WiMAX Security and Quality of Service -  - E-Book

WiMAX Security and Quality of Service E-Book

0,0
98,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements. Security is an essential element in the wireless world and Part B is fully dedicated to this topic. Part C provides an in depth analysis of QoS, including mobility management in WiMAX. Finally, Part D introduces the reader to advanced and future topics. * One of the first texts to cover security, QoS and deployments of WiMAX in the same book. * Introduces the primary concepts of the interdisciplinary nature of WiMAX security and QoS, and also includes discussion of hot topics in the field. * Written for engineers and researchers, answering practical questions from industry and the experimental field in academia. * Explains how WiMAX applications' security and QoS are interconnected and interworked among the cross layers.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 757

Veröffentlichungsjahr: 2011

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Contents

Preface

Acknowledgement

List of Contributors

List of Acronyms

List of Figures

List of Tables

Part A Introduction

Chapter 1: Overview of End-to-End WiMAX Network Architecture

1.1 Introduction

1.2 Wireless Primer

1.3 Introduction to WiMAX Technology

1.4 Mobile WiMAX

1.5 Overview of End-to-End WiMAX Network Architecture

1.6 Radio Interface Specifications for WiMAX

1.7 Interoperability Issues in WiMAX

1.8 Summary

References

Part B Security

Chapter 2: WiMAX Security Defined in 802.16 Standards

2.1 Introduction

2.2 Overview of 802.16 WMAN Networks

2.3 Security Requirements for Broadband Access in WMAN Networks

2.4 Security Mechanisms in Initial 802.16 Networks

2.5 Analysis of Security Weaknesses in Initial Versions of 802.16

2.6 Security Amendments in Recent Versions if IEEE 802.16

2.7 Analysis of Security Weaknesses in 802.16e

2.8 Further Reading

2.9 Summary

References

Chapter 3: Key Management in 802.16e

3.1 Introduction

3.2 Privacy Key Management Protocol

3.3 PKM Version 1

3.4 PKM Version 2

3.5 Vulnerabilities and Countermeasures

3.6 Comparisons with 802.11/UMTS

3.7 Summary

References

Chapter 4: WiMAX Network Security

4.1 Introduction

4.2 WiMAX Network Reference Model

4.3 The RADIUS Server

4.4 WiMAX Networking Procedures and Security

4.5 Further Reading

4.6 Summary

References

Part C Quality of Service

Chapter 5: Cross-Layer End-to-End QoS Architecture:

5.1 Introduction

5.2 QoS Definitions

5.3 QoS Mechanisms Offered by IEEE 802.16

5.4 What is Missing in the WiMAX Features?

5.5 Future Challenges

5.6 Summary

References

Chapter 6: QoS in Mobile WiMAX

6.1 Introduction

6.2 Architectural QoS Requirements

6.3 Mobile WiMAX Service Flows

6.4 Admission Control

6.5 Scheduling Service

6.6 Maintaining QoS During Handover

6.7 Enhancing WiMAX QoS Issues: Research Work

6.8 Further Reading

6.9 Summary

References

Chapter 7: Mobility Management in WiMAX Networks

7.1 Mobile WiMAX Architecture

7.2 Horizontal Handover in 802.16e

7.3 Optimized 802.16e Handover Schemes

7.4 Vertical Handover

7.5 Roaming

7.6 Mobility Management in WiMESH Networks

7.7 Conclusion

7.8 Summary

References

Part D Advanced Topics

Chapter 8: QoS Challenges in the Handover Process

8.1 Introduction

8.2 Handover in WiMAX

8.3 The IEEE802.16 Handover Process

8.4 The Media Independent Handover Initiative – IEEE 802.21

8.5 Enhancing the Handover Process

8.6 Handover Scheduling

8.7 Handover Performance Analysis

8.8 Summary

References

Chapter 9: Resource Allocation in Mobile WiMAX Networks

9.1 Introduction

9.2 Background on IEEE 802.16e

9.3 System Model

9.4 OFDMA Key Principles–Analysis and Performance Characterizations

9.5 Cross-Layer Resource Allocation in Mobile WiMAX

9.6 Channel Aware Class Based Queue (CACBQ) – The Proposed Solution

9.7 Summary and Conclusion

References

Chapter 10: QoS Issues and Challenges in WiMAX and WiMAX MMR Networks

10.1 Introduction

10.2 Multimedia Traffic

10.3 Multimedia: WiFi versus WiMAX

10.4 QoS Scheduling in WiMAX Networks

10.5 Voice Traffic Scheduling in WiMAX

10.6 Video Traffic Scheduling in WiMAX

10.7 Introduction to WiMAX MMR Networks

10.8 Scheduling in WiMAX MMR Networks

10.9 Basic Wireless Scheduling Algorithms

10.10 Scheduling Algorithms for WiMAX MMR Networks

10.11 Further Reading

10.12 Summary

References

Chapter 11: On the Integration of WiFi and WiMAX Networks

11.1 Introduction

11.2 General Design Principles of the Interworking Architecture

11.3 WiFi/Mobile WiMAX Interworking Architecture

11.4 Network Discovery and Selection

11.5 Authentication and Security Architecture

11.6 Security in WiFi and WiMAX Networks

11.7 Mobility Management

11.8 Quality of Service Architecture

11.9 Summary

References

Chapter 12: QoS Simulation and An Enhanced Solution of Cell Selection for WiMAX Network

12.1 Introduction

12.2 WiMAX Simulation Tools – Overview

12.3 QoS Simulation of WiMAX Network

12.4 Analysis of QoS Simulation Results

12.5 Enhancement – A New Solution of Cell Selection

12.6 Summary

References

Appendix List of Standards

Index

This edition first published 2010

© 2010 John Wiley & Sons Ltd.,

Registered office

John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom

For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.

The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought.

Library of Congress Cataloging-in-Publication Data

WiMAX security and quality of service : an end-to-end perspective / edited by Seok-Yee Tang,Peter Müller, and Hamid Sharif.p. cm.Includes bibliographical references and index.ISBN 978-0-470-72197-1 (cloth)1. Wireless metropolitan area networks–Security measures. 2. IEEE 802.16 (Standard)I. Tang, Seok-Yee, 1968- II. Müller, Peter, 1961 July 8- III. Sharif, Hamid R. (Hamid Reza), 1958-TK5105.85.W55 2010621.382′1 – dc222010003319

A catalogue record for this book is available from the British Library.

ISBN 978-0-470-72197-1 (H/B)

Preface

The rapid increase in demand for high-speed broadband wireless networks has spurred the development of new technologies in recent years. Worldwide Interoperability for Microwave Access, known as WiMAX, is one of these technologies. WiMAX is based on the IEEE 802.16 family of standards and offers flexible fixed and mobile wireless solutions along with high-bandwidth services for extended distance coverage and a variety of applications including support of an array of multimedia functions.

IEEE 802.16e is the most popular implementation of this standard; it defines a path of evolution to support high throughput wireless technology for mobile systems. The WiMAX mobile wireless standard, which was defined originally by the IEEE 802.16e-2005 amendment, is now being deployed in more than 140 countries by more than 475 operators.

The 802.16 Medium Access Control (MAC) is designed to support high data transfer for uplink and downlink communications between a base station and a large number of clients for continuous and bursty traffic. WiMAX also supports significant flexible operations across a wide range of spectrum allocation including both licensed and license-exempt frequencies of 2 to 11 GHz. It provides an access system which is based on a request-grant mechanism designed to support service requirements, scalability and efficiency. Along with the bandwidth allocation task, the IEEE 802.16 access mechanism provides a sublayer designed to support privacy and authentication for network access and establishment of connection.

Quality of Service (QoS) is an important factor in WiMAX technologies. WiMAX can provide QoS for wireless broadband communications over an extended coverage area for real-time delay-sensitive applications such as Voice over IP and real-time streaming in stationary or mobile environments. It offers different access methods for different classes of traffic. The 802.16e protocol is a connection-oriented medium access control with service flows as well as a grant-based system which allows centralized control and eliminates overheads and delay of acknowledgements. This in turn provides an effective QoS handling which is fundamentally different from connectionless wireless protocols such as IEEE 802.11. The IEEE 802.16 grant-based MAC can react to QoS requests in real time which reduces the workload of the base stations and produces lower overheads since connections are aggregated.

Additionally, in order to guarantee the QoS of competing services, the fragmentation of the 802.16 Protocol Data Units allows for very large Service Data Units to be sent across frame boundaries. OFDM and OFDMA also provide error correction and interleaving in order to improve QoS. Furthermore, the adaptive modulation techniques used in WiMAX technology result in extended wireless distance coverage areas.

