Flylib.com
WiMAX: Technology for Broadband Wireless Access
WiMAX: Technology for Broadband Wireless Access
ISBN: 0470028084
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Professor Loutfi Nuaymi
BUY ON AMAZON
Table of Contents
Back Cover
WiMAX-Technology for Broadband Wireless Access
Preface and Acknowledgements
Abbreviations List
IEEE 802.16 Qos Classes (or Service Classes)
IEEE 802.16 MAC Management
Security Abbreviations
Part One: Global Introduction to WiMAX
Chapter 1: Introduction to Broadband Wireless Access
1.2 Wireless Networks and Broadband Wireless Access (BWA)
1.3 Applications of BWA
1.4 History of BWA Technologies
Chapter 2: WiMAX Genesis and Framework
2.2 WiMAX Forum
2.3 WiMAX Products Certification
2.4 Predicted Products and Deployment Evolution
2.5 Other 802.16 Standards
2.6 The Korean Cousin: WiBro
Chapter 3: Protocol Layers and Topologies
3.2 Convergence Sublayer (CS)
3.3 Medium Access Control Common Part Sublayer (MAC CPS)
3.4 Security Sublayer
3.5 PHYsical Layer
3.6 Network Management Reference Model
3.7 WiMAX Topologies
Chapter 4: Frequency Utilisation and System Profiles
4.2 Licensed and Unlicensed Frequencies
4.3 WiMAX Frequencies, Regulations and Availability
4.4 WiMAX System Profiles
Part Two: WiMAX Physical Layer
Chapter 5: Digital Modulation, OFDM and OFDMA
5.2 OFDM Transmission
5.3 OFDMA and Its Variant SOFDMA
5.4 Subcarrier Permutations in WiMAX OFDMA PHY
Chapter 6: The Physical Layer of WiMAX
6.2 Channel Coding
6.3 Turbo Coding
6.4 Transmission Convergence Sublayer (TCS)
6.5 Burst Profile
Part Three: WiMAX Multiple Access (MAC Layer) and Qos Management
Chapter 7: Convergence Sublayer (CS)
7.2 Connections and Service Flow
7.3 Classification and Mapping
7.4 CS and QoS
7.5 Payload Header Suppression (PHS)
Chapter 8: MAC Functions and MAC Frames
8.2 MAC Addresses and MAC Frames
8.3 Fragmentation, Packing and Concatenation
8.4 Basic, Primary and Secondary Management Connections
8.5 User Data and MAC Management Messages
8.6 TLV Encoding in the 802.16 Standard
8.7 Automatic Repeat Request (ARQ)
8.8 Scheduling and Link Adaptation
Chapter 9: Multiple Access and Burst Profile Description
9.2 Duplexing: Both FDD and TDD are Possible
9.3 Transmission of Downlink and Uplink Subframes
9.4 Maps of Multiple Access: DL-MAP and UL-MAP
9.5 Burst Profile Usage: DCD Message and the DIUC Indicator
9.6 Mesh Frame
Chapter 10: Uplink Bandwidth Allocation and Request Mechanisms
10.2 Types of Uplink Access Grant-request
10.3 Uplink Access Grant-request Mechanisms
10.4 Contention-based Focused Bandwidth Request in OFDM PHY
10.5 Contention-based CDMA Bandwidth Request in OFDMA PHY
Chapter 11: Network Entry and Quality of Service (QoS) Management
11.2 Link Adaptation
11.3 The Five Scheduling Services or QoS Classes
11.4 Scheduling and Deployment of Services Over WiMAX
11.5 Dynamic Service Addition and Change
11.6 Network Entry
Part Four: Diverse Topics
Chapter 12: Efficient Use of Radio Resources
12.2 Radio Engineering Consideration for WiMAX Systems
12.3 Radio Resource Management Procedures
12.4 Advanced Antenna Technologies in WiMAX
12.5 Multicast Broadcast Services (MBS)
Chapter 13: WiMAX Architecture
13.2 Network Reference Model
13.3 Network Functionalities
Chapter 14: Mobility, Handover and Power-Save Modes
14.2 Network Topology Acquisition
14.3 The Handover Process
14.4 Fast BS Switching (FBSS) and Macro Diversity Handover (MDHO)
14.5 Power-Save Modes
Chapter 15: Security
15.2 Authentication and the PKM Protocol
15.3 Data Encryption
15.4 Message Authentication with HMAC
15.5 Other Security Issues
Chapter 16: Comparisons and Conclusion
16.2 Comparison Between WiMAX and WiFi
16.3 Comparison Between WiMAX and 3G
16.4 Final Thoughts and Conclusion
Annex A: The Different Sets of MAC Management Messages
A.1 The MAC Management Messages added by 802.16e
Annex B: Example of the Downlink Channel Descriptor (DCD) Message
References
Index
A
B
C
D
E
F
G
H
I-K
L
M
N
O
P
Q
R
S
T
U
W-X
X-Y
Z
List of Figures
List of Tables
WiMAX: Technology for Broadband Wireless Access
ISBN: 0470028084
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Professor Loutfi Nuaymi
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Oracle SQL
Oracle Advanced SELECT Options
Optimizing: The Oracle Side
Appendix A Common Issues
Metrics and Models in Software Quality Engineering (2nd Edition)
Summary
Process Maturity Framework and Quality Standards
Level of Measurement
Defect Removal Effectiveness and Quality Planning
Syntactic Constructs
MySQL Cookbook
Making Long Output Lines More Readable
Checking for Errors
Finding First and Last Days of Months
Introduction
Displaying Query Results as Hyperlinks
Information Dashboard Design: The Effective Visual Communication of Data
Clarifying the Vision
All That Glitters Is Not Gold
Even Dashboards Have a History
Misusing or Overusing Color
Test Your Design for Usability
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Getting to Know AutoCAD
Using Layers to Organize Your Drawing
Grouping Objects into Blocks
Dimensioning a Drawing
Appendix A Look at Drawing in 3D
MPLS Configuration on Cisco IOS Software
Penultimate Hop Popping
RIPv1 PE-CE Routing Configuration and Verification
Command Reference
Configuring L2TPv3 Dynamic Tunnels
Case Study 3: Implementing Layer 2 VPNs over Inter-AS Topologies Using Layer 2 VPN Pseudo-Wire Switching
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies