Toggle navigation
Home
Networking
Wimax Technology for broadband wireless access
Back Cover
WiMAX-Technology for Broadband Wireless Access
Preface and Acknowledgements
Abbreviations List
IEEE 802.16 Qos Classes (or Service Classes)
IEEE 802.16 MAC Management
Security Abbreviations
Part One: Global Introduction to WiMAX
Chapter 1: Introduction to Broadband Wireless Access
1.2 Wireless Networks and Broadband Wireless Access (BWA)
1.3 Applications of BWA
1.4 History of BWA Technologies
Chapter 2: WiMAX Genesis and Framework
2.2 WiMAX Forum
2.3 WiMAX Products Certification
2.4 Predicted Products and Deployment Evolution
2.5 Other 802.16 Standards
2.6 The Korean Cousin: WiBro
Chapter 3: Protocol Layers and Topologies
3.2 Convergence Sublayer (CS)
3.3 Medium Access Control Common Part Sublayer (MAC CPS)
3.4 Security Sublayer
3.5 PHYsical Layer
3.6 Network Management Reference Model
3.7 WiMAX Topologies
Chapter 4: Frequency Utilisation and System Profiles
4.2 Licensed and Unlicensed Frequencies
4.3 WiMAX Frequencies, Regulations and Availability
4.4 WiMAX System Profiles
Part Two: WiMAX Physical Layer
Chapter 5: Digital Modulation, OFDM and OFDMA
5.2 OFDM Transmission
5.3 OFDMA and Its Variant SOFDMA
5.4 Subcarrier Permutations in WiMAX OFDMA PHY
Chapter 6: The Physical Layer of WiMAX
6.2 Channel Coding
6.3 Turbo Coding
6.4 Transmission Convergence Sublayer (TCS)
6.5 Burst Profile
Part Three: WiMAX Multiple Access (MAC Layer) and Qos Management
Chapter 7: Convergence Sublayer (CS)
7.2 Connections and Service Flow
7.3 Classification and Mapping
7.4 CS and QoS
7.5 Payload Header Suppression (PHS)
Chapter 8: MAC Functions and MAC Frames
8.2 MAC Addresses and MAC Frames
8.3 Fragmentation, Packing and Concatenation
8.4 Basic, Primary and Secondary Management Connections
8.5 User Data and MAC Management Messages
8.6 TLV Encoding in the 802.16 Standard
8.7 Automatic Repeat Request (ARQ)
8.8 Scheduling and Link Adaptation
Chapter 9: Multiple Access and Burst Profile Description
9.2 Duplexing: Both FDD and TDD are Possible
9.3 Transmission of Downlink and Uplink Subframes
9.4 Maps of Multiple Access: DL-MAP and UL-MAP
9.5 Burst Profile Usage: DCD Message and the DIUC Indicator
9.6 Mesh Frame
Chapter 10: Uplink Bandwidth Allocation and Request Mechanisms
10.2 Types of Uplink Access Grant-request
10.3 Uplink Access Grant-request Mechanisms
10.4 Contention-based Focused Bandwidth Request in OFDM PHY
10.5 Contention-based CDMA Bandwidth Request in OFDMA PHY
Chapter 11: Network Entry and Quality of Service (QoS) Management
11.2 Link Adaptation
11.3 The Five Scheduling Services or QoS Classes
11.4 Scheduling and Deployment of Services Over WiMAX
11.5 Dynamic Service Addition and Change
11.6 Network Entry
Part Four: Diverse Topics
Chapter 12: Efficient Use of Radio Resources
12.2 Radio Engineering Consideration for WiMAX Systems
12.3 Radio Resource Management Procedures
12.4 Advanced Antenna Technologies in WiMAX
12.5 Multicast Broadcast Services (MBS)
Chapter 13: WiMAX Architecture
13.2 Network Reference Model
13.3 Network Functionalities
Chapter 14: Mobility, Handover and Power-Save Modes
14.2 Network Topology Acquisition
14.3 The Handover Process
14.4 Fast BS Switching (FBSS) and Macro Diversity Handover (MDHO)
14.5 Power-Save Modes
Chapter 15: Security
15.2 Authentication and the PKM Protocol
15.3 Data Encryption
15.4 Message Authentication with HMAC
15.5 Other Security Issues
Chapter 16: Comparisons and Conclusion
16.2 Comparison Between WiMAX and WiFi
16.3 Comparison Between WiMAX and 3G
16.4 Final Thoughts and Conclusion
Annex A: The Different Sets of MAC Management Messages
A.1 The MAC Management Messages added by 802.16e
Annex B: Example of the Downlink Channel Descriptor (DCD) Message
References
List of Figures
List of Tables
Remember the name: eTutorials.org
Copyright eTutorials.org 2008-2024. All rights reserved.