Details

WiMAX Security and Quality of Service


WiMAX Security and Quality of Service

An End-to-End Perspective
2. Aufl.

von: Seok-Yee Tang, Peter Muller, Hamid Sharif

CHF 92.00

Verlag: Wiley
Format: EPUB
Veröffentl.: 28.06.2011
ISBN/EAN: 9781119956204
Sprache: englisch
Anzahl Seiten: 418

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. <i>WiMAX Security and Quality of Service</i>, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements. Security is an essential element in the wireless world and Part B is fully dedicated to this topic. Part C provides an in depth analysis of QoS, including mobility management in WiMAX. Finally, Part D introduces the reader to advanced and future topics.<br /> <br /> <ul> <li>One of the first texts to cover security, QoS and deployments of WiMAX in the same book.</li> <li>Introduces the primary concepts of the interdisciplinary nature of WiMAX security and QoS, and also includes discussion of hot topics in the field.</li> <li>Written for engineers and researchers, answering practical questions from industry and the experimental field in academia.</li> <li>Explains how WiMAX applications’ security and QoS are interconnected and interworked among the cross layers.</li> </ul>
<p>Preface xv</p> <p>Acknowledgement xix</p> <p>List of Contributors xxi</p> <p>List of Acronyms xxv</p> <p>List of Figures xxxv</p> <p>List of Tables xxxix</p> <p><b>Part A Introduction 1</b></p> <p><b>1 Overview of End-to-End WiMAX Network Architecture 3</b><br /> <i>Dr Mohuya Chakraborty and Dr Debika Bhattacharyya</i></p> <p>1.1 Introduction 3</p> <p>1.2 Wireless Primer 4</p> <p>1.2.1 Wireless Network Topologies 4</p> <p>1.2.2 Wireless Technologies 4</p> <p>1.2.3 Performance Parameters of Wireless Networks 5</p> <p>1.2.4 WiFi and WiMAX 6</p> <p>1.3 Introduction to WiMAX Technology 6</p> <p>1.3.1 Operational Principles 7</p> <p>1.3.2 WiMAX Speed and Range 8</p> <p>1.3.3 Spectrum 9</p> <p>1.3.4 Limitations 10</p> <p>1.3.5 Need for WiMAX 10</p> <p>1.4 Mobile WiMAX 10</p> <p>1.4.1 Overview of Mobile WiMAX 10</p> <p>1.4.2 Handover Process in Mobile WiMAX 11</p> <p>1.4.3 LTE vs. Mobile WiMAX 12</p> <p>1.5 Overview of End-to-End WiMAX Network Architecture 12</p> <p>1.6 Radio Interface Specifications for WiMAX 16</p> <p>1.6.1 Overview 16</p> <p>1.6.2 802.16e-2005 Technology 17</p> <p>1.6.3 Applications 19</p> <p>1.6.4 WiMAX Simulation Tools 19</p> <p>1.7 Interoperability Issues in WiMAX 19</p> <p>1.8 Summary 21</p> <p>References 22</p> <p><b>Part B Security 23</b></p> <p><b>2 WiMAX Security Defined in 802.16 Standards 25</b><br /> <i>Slim Rekhis and Noureddine Boudriga</i></p> <p>2.1 Introduction 25</p> <p>2.2 Overview of 802.16 WMAN Networks 26</p> <p>2.2.1 IEEE 802.16 Standards and Connectivity Modes 26</p> <p>2.2.2 Network Architecture 28</p> <p>2.2.3 Protocol Architecture 31</p> <p>2.2.4 Network Entry Procedure 32</p> <p>2.3 Security Requirements for Broadband Access in WMAN Networks 33</p> <p>2.4 Security Mechanisms in Initial 802.16 Networks 35</p> <p>2.4.1 Security Associations 35</p> <p>2.4.2 Use of Certificates 37</p> <p>2.4.3 PKM Protocol 38</p> <p>2.4.4 PKM Authorization 38</p> <p>2.4.5 Privacy and Key Management 41</p> <p>2.4.6 Data Encryption 42</p> <p>2.5 Analysis of Security Weaknesses in Initial Versions of 802.16 42</p> <p>2.5.1 Physical-Level Based Attacks 43</p> <p>2.5.2 Attacks on Authentication 44</p> <p>2.5.3 Attacks on Key Management 45</p> <p>2.5.4 Attacks on Privacy 47</p> <p>2.5.5 Attacks on Availability 47</p> <p>2.6 Security Amendments in Recent Versions if IEEE 802.16 48</p> <p>2.6.1 Authorization, Mutual Authentication and Access Control 48</p> <p>2.6.2 TEK Three-Way Handshake 50</p> <p>2.6.3 Encryption and Key Hierarchy 51</p> <p>2.6.4 Multicast and Broadcast Service (MBS) 52</p> <p>2.6.5 Security of Handover Schemes 53</p> <p>2.7 Analysis