Flylib.com
WiMAX: Technology for Broadband Wireless Access
WiMAX: Technology for Broadband Wireless Access
ISBN: 0470028084
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Professor Loutfi Nuaymi
BUY ON AMAZON
Table of Contents
Back Cover
WiMAX-Technology for Broadband Wireless Access
Preface and Acknowledgements
Abbreviations List
IEEE 802.16 Qos Classes (or Service Classes)
IEEE 802.16 MAC Management
Security Abbreviations
Part One: Global Introduction to WiMAX
Chapter 1: Introduction to Broadband Wireless Access
1.2 Wireless Networks and Broadband Wireless Access (BWA)
1.3 Applications of BWA
1.4 History of BWA Technologies
Chapter 2: WiMAX Genesis and Framework
2.2 WiMAX Forum
2.3 WiMAX Products Certification
2.4 Predicted Products and Deployment Evolution
2.5 Other 802.16 Standards
2.6 The Korean Cousin: WiBro
Chapter 3: Protocol Layers and Topologies
3.2 Convergence Sublayer (CS)
3.3 Medium Access Control Common Part Sublayer (MAC CPS)
3.4 Security Sublayer
3.5 PHYsical Layer
3.6 Network Management Reference Model
3.7 WiMAX Topologies
Chapter 4: Frequency Utilisation and System Profiles
4.2 Licensed and Unlicensed Frequencies
4.3 WiMAX Frequencies, Regulations and Availability
4.4 WiMAX System Profiles
Part Two: WiMAX Physical Layer
Chapter 5: Digital Modulation, OFDM and OFDMA
5.2 OFDM Transmission
5.3 OFDMA and Its Variant SOFDMA
5.4 Subcarrier Permutations in WiMAX OFDMA PHY
Chapter 6: The Physical Layer of WiMAX
6.2 Channel Coding
6.3 Turbo Coding
6.4 Transmission Convergence Sublayer (TCS)
6.5 Burst Profile
Part Three: WiMAX Multiple Access (MAC Layer) and Qos Management
Chapter 7: Convergence Sublayer (CS)
7.2 Connections and Service Flow
7.3 Classification and Mapping
7.4 CS and QoS
7.5 Payload Header Suppression (PHS)
Chapter 8: MAC Functions and MAC Frames
8.2 MAC Addresses and MAC Frames
8.3 Fragmentation, Packing and Concatenation
8.4 Basic, Primary and Secondary Management Connections
8.5 User Data and MAC Management Messages
8.6 TLV Encoding in the 802.16 Standard
8.7 Automatic Repeat Request (ARQ)
8.8 Scheduling and Link Adaptation
Chapter 9: Multiple Access and Burst Profile Description
9.2 Duplexing: Both FDD and TDD are Possible
9.3 Transmission of Downlink and Uplink Subframes
9.4 Maps of Multiple Access: DL-MAP and UL-MAP
9.5 Burst Profile Usage: DCD Message and the DIUC Indicator
9.6 Mesh Frame
Chapter 10: Uplink Bandwidth Allocation and Request Mechanisms
10.2 Types of Uplink Access Grant-request
10.3 Uplink Access Grant-request Mechanisms
10.4 Contention-based Focused Bandwidth Request in OFDM PHY
10.5 Contention-based CDMA Bandwidth Request in OFDMA PHY
Chapter 11: Network Entry and Quality of Service (QoS) Management
11.2 Link Adaptation
11.3 The Five Scheduling Services or QoS Classes
11.4 Scheduling and Deployment of Services Over WiMAX
11.5 Dynamic Service Addition and Change
11.6 Network Entry
Part Four: Diverse Topics
Chapter 12: Efficient Use of Radio Resources
12.2 Radio Engineering Consideration for WiMAX Systems
12.3 Radio Resource Management Procedures
12.4 Advanced Antenna Technologies in WiMAX
12.5 Multicast Broadcast Services (MBS)
Chapter 13: WiMAX Architecture
13.2 Network Reference Model
13.3 Network Functionalities
Chapter 14: Mobility, Handover and Power-Save Modes
14.2 Network Topology Acquisition
14.3 The Handover Process
14.4 Fast BS Switching (FBSS) and Macro Diversity Handover (MDHO)
14.5 Power-Save Modes
Chapter 15: Security
15.2 Authentication and the PKM Protocol
15.3 Data Encryption
15.4 Message Authentication with HMAC
15.5 Other Security Issues
Chapter 16: Comparisons and Conclusion
16.2 Comparison Between WiMAX and WiFi
16.3 Comparison Between WiMAX and 3G
16.4 Final Thoughts and Conclusion
Annex A: The Different Sets of MAC Management Messages
A.1 The MAC Management Messages added by 802.16e
Annex B: Example of the Downlink Channel Descriptor (DCD) Message
References
Index
A
B
C
D
E
F
G
H
I-K
L
M
N
O
P
Q
R
S
T
U
W-X
X-Y
Z
List of Figures
List of Tables
WiMAX: Technology for Broadband Wireless Access
ISBN: 0470028084
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Professor Loutfi Nuaymi
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Writing Database-Independent Code
Finding Rows in a DataView
Getting Typed DataRows from DataViews
Using a DataView to Control Edits, Deletions, or Additions in Windows Forms
. Storing XML to a Database Field
Visual C# 2005 How to Program (2nd Edition)
Exercises
Locating Characters and Substrings in strings
Exercises
WebBrowser Control
Self-Review Exercises
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 358 Electrical Metallic Tubing Type EMT
Article 386 Surface Metal Raceways
Article 502 Class II Locations
Article 700 Emergency Systems
Notes for Tables 11(A) and 11(B)
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Value Stream Mapping and Process Flow Tools
Voice of the Customer (VOC)
Descriptive Statistics and Data Displays
Reducing Lead Time and Non-Value-Add Cost
Complexity Value Stream Mapping and Complexity Analysis
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Instrumenting .NET Applications with WMI
WMI Providers
WMI Security
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
Culture and Religion
Cultural Black Holes
Americanization versus Asianization
Appendix A Cultural Categorization Characteristics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies