Flylib.com
WiMAX: Technology for Broadband Wireless Access
WiMAX: Technology for Broadband Wireless Access
ISBN: 0470028084
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Professor Loutfi Nuaymi
BUY ON AMAZON
Table of Contents
Back Cover
WiMAX-Technology for Broadband Wireless Access
Preface and Acknowledgements
Abbreviations List
IEEE 802.16 Qos Classes (or Service Classes)
IEEE 802.16 MAC Management
Security Abbreviations
Part One: Global Introduction to WiMAX
Chapter 1: Introduction to Broadband Wireless Access
1.2 Wireless Networks and Broadband Wireless Access (BWA)
1.3 Applications of BWA
1.4 History of BWA Technologies
Chapter 2: WiMAX Genesis and Framework
2.2 WiMAX Forum
2.3 WiMAX Products Certification
2.4 Predicted Products and Deployment Evolution
2.5 Other 802.16 Standards
2.6 The Korean Cousin: WiBro
Chapter 3: Protocol Layers and Topologies
3.2 Convergence Sublayer (CS)
3.3 Medium Access Control Common Part Sublayer (MAC CPS)
3.4 Security Sublayer
3.5 PHYsical Layer
3.6 Network Management Reference Model
3.7 WiMAX Topologies
Chapter 4: Frequency Utilisation and System Profiles
4.2 Licensed and Unlicensed Frequencies
4.3 WiMAX Frequencies, Regulations and Availability
4.4 WiMAX System Profiles
Part Two: WiMAX Physical Layer
Chapter 5: Digital Modulation, OFDM and OFDMA
5.2 OFDM Transmission
5.3 OFDMA and Its Variant SOFDMA
5.4 Subcarrier Permutations in WiMAX OFDMA PHY
Chapter 6: The Physical Layer of WiMAX
6.2 Channel Coding
6.3 Turbo Coding
6.4 Transmission Convergence Sublayer (TCS)
6.5 Burst Profile
Part Three: WiMAX Multiple Access (MAC Layer) and Qos Management
Chapter 7: Convergence Sublayer (CS)
7.2 Connections and Service Flow
7.3 Classification and Mapping
7.4 CS and QoS
7.5 Payload Header Suppression (PHS)
Chapter 8: MAC Functions and MAC Frames
8.2 MAC Addresses and MAC Frames
8.3 Fragmentation, Packing and Concatenation
8.4 Basic, Primary and Secondary Management Connections
8.5 User Data and MAC Management Messages
8.6 TLV Encoding in the 802.16 Standard
8.7 Automatic Repeat Request (ARQ)
8.8 Scheduling and Link Adaptation
Chapter 9: Multiple Access and Burst Profile Description
9.2 Duplexing: Both FDD and TDD are Possible
9.3 Transmission of Downlink and Uplink Subframes
9.4 Maps of Multiple Access: DL-MAP and UL-MAP
9.5 Burst Profile Usage: DCD Message and the DIUC Indicator
9.6 Mesh Frame
Chapter 10: Uplink Bandwidth Allocation and Request Mechanisms
10.2 Types of Uplink Access Grant-request
10.3 Uplink Access Grant-request Mechanisms
10.4 Contention-based Focused Bandwidth Request in OFDM PHY
10.5 Contention-based CDMA Bandwidth Request in OFDMA PHY
Chapter 11: Network Entry and Quality of Service (QoS) Management
11.2 Link Adaptation
11.3 The Five Scheduling Services or QoS Classes
11.4 Scheduling and Deployment of Services Over WiMAX
11.5 Dynamic Service Addition and Change
11.6 Network Entry
Part Four: Diverse Topics
Chapter 12: Efficient Use of Radio Resources
12.2 Radio Engineering Consideration for WiMAX Systems
12.3 Radio Resource Management Procedures
12.4 Advanced Antenna Technologies in WiMAX
12.5 Multicast Broadcast Services (MBS)
Chapter 13: WiMAX Architecture
13.2 Network Reference Model
13.3 Network Functionalities
Chapter 14: Mobility, Handover and Power-Save Modes
14.2 Network Topology Acquisition
14.3 The Handover Process
14.4 Fast BS Switching (FBSS) and Macro Diversity Handover (MDHO)
14.5 Power-Save Modes
Chapter 15: Security
15.2 Authentication and the PKM Protocol
15.3 Data Encryption
15.4 Message Authentication with HMAC
15.5 Other Security Issues
Chapter 16: Comparisons and Conclusion
16.2 Comparison Between WiMAX and WiFi
16.3 Comparison Between WiMAX and 3G
16.4 Final Thoughts and Conclusion
Annex A: The Different Sets of MAC Management Messages
A.1 The MAC Management Messages added by 802.16e
Annex B: Example of the Downlink Channel Descriptor (DCD) Message
References
Index
A
B
C
D
E
F
G
H
I-K
L
M
N
O
P
Q
R
S
T
U
W-X
X-Y
Z
List of Figures
List of Tables
WiMAX: Technology for Broadband Wireless Access
ISBN: 0470028084
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Professor Loutfi Nuaymi
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
The Defect Prevention Process
Applying the Seven Basic Quality Tools in Software Development
Modeling Process
An Example of Module Design Metrics in Practice
Software Process Improvement Sequences
Adobe After Effects 7.0 Studio Techniques
Beyond the Basics
Rotoscoping and Paint
Linking Animation Data
Backlighting, Flares, Light Volume
Particulate Matter
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Building Web Applications
GDI+
Building Enterprise Services Applications
COM Interop/PInvoke
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #2: Improve Your Processes
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Extending and Embedding PHP
Zend Thread Safety
Data Retrieval
Reference Counting
Wrapper Operations
Extension APIs
MPLS Configuration on Cisco IOS Software
MPLS Control and Data Plane Components
Command Reference
MPLS VPN Basic Configuration
OSPF PE-CE Routing Protocol Overview, Configuration and Verification
Local Switching
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies