Flylib.com
WiMAX: Technology for Broadband Wireless Access
WiMAX: Technology for Broadband Wireless Access
ISBN: 0470028084
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Professor Loutfi Nuaymi
BUY ON AMAZON
Table of Contents
Back Cover
WiMAX-Technology for Broadband Wireless Access
Preface and Acknowledgements
Abbreviations List
IEEE 802.16 Qos Classes (or Service Classes)
IEEE 802.16 MAC Management
Security Abbreviations
Part One: Global Introduction to WiMAX
Chapter 1: Introduction to Broadband Wireless Access
1.2 Wireless Networks and Broadband Wireless Access (BWA)
1.3 Applications of BWA
1.4 History of BWA Technologies
Chapter 2: WiMAX Genesis and Framework
2.2 WiMAX Forum
2.3 WiMAX Products Certification
2.4 Predicted Products and Deployment Evolution
2.5 Other 802.16 Standards
2.6 The Korean Cousin: WiBro
Chapter 3: Protocol Layers and Topologies
3.2 Convergence Sublayer (CS)
3.3 Medium Access Control Common Part Sublayer (MAC CPS)
3.4 Security Sublayer
3.5 PHYsical Layer
3.6 Network Management Reference Model
3.7 WiMAX Topologies
Chapter 4: Frequency Utilisation and System Profiles
4.2 Licensed and Unlicensed Frequencies
4.3 WiMAX Frequencies, Regulations and Availability
4.4 WiMAX System Profiles
Part Two: WiMAX Physical Layer
Chapter 5: Digital Modulation, OFDM and OFDMA
5.2 OFDM Transmission
5.3 OFDMA and Its Variant SOFDMA
5.4 Subcarrier Permutations in WiMAX OFDMA PHY
Chapter 6: The Physical Layer of WiMAX
6.2 Channel Coding
6.3 Turbo Coding
6.4 Transmission Convergence Sublayer (TCS)
6.5 Burst Profile
Part Three: WiMAX Multiple Access (MAC Layer) and Qos Management
Chapter 7: Convergence Sublayer (CS)
7.2 Connections and Service Flow
7.3 Classification and Mapping
7.4 CS and QoS
7.5 Payload Header Suppression (PHS)
Chapter 8: MAC Functions and MAC Frames
8.2 MAC Addresses and MAC Frames
8.3 Fragmentation, Packing and Concatenation
8.4 Basic, Primary and Secondary Management Connections
8.5 User Data and MAC Management Messages
8.6 TLV Encoding in the 802.16 Standard
8.7 Automatic Repeat Request (ARQ)
8.8 Scheduling and Link Adaptation
Chapter 9: Multiple Access and Burst Profile Description
9.2 Duplexing: Both FDD and TDD are Possible
9.3 Transmission of Downlink and Uplink Subframes
9.4 Maps of Multiple Access: DL-MAP and UL-MAP
9.5 Burst Profile Usage: DCD Message and the DIUC Indicator
9.6 Mesh Frame
Chapter 10: Uplink Bandwidth Allocation and Request Mechanisms
10.2 Types of Uplink Access Grant-request
10.3 Uplink Access Grant-request Mechanisms
10.4 Contention-based Focused Bandwidth Request in OFDM PHY
10.5 Contention-based CDMA Bandwidth Request in OFDMA PHY
Chapter 11: Network Entry and Quality of Service (QoS) Management
11.2 Link Adaptation
11.3 The Five Scheduling Services or QoS Classes
11.4 Scheduling and Deployment of Services Over WiMAX
11.5 Dynamic Service Addition and Change
11.6 Network Entry
Part Four: Diverse Topics
Chapter 12: Efficient Use of Radio Resources
12.2 Radio Engineering Consideration for WiMAX Systems
12.3 Radio Resource Management Procedures
12.4 Advanced Antenna Technologies in WiMAX
12.5 Multicast Broadcast Services (MBS)
Chapter 13: WiMAX Architecture
13.2 Network Reference Model
13.3 Network Functionalities
Chapter 14: Mobility, Handover and Power-Save Modes
14.2 Network Topology Acquisition
14.3 The Handover Process
14.4 Fast BS Switching (FBSS) and Macro Diversity Handover (MDHO)
14.5 Power-Save Modes
Chapter 15: Security
15.2 Authentication and the PKM Protocol
15.3 Data Encryption
15.4 Message Authentication with HMAC
15.5 Other Security Issues
Chapter 16: Comparisons and Conclusion
16.2 Comparison Between WiMAX and WiFi
16.3 Comparison Between WiMAX and 3G
16.4 Final Thoughts and Conclusion
Annex A: The Different Sets of MAC Management Messages
A.1 The MAC Management Messages added by 802.16e
Annex B: Example of the Downlink Channel Descriptor (DCD) Message
References
Index
A
B
C
D
E
F
G
H
I-K
L
M
N
O
P
Q
R
S
T
U
W-X
X-Y
Z
List of Figures
List of Tables
WiMAX: Technology for Broadband Wireless Access
ISBN: 0470028084
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Professor Loutfi Nuaymi
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.3 Use WinSCP as a Graphical Replacement for FTP and RCP
Step 4.2 Passphrase Considerations
Step 4.7 Using Public Key Authentication for Automated File Transfers
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Appendix - Sample sshd_config File
Snort Cookbook
Installing Snort on Solaris
Uninstalling Snort from Windows
Optimizing Logging
Integrating Snort with Webmin
Working with Honeypots and Honeynets
C++ How to Program (5th Edition)
Constructors and Destructors in Derived Classes
Processing Unexpected Exceptions
Initializing Structures
typedef
F.8. Predefined Symbolic Constants
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Team change
Leading change
Mergers and acquisitions
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
The PostgreSQL C APIlibpq
A Simpler C APIlibpgeasy
Client 1Connecting to the Server
DBI Architecture Overview
Overview
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Events in the Excel Object Model
Working with Windows
VSTO Extensions to the Word and Excel Object Models
Advanced ADO.NET Data Binding: Looking Behind the Scenes
Populating a Document with Data on the Server
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies