides a sublayer designed to support privacy and authentication for network access and establishment of connection.
Quality of Service (QoS) is an important factor in WiMAX technologies. WiMAX can provide QoS for wireless broadband communications over an extended coverage area for real-time delay-sensitive applications such as Voice over IP and real-time streaming in stationary or mobile environments. It offers different access methods for different classes of traffic. The 802.16e protocol is a connection-oriented medium access control with service flows as well as a grant-based system which allows centralized control and eliminates overheads and delay of acknowledgements. This in turn provides an effective QoS handling which is fundamentally different from connectionless wireless protocols such as IEEE 802.11. The IEEE 802.16 grant-based MAC can react to QoS requests in real time which reduces the workload of the base stations and produces lower overheads since connections are aggregated.
Additionally, in order to guarantee the QoS of competing services, the fragmentation of the 802.16 Protocol Data Units allows for very large Service Data Units to be sent across frame boundaries. OFDM and OFDMA also provide error correction and interleaving in order to improve QoS. Furthermore, the adaptive modulation techniques used in WiMAX technology result in extended wireless distance coverage areas.
Security is also an important feature of WiMAX and was included in the 802.16 protocol after the failures that restricted the early IEEE 802.11 networks. Security is handled by a privacy sublayer within the WiMAX MAC. WiMAX provides a flexible means for authenticating subscriber stations and users in order to prevent unauthorized use. The 802.16 protocol provides several mechanism designed to protect the service provider and the customer from unauthorized information disclosure.
‘WiMAX Security and Quality of Service: An End-to-End Perspective’ is a collection of carefully selected articles by researchers with extensive experience with WiMAX. Determining how to provide QoS and security for different applications is a significant issue and the aim of this book is to provide readers with an in-depth discussion of security and QoS considerations in WiMAX based communications. Many books and articles have addressed WiMAX and the IEEE 802.16e protocol, but an end-to-end prospective on security and QoS has been missing. This book is split into four parts. Part A introduces an overview of the end-to-end WiMAX architecture, its protocols and system requirements. Three chapters in Part B discuss security issues in WiMAX, while in Part C five chapters examine QoS in detail. Advanced topics on WiMAX architecture, resource allocation, mobility management and interfacing WiFi and WiMAX are discussed in Part D.
Part A: Introduction
Chapter 1 provides an overview of end-to-end WiMAX network architecture. The objective of this chapter is to discuss the detail of different wireless communications technologies, mobile WiMAX, radio interface specifications for WiMAX, different interface specifications and various interoperability issues of WiMAX networks, as well as inter-operability among the different WiMAX network vendors.
Part B: Security
Chapter 2 analyzes WiMAX security as defined in the different released versions of the IEEE 802.16 standards. It provides an overview of the WiMAX 802.16 networks and discusses the main security requirements to be met by a standard for broadband access. It then describes the security mechanisms that are to be guaranteed by the security sublayer and describes the weaknesses revealed in the initial versions, namely those related to fixed WiMAX. In this chapter, the security amendments made in the recent versions of mobile WiMAX are described and analyzed.
Key management in 802.16e is an important security issue and is discussed in Chapter 3. This chapter focuses specifically on the key management scheme of 802.16. Key derivation procedures and the key hierarchy of PKM version 2 are examined and discussed thoroughly. The weaknesses and countermeasures are identified and analyzed. Some comparisons with IEEE 802.11i and Third Generation (3G) mobile networks standards are also provided.
In Chapter 4, WiMAX network security is examined. The analysis is based on WiMAX Forum specification 1.2 and focuses on the standards, technical challenges the solutions for the issues of; 1) integration of authentication techniques and management of AAA (Authorization, Authentication, Accounting); 2) IP addressing and networking issues; and 3) distribution of the QoS parameters. These topics are analyzed from the perspective of the network manager and the interaction between the access network and the back-end.
Part C: Quality of Service
Chapter 5 focuses on cross-layer QoS architecture, highlighting both PMP and mesh topology aspects and the differences between them. Each type of topology presents a different means of obtaining QoS; however other important elements such as bandwidth allocation scheduling and call admission control algorithms are left to vendor implementation. This deficiency with reference to the MAC and PHY layers as well as other important issues are discussed in this chapter. The challenges for WiMAX QoS are also discussed, focusing the future of QoS in the IP world for multimedia applications.
QoS in Mobile WiMAX is addressed in Chapter 6. Here, QoS management in WiMAX networks is discussed. The analysis focuses on demonstrating how mobile WiMAX technology offers continuity of services while providing enhanced QoS guarantees in order to meet subscribers’ demands. The architectural QoS requirements that have to be fulfilled during subscribers’ mobility and the mechanisms constructed by the Mobile WiMAX network to provide QoS are discussed in this chapter. Service flow, the ‘connection-oriented’ nature of the MAC layer, the bandwidth request, and allocation procedures and the scheduling service are also examined.
Mobility Management in WiMAX Networks is addressed in Chapter 7. The authors discuss the amendment of the IEEE 802.16d-2004 standard which provides improvements related mainly to mobility management. This chapter also examines the logical architecture of a mobile WiMAX network defined by the Network Working Group1 (NWG) of the WiMAX Forum. Other topics discussed in this chapter include horizontal and vertical handover mechanisms and means for their improvement, as well as analysis of co-existence with other access technologies in networks in the future.
Chapter 8 discusses the challenges facing QoS in the handover process. This chapter describes the challenges that the handover process represents for the QoS performance indicators in full mobility scenarios. It also describes the application of QoS requirements for full mobility and the requirements relating to end-to-end performance. Timing and performance considerations in the handover process and the Media Independent Handover Initiative (MIH or IEEE802.21) are also discussed. The efficient scheduling of the handover process and its influence on handover performance, end-to-end quality of service and a handover performance analysis are the other topics presented in this chapter.
Resource Allocation in Mobile Networks is discussed in Chapter 9. Here, a technical overview is presented of the emerging Mobile WiMAX solution for broadband wireless and important issues related to QoS in Mobile WiMAX are discussed. Additionally, resource allocation in Mobile WiMAX is examined in this chapter. Issues related to scheduling and method of channel access for different Service Flows in MAC layer and burst profiles based on the AMC slot structure in OFDMA frame are examined. Multiuser resource allocation, which involves OFDMA, AMC and multiuser diversity, is presented for downlink mobile WiMAX networks. Furthermore, the Channel Aware Class Based Queue (CACBQ), which is an adaptive cross-layer for scheduling and slot allocation, is introduced.
Part D: Advanced Topics
Chapter 10 provides a discussion of QoS issues and challenges in WiMAX and WiMAX MMR networks. MAC-level QoS scheduling algorithms in WiMAX networks for multimedia traffic are also provided. This includes scheduling algorithms designed for a WiMAX mobile multi-hop relay (MMR) network. This chapter also discusses the characteristics of real-time traffic and the different codecs used for voice and video. A description of a few algorithms on uplink scheduling for real-time traffic in WiMAX networks is also provided. Additionally, MMR based WiMAX networks and downlink scheduling schemes for MMR based WiMAX networks are examined.
The Integration of WiFi and WiMAX Networks is an important issue and is discussed in Chapter 11. The deployment of an architecture that allows users to switch seamlessly between WiFi and WiMAX networks would afford several advantages to both users and service providers. However, WiMAX and WiFi networks have different protocol architectures and QoS support mechanisms; therefore an adaptation of protocol is required for their internetworking. This chapter outlines the design tenets for an interworking architecture between both WiFi and WiMAX technologies. The authors also define the various functional entities and their interconnections as well as end-to-end protocol layering in the interworking architecture, network selection and discovery and IP address allocation. Additionally, details are provided for the functional architecture and processes associated with security, QoS and mobility management.
QoS simulation and an enhanced solution for cell selection for WiMAX networks is discussed in Chapter 12. In this chapter, the authors examine the major WiMAX network simulation tools. A detailed system model for a cell selection algorithm is presented in this chapter. The authors have also performed simulation for QoS in a WiMAX network for several scenarios. An analysis of their simulation results are also provided.
The editors believe that this book is unique and significant in that it provides a complete end-to-end perspective on QoS and security issues in WiMAX and that it can be of great assistance to a large group of scientists, engineers and the wireless community with regard to the fast growing era of multimedia applications over wireless networks.
Seok-Yee TangHamid R. SharifPeter Müller
Acknowledgement
To Ursula, Samira, Francis and Alena.
Peter Müller
To my three boys and the love of my life for her encouragement, inspiration and support.
Hamid space
In memory of my mother. To my husband Chong Ming, my best friend Bibi, and my sister Seok Hun.
Seok-Yee Tang
The editors would like to thank and acknowledge all authors for their contribution to the book content and their cooperation during this book’s preparation process.
We would also like to thank the John Wiley & Sons Ltd team for their assistance and encouragement in making of this book.
List of Contributors
Editors
Peter MüllerIBM Zurich Research Laboratory, Switzerland;Formerly with Siemens R&D, Switzerland
Hamid R. SharifUniversity of Nebraska-Lincoln, USA
Seok Yee TangThink Wireless Tech Pte. Ltd., Singapore
Authors
Luca AdamoDepartment of Electronics and TelecommunicationsUniversity of Florence, Italy
Marina AguadoETSI, Departamento de Electrónica y TelecomunicacionesUniversity of the Basque Country, Spain
Marion BerbineauINRETS (Institut National de recherche sur les Transports et leur Sécurité),Université Lille Nord de France,Villeneuve d’Ascq, France
Debika BhattacharyyaHead, Department of CSEInstitute of Engineering & Management, Salt Lake,Kolkata, India
Noureddine BoudrigaCommunication Networks and Security Research Laboratory (CNAS),University of the 7th November at Carthage, Tunisia
Daniel CâmaraEURECOMMobile Communications DepartmentSophia-Antipolis Cedex, France
Mohuya ChakrabortyHead, Department of Information TechnologyInstitute of Engineering & Management, Salt Lake,Kolkata, India
Hakima ChaouchiTelecom and Management Sud ParisEvry cedex, France
Floriano De RangoDEIS DepartmentUniversity of Calabria, Italy
Romano FantacciHead of LaRT LaboratoryDepartment of Electronics and TelecommunicationsUniversity of Florence, Italy
Fethi FilaliQU Wireless Innovations CenterDoha, Qatar
Stefanos GritzalisLaboratory of Information and Communication Systems SecurityDepartment of Information and Communication Systems EngineeringUniversity of the Aegean, Karlovassi, Greece
Shen GuDepartment of Electronic EngineeringShanghai Jiaotong UniversityShanghai, China
Eduardo JacobETSI, Departamento de Electrónica y TelecomunicacionesUniversity of the Basque Country, Spain
Georgios KambourakisLaboratory of Information and Communication Systems SecurityDepartment of Information and Communication Systems EngineeringUniversity of the Aegean, Karlovassi, Greece
Neila KricheneCommunication Networks and Security Research Laboratory (CNAS),University of the 7th November at Carthage, Tunisia
Kiran KumariIndian Institute of Technology MadrasChennai, India
Leonardo MaccariDepartment of Electronics and TelecommunicationsUniversity of Florence, Italy
Andrea MalfitanoDEIS DepartmentUniversity of Calabria, Italy
Salvatore MaranoDEIS DepartmentUniversity of Calabria, Italy
Ikbal Chammakhi MsadaaEURECOMMobile Communications DepartmentSophia-Antipolis Cedex, France
Srinath NarasimhaIndian Institute of Technology MadrasChennai, India
Slim RekhisCommunication Networks and Security Research Laboratory (CNAS),University of the 7th November at Carthage, Tunisia
Ivan Lledo SamperBournemouth University, UK
Krishna M. SivalingamIndian Institute of Technology Madras, Chennai, India;Formerly with University of Maryland Baltimore County,Baltimore, USA
Jiajing WangDepartment of Electronic EngineeringShanghai Jiaotong UniversityShanghai, China
Xinbing WangDepartment of Electronic EngineeringShanghai Jiaotong UniversityShanghai, China
Yuan WuDepartment of Electronic EngineeringShanghai Jiaotong UniversityShanghai, China
Tara Ali YahiyaComputer Science Laboratory, Paris-Sud 11 University, France
List of Acronyms
2G
Second Generation mobile networks
3G
Third Generation mobile networks
3GPP
Third Generation Partnership Project
3GPP2
Third Generation Partnership Project 2
4G
Fourth Generation mobile networks
AAA
Authorization, Authentication and Accounting
AAS
Adaptive Antenna System
AAT
Advanced Antenna Technology
AC
Access Category
ACK
Acknowledge
ACM
Adaptive Coding and Modulation
ACs
Access Categories
AES
Advanced Encryption Standard
AIFS
Arbitration Interframe Space
AK
Authorization Key
AKA
Authentication and Key Agreement
AKID
Authentication Key Identifier
AMC
Adaptive Modulation and Coding
AMR
Adaptive Multi Rate
AP
Access Point
AR
Access Router
ARQ
Automatic Repeat Request
AS
Authentication Server
ASN
Access Service Network
ASN
Abstract Syntax Notation
ASN-GW
Access Service Network Gateway
ASP
Application Service Provider
ATM
Asynchronous Transfer Mode
AUTN
Authentication Token
AV
Authentication Vector
AWGN
Additive White Gaussian Noise
BCID
Basic Connection Identity
BE
Best Effort
BER
Bit Error Rate
BLER
Block Error Rate
BPSK
Binary Phase Shift Keying
BR
Bandwidth Request
BRAS
Broadband Access Server
BS
Base Station
BSID
Base Station Identity
BW
Bandwidth
BWA
Broadband Wireless Access
CA
Certification Authority
CAC
Call Admission Control
CACBQ
Channel Aware Class Based Queue
CAPF
Cost Adjusted Proportional Fair
CBC
Cipher Block Chaining
CBR
Constant Bit Rate
CCM
Counter with CBC-MAC
CDMA
Code Division Multiple Access
CELP
Code Excited Linear Prediction
CID
Connection Identifier
CINR
Carrier to Interference plus Noise Ratio
CK
Cipher key
CMAC
Cipher Message Authentication Code
CMIP
Client-MIP
COA
Care-of-Address
COTS
Commercial Off-The-Shelf
CPE
Consumer Premises Equipment
CPS
Common Part Sublayer
CQI
Channel Quality Indicator
CQICH
Channel Quality Indicator Channel
CRC
Cyclic Redundancy Check
CRL
Certificate Revocation List
CS
Convergence Sublayer
CSC
Connectivity Service Controllers
CSCl
Convegence Sublayer Classifiers
CSMA CA
Carrier Sense Multiple Access with Collision Avoidance
CSN
Connectivity Service Network
CSP
Common Part Sub-layer
CSs
Service Classes
CW
Contention Window
DAD
Duplicate Address Detection
DCD
Downlink Channel Descriptor
DCF
Distributed Coordination Function
DER
Distinguished Encoding Rule
DES
Data Encryption Standard
DFR
Decode and Forward Relay
DFS
Dynamic Frequency Selection
DHCP
Dynamic Host Configuration Protocol
DHMM
Dynamical Hierarchical Mobility Management
DIAMETER
Protocol extending RADIUS
DiffServ
Differentiated Service
DL
Downlink
DOCSIS
Data Over Cable Service Interface Specification
DoD
Department of Defence
DoS
Denial of Service
DSA-REQ
Dynamic Service Addition request
DSA-RSP
Dynamic Service Addition response
DSL
Digital Subscriber Line
DSSS
Direct Sequence Spread Spectrum
EAP
Extensible Authentication Protocol
EAP-AKA
EAP-Authentication and Key Agreement
EAPOL
EAP over LAN
EAP-TTLS
EAP-Tunneled Transport Layer Security
EC
Encryption Control
EDCA
Enhanced Distributed Channel Access
EDCF
Enhanced Distributed Coordination Function
EDF
Earliest Deadline First
EFR
Enhanced Full Rate
EIK
EAP Integrity Key
EKS
Encryption Key Sequence
ertPS
Extended Real Time Polling Service
ETSI
European Telecommunications Standards Institute
E-UTRAN
Evolved UMTS Terrestrial Radio Access Network
FA
Foreign Agent
FBack
Fast Binding Acknowledgment
FBSS
Fast Base Station Switching handover
FBU
Fast Binding Update
FCH
Frame Control Header
FDD
Frequency Division Duplex
FDMA
Frequency Division Multiple Access
FEC
Forward Error Correction
FFT
Fast Fourier Transform
FHSS
Frequency Hopping Spread Spectrum
FIFO
First In First Out
FPC
Fast Power Control
FTP
File Transfer Protocol
FUSC
Full Usage of Subchannels
GKDA
Group-based Key Distribution Algorithm
GKEK
Group Key Encryption Key
GKMP
Group Key Management Protocol
GMH
Generic MAC Frame Header
GPC
Grant Per Connection
GPRS
General Packet Radio Service
GSA
Group Security Association
GSAID
Group SAID
GSM FR
GSM Full rate
GSM
Global System for Mobile Communications
GTEK
Group Traffic Encryption Key
GTK
Group Transient Key
HA
Home Agent
HAck
Handover Acknowledgment
HAP
High Altitude Platform
HARQ
Hybrid Automatic Repeat Request
HCCA
HCF Controlled Channel Access
HCF
Hybrid Coordination Function
HCS
Header Check Sequence
HDR
High Data Rate
HDTV
High-definition TV
HHO
Hard Handover
HI
Handover Initiation
HIPERMAN
High Performance Radio Metropolitan Area Network
HMAC
Hash Message Authentication Code
HNSP
Home Network Service Provider
HO
Handover
HOA
Home-of-Address
HOKEY
Handover Keying (Group)
HoL
Head of Line
HSPA
High-Speed Packet Access
HSPA+
Evolved HSPA
HT
Header Type
HUF
Highest Urgency First
ICV
Integrity Checking Value
ID
Identifier
IE
Information Element
IEEE
Institute of Electrical & Electronics Engineers, Inc.
IETF
Internet Engineering Task Force
IK
Integrity Key
IKE
Internet Key Exchange (protocol)
ILBC
Internet Low Bit rate Codec
IP
Internet Protocol
IPv6
Internet Protocol version 6
ISI
Intersymbol Interference
ISO
International Standard Organization
ISP
Internet Service Provider
ITU
International Telecommunication Union
IV
Initialization Vector
KDF
Key Derivation Function
KEK
Key Encryption Key
L2
Layer 2
L3
Layer 3
LAN
Local Area Network
LDPC
Low Density Parity Check
Link ID
Link Identifier
LOS
Line of Sight
LRC
Low Runtime Complexity
LTE
Long Term Evolution
M3
Mesh Mobility Management
MAC
Media Access Control
MAC
Message Authentication Code
MAN
Metropolitan Area Network
MAP
Media Access Protocol
MAP
Mesh Access Point
MBRA
Multicast and Broadcast Rekeying Algorithm
MBS
Multicast and Broadcast Service
MCS
Modulation and Coding Scheme
MDHO
Macro Diversity Handover
MIB
Management Information Base
MIC
Message Integrity Code
MICS
Media-Independent Command Service
MIES
Media-Independent Event Service
MIH
Media-Independent Handover
MIHF
Media-Independent Handover Function
MIHU
Media-Independent Handover User
MIIS
Media-Independent Information Service
MIM
Man In the Middle
MIMO
Multiple Input Multiple Output
MIP
Mobile IP
MMR
Mobile Multi-hop Relay
MMS
Multimedia Messaging Service
MN
Mobile Node
MOS
Mean Opinion Score
MP
Mesh Point
MPDU
MAC Protocol Data Unit
MPEG
Moving Picture Expert Group
MPP
Mesh Portal Point
MRR
Minimum Reserved Rate
MS
Mobile Station
MS
Mobile Subscriber Station
MSB
Most Significant Bit
MSCHAPv2
Microsoft Challenge-Handshake Authentication Protocol
mSCTP
Mobile Stream Control Transmission Protocol
MSDU
MAC Service Data Unit
MSE
Mean Square Error
MSID
Mobile Station Identifier
MSK
Master Session Key
MSO
Multi-Services Operator
MSR
Maximum Sustained Rate
MSS
Mobile Subscriber Station
MTK
MBS Traffic Key
MVNO
Mobile Virtual Network Operator
NAP
Network Access Provider
NAP
Network Access Point
NAR
New Access Router
NBR
Neighbor
NCoA
New Care of Address
NGWS
Next Generation Wireless System
NLOS
Non Line-of-Sight
NMS
Network Management System
Node ID
Node Identifier
NRM
Network Reference Model
nrtPS
Non-Real-Time Polling Service
NSP
Network Service Provider
NSSK
Needham Schroeder Secret Key Protocol
NTSC
National television System Committee
NWG
Network Working Group
OCSP
Online Certificate Status Protocol
O-DRR
Opportunistic- Deficit Round Robin
OFDM
Orthogonal Frequency Division Multiplex
OFDM2A
Orthogonal Frequency Division Multi-hop Multi-Access
OFDMA
Orthogonal Frequency Division Multiple Access
OSS
Operator Shared Secret
OTA
Over-The-Air
P2MP
Point to Multi-Point
PAR
Previous Access Router
PCF
Point Coordination Function
PCM
Pulse Code Modulation
PCMCIA
Personal Computer Memory Card International Association
PCoA
Previous Care of Address
PDAs
Personal Digital Assistants
PDU
Protocol Data Unit
PEAP
Protected EAP
PEAQ
Perceptual Evaluation of Audio Quality
PER
Packet Error Rate
PESQ
Perceptual Evaluation of Speech Quality
PF
Proportionate Fair
PFMR
Proportional Fair with Minimum/Maximum Rate Constraints
PHS
Packet Header Suppression
PHY
Physical Layer
PKC
Public Key Certificates
PKM
Privacy Key Management
PM
Poll Me bit
PMIP
Proxy-MIP
PMK
Pairwise Master Key
PMM
Packet Mobility Management (protocol)
PMP
Point to Multipoint
PN
Packet Number
PoA
Point of Attachment
PPP
Point-to-Point
PPPoE
Point-to-Point Protocol over Ethernet
Pre-PAK
pre-Primary Authorization Key
PrRtAdv
Proxy Router Advertisement
PS
Privacy Sublayer
PSK
Pre-Shared Key
PSNR
Peak Signal to Noise Ratio
PSOR
PF Scheduling for OFDMA Relay Networks
PSTN
Public Switched Telephone Network
PTK
Pairwise Transient Key
PTP
Point To Point
PUSC
Partial Usage of Subchannels
QAM
Quadrature Amplitude Modulation
QoS
Quality of Service
QoS
Quality of Signal
QPSK
Quadrature Phase Shift Keying
RADIUS