Security is also an important feature of WiMAX and was included in the 802.16 protocol after the failures that restricted the early IEEE 802.11 networks. Security is handled by a privacy sublayer within the WiMAX MAC. WiMAX provides a flexible means for authenticating subscriber stations and users in order to prevent unauthorized use. The 802.16 protocol provides several mechanism designed to protect the service provider and the customer from unauthorized information disclosure.

‘WiMAX Security and Quality of Service: An End-to-End Perspective’ is a collection of carefully selected articles by researchers with extensive experience with WiMAX. Determining how to provide QoS and security for different applications is a significant issue and the aim of this book is to provide readers with an in-depth discussion of security and QoS considerations in WiMAX based communications. Many books and articles have addressed WiMAX and the IEEE 802.16e protocol, but an end-to-end prospective on security and QoS has been missing. This book is split into four parts. Part A introduces an overview of the end-to-end WiMAX architecture, its protocols and system requirements. Three chapters in Part B discuss security issues in WiMAX, while in Part C five chapters examine QoS in detail. Advanced topics on WiMAX architecture, resource allocation, mobility management and interfacing WiFi and WiMAX are discussed in Part D.

Part A: Introduction

Chapter 1 provides an overview of end-to-end WiMAX network architecture. The objective of this chapter is to discuss the detail of different wireless communications technologies, mobile WiMAX, radio interface specifications for WiMAX, different interface specifications and various interoperability issues of WiMAX networks, as well as inter-operability among the different WiMAX network vendors.

Part B: Security

Chapter 2 analyzes WiMAX security as defined in the different released versions of the IEEE 802.16 standards. It provides an overview of the WiMAX 802.16 networks and discusses the main security requirements to be met by a standard for broadband access. It then describes the security mechanisms that are to be guaranteed by the security sublayer and describes the weaknesses revealed in the initial versions, namely those related to fixed WiMAX. In this chapter, the security amendments made in the recent versions of mobile WiMAX are described and analyzed.

Key management in 802.16e is an important security issue and is discussed in Chapter 3. This chapter focuses specifically on the key management scheme of 802.16. Key derivation procedures and the key hierarchy of PKM version 2 are examined and discussed thoroughly. The weaknesses and countermeasures are identified and analyzed. Some comparisons with IEEE 802.11i and Third Generation (3G) mobile networks standards are also provided.

In Chapter 4, WiMAX network security is examined. The analysis is based on WiMAX Forum specification 1.2 and focuses on the standards, technical challenges the solutions for the issues of; 1) integration of authentication techniques and management of AAA (Authorization, Authentication, Accounting); 2) IP addressing and networking issues; and 3) distribution of the QoS parameters. These topics are analyzed from the perspective of the network manager and the interaction between the access network and the back-end.

Part C: Quality of Service

Chapter 5 focuses on cross-layer QoS architecture, highlighting both PMP and mesh topology aspects and the differences between them. Each type of topology presents a different means of obtaining QoS; however other important elements such as bandwidth allocation scheduling and call admission control algorithms are left to vendor implementation. This deficiency with reference to the MAC and PHY layers as well as other important issues are discussed in this chapter. The challenges for WiMAX QoS are also discussed, focusing the future of QoS in the IP world for multimedia applications.

QoS in Mobile WiMAX is addressed in Chapter 6. Here, QoS management in WiMAX networks is discussed. The analysis focuses on demonstrating how mobile WiMAX technology offers continuity of services while providing enhanced QoS guarantees in order to meet subscribers’ demands. The architectural QoS requirements that have to be fulfilled during subscribers’ mobility and the mechanisms constructed by the Mobile WiMAX network to provide QoS are discussed in this chapter. Service flow, the ‘connection-oriented’ nature of the MAC layer, the bandwidth request, and allocation procedures and the scheduling service are also examined.

Mobility Management in WiMAX Networks is addressed in Chapter 7. The authors discuss the amendment of the IEEE 802.16d-2004 standard which provides improvements related mainly to mobility management. This chapter also examines the logical architecture of a mobile WiMAX network defined by the Network Working Group1 (NWG) of the WiMAX Forum. Other topics discussed in this chapter include horizontal and vertical handover mechanisms and means for their improvement, as well as analysis of co-existence with other access technologies in networks in the future.

Chapter 8 discusses the challenges facing QoS in the handover process. This chapter describes the challenges that the handover process represents for the QoS performance indicators in full mobility scenarios. It also describes the application of QoS requirements for full mobility and the requirements relating to end-to-end performance. Timing and performance considerations in the handover process and the Media Independent Handover Initiative (MIH or IEEE802.21) are also discussed. The efficient scheduling of the handover process and its influence on handover performance, end-to-end quality of service and a handover performance analysis are the other topics presented in this chapter.

Resource Allocation in Mobile Networks is discussed in Chapter 9. Here, a technical overview is presented of the emerging Mobile WiMAX solution for broadband wireless and important issues related to QoS in Mobile WiMAX are discussed. Additionally, resource allocation in Mobile WiMAX is examined in this chapter. Issues related to scheduling and method of channel access for different Service Flows in MAC layer and burst profiles based on the AMC slot structure in OFDMA frame are examined. Multiuser resource allocation, which involves OFDMA, AMC and multiuser diversity, is presented for downlink mobile WiMAX networks. Furthermore, the Channel Aware Class Based Queue (CACBQ), which is an adaptive cross-layer for scheduling and slot allocation, is introduced.

Part D: Advanced Topics

Chapter 10 provides a discussion of QoS issues and challenges in WiMAX and WiMAX MMR networks. MAC-level QoS scheduling algorithms in WiMAX networks for multimedia traffic are also provided. This includes scheduling algorithms designed for a WiMAX mobile multi-hop relay (MMR) network. This chapter also discusses the characteristics of real-time traffic and the different codecs used for voice and video. A description of a few algorithms on uplink scheduling for real-time traffic in WiMAX networks is also provided. Additionally, MMR based WiMAX networks and downlink scheduling schemes for MMR based WiMAX networks are examined.

The Integration of WiFi and WiMAX Networks is an important issue and is discussed in Chapter 11. The deployment of an architecture that allows users to switch seamlessly between WiFi and WiMAX networks would afford several advantages to both users and service providers. However, WiMAX and WiFi networks have different protocol architectures and QoS support mechanisms; therefore an adaptation of protocol is required for their internetworking. This chapter outlines the design tenets for an interworking architecture between both WiFi and WiMAX technologies. The authors also define the various functional entities and their interconnections as well as end-to-end protocol layering in the interworking architecture, network selection and discovery and IP address allocation. Additionally, details are provided for the functional architecture and processes associated with security, QoS and mobility management.

QoS simulation and an enhanced solution for cell selection for WiMAX networks is discussed in Chapter 12. In this chapter, the authors examine the major WiMAX network simulation tools. A detailed system model for a cell selection algorithm is presented in this chapter. The authors have also performed simulation for QoS in a WiMAX network for several scenarios. An analysis of their simulation results are also provided.

The editors believe that this book is unique and significant in that it provides a complete end-to-end perspective on QoS and security issues in WiMAX and that it can be of great assistance to a large group of scientists, engineers and the wireless community with regard to the fast growing era of multimedia applications over wireless networks.

Seok-Yee TangHamid R. SharifPeter Müller

Acknowledgement

To Ursula, Samira, Francis and Alena.

Peter Müller

To my three boys and the love of my life for her encouragement, inspiration and support.

Hamid space

In memory of my mother. To my husband Chong Ming, my best friend Bibi, and my sister Seok Hun.

Seok-Yee Tang

The editors would like to thank and acknowledge all authors for their contribution to the book content and their cooperation during this book’s preparation process.

We would also like to thank the John Wiley & Sons Ltd team for their assistance and encouragement in making of this book.

List of Contributors

Editors

Peter MüllerIBM Zurich Research Laboratory, Switzerland;Formerly with Siemens R&D, Switzerland

Hamid R. SharifUniversity of Nebraska-Lincoln, USA

Seok Yee TangThink Wireless Tech Pte. Ltd., Singapore

Authors

Luca AdamoDepartment of Electronics and TelecommunicationsUniversity of Florence, Italy

Marina AguadoETSI, Departamento de Electrónica y TelecomunicacionesUniversity of the Basque Country, Spain

Marion BerbineauINRETS (Institut National de recherche sur les Transports et leur Sécurité),Université Lille Nord de France,Villeneuve d’Ascq, France

Debika BhattacharyyaHead, Department of CSEInstitute of Engineering & Management, Salt Lake,Kolkata, India

Noureddine BoudrigaCommunication Networks and Security Research Laboratory (CNAS),University of the 7th November at Carthage, Tunisia

Daniel CâmaraEURECOMMobile Communications DepartmentSophia-Antipolis Cedex, France

Mohuya ChakrabortyHead, Department of Information TechnologyInstitute of Engineering & Management, Salt Lake,Kolkata, India

Hakima ChaouchiTelecom and Management Sud ParisEvry cedex, France

Floriano De RangoDEIS DepartmentUniversity of Calabria, Italy

Romano FantacciHead of LaRT LaboratoryDepartment of Electronics and TelecommunicationsUniversity of Florence, Italy

Fethi FilaliQU Wireless Innovations CenterDoha, Qatar

Stefanos GritzalisLaboratory of Information and Communication Systems SecurityDepartment of Information and Communication Systems EngineeringUniversity of the Aegean, Karlovassi, Greece

Shen GuDepartment of Electronic EngineeringShanghai Jiaotong UniversityShanghai, China

Eduardo JacobETSI, Departamento de Electrónica y TelecomunicacionesUniversity of the Basque Country, Spain

Georgios KambourakisLaboratory of Information and Communication Systems SecurityDepartment of Information and Communication Systems EngineeringUniversity of the Aegean, Karlovassi, Greece

Neila KricheneCommunication Networks and Security Research Laboratory (CNAS),University of the 7th November at Carthage, Tunisia

Kiran KumariIndian Institute of Technology MadrasChennai, India

Leonardo MaccariDepartment of Electronics and TelecommunicationsUniversity of Florence, Italy

Andrea MalfitanoDEIS DepartmentUniversity of Calabria, Italy

Salvatore MaranoDEIS DepartmentUniversity of Calabria, Italy

Ikbal Chammakhi MsadaaEURECOMMobile Communications DepartmentSophia-Antipolis Cedex, France

Srinath NarasimhaIndian Institute of Technology MadrasChennai, India

Slim RekhisCommunication Networks and Security Research Laboratory (CNAS),University of the 7th November at Carthage, Tunisia

Ivan Lledo SamperBournemouth University, UK

Krishna M. SivalingamIndian Institute of Technology Madras, Chennai, India;Formerly with University of Maryland Baltimore County,Baltimore, USA

Jiajing WangDepartment of Electronic EngineeringShanghai Jiaotong UniversityShanghai, China

Xinbing WangDepartment of Electronic EngineeringShanghai Jiaotong UniversityShanghai, China

Yuan WuDepartment of Electronic EngineeringShanghai Jiaotong UniversityShanghai, China

Tara Ali YahiyaComputer Science Laboratory, Paris-Sud 11 University, France

List of Acronyms

2G

Second Generation mobile networks

3G

Third Generation mobile networks

3GPP

Third Generation Partnership Project

3GPP2

Third Generation Partnership Project 2

4G

Fourth Generation mobile networks

AAA

Authorization, Authentication and Accounting

AAS

Adaptive Antenna System

AAT

Advanced Antenna Technology

AC

Access Category

ACK

Acknowledge

ACM

Adaptive Coding and Modulation

ACs

Access Categories

AES

Advanced Encryption Standard

AIFS

Arbitration Interframe Space

AK

Authorization Key

AKA

Authentication and Key Agreement

AKID

Authentication Key Identifier

AMC

Adaptive Modulation and Coding

AMR

Adaptive Multi Rate

AP

Access Point

AR

Access Router

ARQ

Automatic Repeat Request

AS

Authentication Server

ASN

Access Service Network

ASN

Abstract Syntax Notation

ASN-GW

Access Service Network Gateway

ASP

Application Service Provider

ATM

Asynchronous Transfer Mode

AUTN

Authentication Token

AV

Authentication Vector

AWGN

Additive White Gaussian Noise

BCID

Basic Connection Identity

BE

Best Effort

BER

Bit Error Rate

BLER

Block Error Rate

BPSK

Binary Phase Shift Keying

BR

Bandwidth Request

BRAS

Broadband Access Server

BS

Base Station

BSID

Base Station Identity

BW

Bandwidth

BWA

Broadband Wireless Access

CA

Certification Authority

CAC

Call Admission Control

CACBQ

Channel Aware Class Based Queue

CAPF

Cost Adjusted Proportional Fair

CBC

Cipher Block Chaining

CBR

Constant Bit Rate

CCM

Counter with CBC-MAC

CDMA

Code Division Multiple Access

CELP

Code Excited Linear Prediction

CID

Connection Identifier

CINR

Carrier to Interference plus Noise Ratio

CK

Cipher key

CMAC

Cipher Message Authentication Code

CMIP

Client-MIP

COA

Care-of-Address

COTS

Commercial Off-The-Shelf

CPE

Consumer Premises Equipment

CPS

Common Part Sublayer

CQI

Channel Quality Indicator

CQICH

Channel Quality Indicator Channel

CRC

Cyclic Redundancy Check

CRL

Certificate Revocation List

CS

Convergence Sublayer

CSC

Connectivity Service Controllers

CSCl

Convegence Sublayer Classifiers

CSMA CA

Carrier Sense Multiple Access with Collision Avoidance

CSN

Connectivity Service Network

CSP

Common Part Sub-layer

CSs

Service Classes

CW

Contention Window

DAD

Duplicate Address Detection

DCD

Downlink Channel Descriptor

DCF

Distributed Coordination Function

DER

Distinguished Encoding Rule

DES

Data Encryption Standard

DFR

Decode and Forward Relay

DFS

Dynamic Frequency Selection

DHCP

Dynamic Host Configuration Protocol

DHMM

Dynamical Hierarchical Mobility Management

DIAMETER

Protocol extending RADIUS

DiffServ

Differentiated Service

DL

Downlink

DOCSIS

Data Over Cable Service Interface Specification

DoD

Department of Defence

DoS

Denial of Service

DSA-REQ

Dynamic Service Addition request

DSA-RSP

Dynamic Service Addition response

DSL

Digital Subscriber Line

DSSS

Direct Sequence Spread Spectrum

EAP

Extensible Authentication Protocol

EAP-AKA

EAP-Authentication and Key Agreement

EAPOL

EAP over LAN

EAP-TTLS

EAP-Tunneled Transport Layer Security

EC

Encryption Control

EDCA

Enhanced Distributed Channel Access

EDCF

Enhanced Distributed Coordination Function

EDF

Earliest Deadline First

EFR

Enhanced Full Rate

EIK

EAP Integrity Key

EKS

Encryption Key Sequence

ertPS

Extended Real Time Polling Service

ETSI

European Telecommunications Standards Institute

E-UTRAN

Evolved UMTS Terrestrial Radio Access Network

FA

Foreign Agent

FBack

Fast Binding Acknowledgment

FBSS

Fast Base Station Switching handover

FBU

Fast Binding Update

FCH

Frame Control Header

FDD

Frequency Division Duplex

FDMA

Frequency Division Multiple Access

FEC

Forward Error Correction

FFT

Fast Fourier Transform

FHSS

Frequency Hopping Spread Spectrum

FIFO

First In First Out

FPC

Fast Power Control

FTP

File Transfer Protocol

FUSC

Full Usage of Subchannels

GKDA

Group-based Key Distribution Algorithm

GKEK

Group Key Encryption Key

GKMP

Group Key Management Protocol

GMH

Generic MAC Frame Header

GPC

Grant Per Connection

GPRS

General Packet Radio Service

GSA

Group Security Association

GSAID

Group SAID

GSM FR

GSM Full rate

GSM

Global System for Mobile Communications

GTEK

Group Traffic Encryption Key

GTK

Group Transient Key

HA

Home Agent

HAck

Handover Acknowledgment

HAP

High Altitude Platform

HARQ

Hybrid Automatic Repeat Request

HCCA

HCF Controlled Channel Access

HCF

Hybrid Coordination Function

HCS

Header Check Sequence

HDR

High Data Rate

HDTV

High-definition TV

HHO

Hard Handover

HI

Handover Initiation

HIPERMAN

High Performance Radio Metropolitan Area Network

HMAC

Hash Message Authentication Code

HNSP

Home Network Service Provider

HO

Handover

HOA

Home-of-Address

HOKEY

Handover Keying (Group)

HoL

Head of Line

HSPA

High-Speed Packet Access

HSPA+

Evolved HSPA

HT

Header Type

HUF

Highest Urgency First

ICV

Integrity Checking Value

ID

Identifier

IE

Information Element

IEEE

Institute of Electrical & Electronics Engineers, Inc.

IETF

Internet Engineering Task Force

IK

Integrity Key

IKE

Internet Key Exchange (protocol)

ILBC

Internet Low Bit rate Codec

IP

Internet Protocol

IPv6

Internet Protocol version 6

ISI

Intersymbol Interference

ISO

International Standard Organization

ISP

Internet Service Provider

ITU

International Telecommunication Union

IV

Initialization Vector

KDF

Key Derivation Function

KEK

Key Encryption Key

L2

Layer 2

L3

Layer 3

LAN

Local Area Network

LDPC

Low Density Parity Check

Link ID

Link Identifier

LOS

Line of Sight

LRC

Low Runtime Complexity

LTE

Long Term Evolution

M3

Mesh Mobility Management

MAC

Media Access Control

MAC

Message Authentication Code

MAN

Metropolitan Area Network

MAP

Media Access Protocol

MAP

Mesh Access Point

MBRA

Multicast and Broadcast Rekeying Algorithm

MBS

Multicast and Broadcast Service

MCS

Modulation and Coding Scheme

MDHO

Macro Diversity Handover

MIB

Management Information Base

MIC

Message Integrity Code

MICS

Media-Independent Command Service

MIES

Media-Independent Event Service

MIH

Media-Independent Handover

MIHF

Media-Independent Handover Function

MIHU

Media-Independent Handover User

MIIS

Media-Independent Information Service

MIM

Man In the Middle

MIMO

Multiple Input Multiple Output

MIP

Mobile IP

MMR

Mobile Multi-hop Relay

MMS

Multimedia Messaging Service

MN

Mobile Node

MOS

Mean Opinion Score

MP

Mesh Point

MPDU

MAC Protocol Data Unit

MPEG

Moving Picture Expert Group

MPP

Mesh Portal Point

MRR

Minimum Reserved Rate

MS

Mobile Station

MS

Mobile Subscriber Station

MSB

Most Significant Bit

MSCHAPv2

Microsoft Challenge-Handshake Authentication Protocol

mSCTP

Mobile Stream Control Transmission Protocol

MSDU

MAC Service Data Unit

MSE

Mean Square Error

MSID

Mobile Station Identifier

MSK

Master Session Key

MSO

Multi-Services Operator

MSR

Maximum Sustained Rate

MSS

Mobile Subscriber Station

MTK

MBS Traffic Key

MVNO

Mobile Virtual Network Operator

NAP

Network Access Provider

NAP

Network Access Point

NAR

New Access Router

NBR

Neighbor

NCoA

New Care of Address

NGWS

Next Generation Wireless System

NLOS

Non Line-of-Sight

NMS

Network Management System

Node ID

Node Identifier

NRM

Network Reference Model

nrtPS

Non-Real-Time Polling Service

NSP

Network Service Provider

NSSK

Needham Schroeder Secret Key Protocol

NTSC

National television System Committee

NWG

Network Working Group

OCSP

Online Certificate Status Protocol

O-DRR

Opportunistic- Deficit Round Robin

OFDM

Orthogonal Frequency Division Multiplex

OFDM2A

Orthogonal Frequency Division Multi-hop Multi-Access

OFDMA

Orthogonal Frequency Division Multiple Access

OSS

Operator Shared Secret

OTA

Over-The-Air

P2MP

Point to Multi-Point

PAR

Previous Access Router

PCF

Point Coordination Function

PCM

Pulse Code Modulation

PCMCIA

Personal Computer Memory Card International Association

PCoA

Previous Care of Address

PDAs

Personal Digital Assistants

PDU

Protocol Data Unit

PEAP

Protected EAP

PEAQ

Perceptual Evaluation of Audio Quality

PER

Packet Error Rate

PESQ

Perceptual Evaluation of Speech Quality

PF

Proportionate Fair

PFMR

Proportional Fair with Minimum/Maximum Rate Constraints

PHS

Packet Header Suppression

PHY

Physical Layer

PKC

Public Key Certificates

PKM

Privacy Key Management

PM

Poll Me bit

PMIP

Proxy-MIP

PMK

Pairwise Master Key

PMM

Packet Mobility Management (protocol)

PMP

Point to Multipoint

PN

Packet Number

PoA

Point of Attachment

PPP

Point-to-Point

PPPoE

Point-to-Point Protocol over Ethernet

Pre-PAK

pre-Primary Authorization Key

PrRtAdv

Proxy Router Advertisement

PS

Privacy Sublayer

PSK

Pre-Shared Key

PSNR

Peak Signal to Noise Ratio

PSOR

PF Scheduling for OFDMA Relay Networks

PSTN

Public Switched Telephone Network

PTK

Pairwise Transient Key

PTP

Point To Point

PUSC

Partial Usage of Subchannels

QAM

Quadrature Amplitude Modulation

QoS

Quality of Service

QoS

Quality of Signal

QPSK

Quadrature Phase Shift Keying

RADIUS

Remote Authentication Dial-In User Service

RAND

Random Number

RC

Resource Controller

REG-REQ

Registration Request

REG-RSP

Registration Response

REQ

Request

RES

Result

RF

Radio Frequency

RLC

Radio Link Control

RNG-REQ

Ranging Request

RNG-RSP

Ranging Response

RNM

Reference Network Model

ROC

Rollover Counter

RP

Reference Point

RR

Round Robin

RRA

Radio Resource Agent

RRC

Radio Resource Control

RRM

Radio Resource Management

RRP

Registration RePly

RRQ

Registration ReQuest

RS

Relay Station

RSA

Rivest, Shamir, and Adelman

RSP

Response

RSS

Received Signal Strength

RSSI

Received Signal Strength Indication

RTG

Receive/Transmit Transition Gap

rtPS

Real Time Polling service

RtSolPr

Router Solicitation for Proxy Advertisement

SA

Security Association

SAID

SA Identifier

SAP

Service Access Point

SBC-RSP

SS Basic Capabilitiy response

SC

Single Carrier

SCN

Service Class Name

SCTP

Stream Control Transmission Protocol

SDU

Segment Data Units

SeS

Security Sublayer

SFID

Service Flow IDentifier

SGKEK

Sub-Group Key Encryption Key

SHA

Secure Hash Algorithm

SIM

Subscriber Identity Module

SINR

Signal to Interference-plus-Noise Ratio

SIP

Session Initiation Protocol

SIR

Signal to Interference Ratio

SMS

Short Message Service

SNIR

Signal to Noise + Interference Ratio

SNMP

Simple Network Management Protocol

SNR

Signal to Noise Ratio

SOFDMA

Scalable Orthogonal Frequency Division Multiple Access

SR

Superior Router

SS

Spectrum Sharing

SS

Subscriber Station

SSCS

Service Specific Convergence Sublayer

SSID

Service Set Identifier

STS

Sub-channels of a Time Slot

TCP

Transmission Control Protocol

TDD

Time Division Duplex

TDMA

Time Division Multiple Access

TEK

Traffic Encryption Key

TFTP

Trivial File Transfer Protocol

THBA

Two-level Hierarchical Bandwidth Allocation scheme

TLS

Transport Layer Security

TLV

Type-Length-Value

TPP

Two-Phase Proportionating

TR

Transmit Receive

TTG

Transmit/Receive Transition Gap

TTLS

Tunneled Transport Layer Security

TTP

Trusted Third Party

TXOP

Transmission Opportunities

UCD

Uplink Channel Descriptor

UDP

User Datagram Protocol

UGS

Unsolicited Grant Service

UGS-AD

Unsolicited Grant Service-Activity Detection

UL

Uplink

UL-MAP

Uplink MAP

UMTS

Universal Mobile Telecommunications System

UNA

Unsolicited Neighbor Advertisement

VBR

Variable Bit Rate

VCEG

Video Coding Experts Group

VHDA

Vertical Handoff Decision Algorithm

VHO

Vertical Handover

VNSP

Visited Network Service Provider

VoD

Video on Demand

VoIP

Voice over IP

W2-AP

WiMAX/WiFi Access Point

WBA

Wireless Broadband Access

WEIRD

WiMAX Extension to Isolated Research Data networks

WEP

Wired EquivalentPrivacy

WFPQ

Weighted Fair Priority Queuing

WFQ

Weighted Fair Queuing

Wibro

Wireless Broadband

WiFi

Wireless Fidelity

WiMAX

Worldwide Interoperability for Microwave Access

WiMESH

WiMAX Mesh

WLAN

Wireless Local Area Network

WMAN

Wireless Metropolitan Area Network

WRI

WiMAX Roaming Interface

WRR

Weighted Round Robin

WRX

WiMAX Roaming Exchange

WWAN

Wireless Wide Area Network

XDSL

X Digital Subscriber Line

XML

Extensible Markup Language

XRES

Expected Response

List of Figures

1.1 Operational principles of WiMAX technology

1.2 End-to-End WiMAX network architecture

2.1 IEEE 802.16 standard’s network topology

2.2 WiMAX network architecture

2.3 IEEE 802.16 protocol stack

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!