Remote Authentication Dial-In User Service
RAND
Random Number
RC
Resource Controller
REG-REQ
Registration Request
REG-RSP
Registration Response
REQ
Request
RES
Result
RF
Radio Frequency
RLC
Radio Link Control
RNG-REQ
Ranging Request
RNG-RSP
Ranging Response
RNM
Reference Network Model
ROC
Rollover Counter
RP
Reference Point
RR
Round Robin
RRA
Radio Resource Agent
RRC
Radio Resource Control
RRM
Radio Resource Management
RRP
Registration RePly
RRQ
Registration ReQuest
RS
Relay Station
RSA
Rivest, Shamir, and Adelman
RSP
Response
RSS
Received Signal Strength
RSSI
Received Signal Strength Indication
RTG
Receive/Transmit Transition Gap
rtPS
Real Time Polling service
RtSolPr
Router Solicitation for Proxy Advertisement
SA
Security Association
SAID
SA Identifier
SAP
Service Access Point
SBC-RSP
SS Basic Capabilitiy response
SC
Single Carrier
SCN
Service Class Name
SCTP
Stream Control Transmission Protocol
SDU
Segment Data Units
SeS
Security Sublayer
SFID
Service Flow IDentifier
SGKEK
Sub-Group Key Encryption Key
SHA
Secure Hash Algorithm
SIM
Subscriber Identity Module
SINR
Signal to Interference-plus-Noise Ratio
SIP
Session Initiation Protocol
SIR
Signal to Interference Ratio
SMS
Short Message Service
SNIR
Signal to Noise + Interference Ratio
SNMP
Simple Network Management Protocol
SNR
Signal to Noise Ratio
SOFDMA
Scalable Orthogonal Frequency Division Multiple Access
SR
Superior Router
SS
Spectrum Sharing
SS
Subscriber Station
SSCS
Service Specific Convergence Sublayer
SSID
Service Set Identifier
STS
Sub-channels of a Time Slot
TCP
Transmission Control Protocol
TDD
Time Division Duplex
TDMA
Time Division Multiple Access
TEK
Traffic Encryption Key
TFTP
Trivial File Transfer Protocol
THBA
Two-level Hierarchical Bandwidth Allocation scheme
TLS
Transport Layer Security
TLV
Type-Length-Value
TPP
Two-Phase Proportionating
TR
Transmit Receive
TTG
Transmit/Receive Transition Gap
TTLS
Tunneled Transport Layer Security
TTP
Trusted Third Party
TXOP
Transmission Opportunities
UCD
Uplink Channel Descriptor
UDP
User Datagram Protocol
UGS
Unsolicited Grant Service
UGS-AD
Unsolicited Grant Service-Activity Detection
UL
Uplink
UL-MAP
Uplink MAP
UMTS
Universal Mobile Telecommunications System
UNA
Unsolicited Neighbor Advertisement
VBR
Variable Bit Rate
VCEG
Video Coding Experts Group
VHDA
Vertical Handoff Decision Algorithm
VHO
Vertical Handover
VNSP
Visited Network Service Provider
VoD
Video on Demand
VoIP
Voice over IP
W2-AP
WiMAX/WiFi Access Point
WBA
Wireless Broadband Access
WEIRD
WiMAX Extension to Isolated Research Data networks
WEP
Wired EquivalentPrivacy
WFPQ
Weighted Fair Priority Queuing
WFQ
Weighted Fair Queuing
Wibro
Wireless Broadband
WiFi
Wireless Fidelity
WiMAX
Worldwide Interoperability for Microwave Access
WiMESH
WiMAX Mesh
WLAN
Wireless Local Area Network
WMAN
Wireless Metropolitan Area Network
WRI
WiMAX Roaming Interface
WRR
Weighted Round Robin
WRX
WiMAX Roaming Exchange
WWAN
Wireless Wide Area Network
XDSL
X Digital Subscriber Line
XML
Extensible Markup Language
XRES
Expected Response
List of Figures
1.1 Operational principles of WiMAX technology
1.2 End-to-End WiMAX network architecture
2.1 IEEE 802.16 standard’s network topology
2.2 WiMAX network architecture
2.3 IEEE 802.16 protocol stack
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