of Security Weaknesses in 802.16e 54</p> <p>2.7.1 Attacks on Authorization 54</p> <p>2.7.2 Analysis of SA-TEK Three-Way Handshake 56</p> <p>2.7.3 Vulnerability to Denial of Service Attacks 56</p> <p>2.7.4 Broadcasting and Multicasting Related Weaknesses 58</p> <p>2.7.5 Weaknesses in Handover Schemes 59</p> <p>2.8 Further Reading 59</p> <p>2.9 Summary 60</p> <p>References 60</p> <p><b>3 Key Management in 802.16e 63</b><br /> <i>Georgios Kambourakis and Stefanos Gritzalis</i></p> <p>3.1 Introduction 63</p> <p>3.2 Privacy Key Management Protocol 64</p> <p>3.3 PKM Version 1 65</p> <p>3.4 PKM Version 2 67</p> <p>3.4.1 Security Negotiation 68</p> <p>3.4.2 Authentication/Authorization 68</p> <p>3.4.3 Key Derivation and Hierarchy 70</p> <p>3.4.4 Three-Way Handshake 72</p> <p>3.4.5 Key Delivery 74</p> <p>3.5 Vulnerabilities and Countermeasures 75</p> <p>3.5.1 Authorization 76</p> <p>3.5.2 Key Derivation 76</p> <p>3.5.3 Three-Way Handshake 77</p> <p>3.5.4 Key Delivery 77</p> <p>3.5.5 Attacks on Confidentiality 78</p> <p>3.5.6 MBS Attacks 79</p> <p>3.5.7 Mesh Mode Considerations 80</p> <p>3.5.8 Handovers 81</p> <p>3.6 Comparisons with 802.11/UMTS 81</p> <p>3.7 Summary 84</p> <p>References 85</p> <p><b>4 WiMAX Network Security 87</b><br /> <i>Luca Adamo, Romano Fantacci and Leonardo Maccari</i></p> <p>4.1 Introduction 87</p> <p>4.2 WiMAX Network Reference Model 88</p> <p>4.2.1 Functional Entities 89</p> <p>4.2.2 Logical Domains 90</p> <p>4.2.3 Reference Points 90</p> <p>4.2.4 ASN Profiles 91</p> <p>4.3 The RADIUS Server 92</p> <p>4.3.1 Authentication in WiMAX Infrastructure 93</p> <p>4.4 WiMAX Networking Procedures and Security 95</p> <p>4.4.1 Handover Procedure 95</p> <p>4.4.2 DHCP 97</p> <p>4.4.3 Security Issues 98</p> <p>4.4.4 Mobile IP Protocol 99</p> <p>4.4.5 PMIP 100</p> <p>4.4.6 PMIP Security Considerations 101</p> <p>4.4.7 CMIP 102</p> <p>4.4.8 CMIP Security Considerations 103</p> <p>4.4.9 QoS 104</p> <p>4.4.10 A Complete Authentication Procedure 104</p> <p>4.5 Further Reading 105</p> <p>4.6 Summary 106</p> <p>References 107</p> <p><b>Part C Quality of Service 109</b></p> <p><b>5 Cross-Layer End-to-End QoS Architecture: The Milestone of WiMAX 111</b><br /> <i>Floriano De Rango, Andrea Malfitano and Salvatore Marano</i></p> <p>5.1 Introduction 111</p> <p>5.2 QoS Definitions 112</p> <p>5.3 QoS Mechanisms Offered by IEEE 802.16 112</p> <p>5.3.1 Cross-Layer QoS Architecture 113</p> <p>5.3.2 MAC Layer Point of View 115</p> <p>5.3.3 Offering QoS in PMP Mode 117</p> <p>5.3.4 QoS Introduction in Mesh Mode 121</p> <p>5.3.5 QoS Application on Packet by Packet Basis 123</p> <p>5.3.6 PHY Layer Point of View 124</p> <p>5.3.7 ACM: Adaptive Coding and Modulation 125</p> <p>5.3.8 Mobility Support in IEEE 802.16 126</p> <p>5.4 What is Missing in the WiMAX Features? 128</p> <p>5.4.1 Absences in the MAC Layer 128</p> <p>5.4.2 Scheduling Algorithm 129</p> <p>5.4.3 Call Admission Control Algorithm 132</p> <p>5.4.4 PHY Layer Improvements 133</p> <p>5.4.5 QoS Based ACM Algorithm 133</p> <p>5.5 Future Challenges 134</p> <p>5.5.1 End-to-End QoS in the IP World 134</p> <p>5.5.2 New Ways to Resolve the WiMAX QoS Problem: Two Interesting Examples 136</p> <p>5.5.3 Game Theory in the WiMAX Scenario 136</p> <p>5.5.4 Fuzzy Logic: What Idea to Guarantee QoS? 138</p> <p>5.5.5 Designing Mobility – Mesh WiMAX 140</p> <p>5.5.6 How to Extend QoS Mechanisms 140</p> <p>5.6 Summary 141</p> <p>References 141</p> <p><b>6 QoS in Mobile WiMAX 145</b><br /> <i>Neila Krichene and Noureddine Boudriga</i></p> <p>6.1 Introduction 145</p> <p>6.2 Architectural QoS Requirements 146</p> <p>6.2.1 QoS-Related Challenges 146</p> <p>6.2.2 Architectural Requirements 148</p> <p>6.3 Mobile WiMAX Service Flows 149</p> <p>6.3.1 Service Flows 150</p> <p>6.3.2 Scheduling Services Supporting Service Flows 151</p> <p>6.3.3 QoS Parameters 153</p> <p>6.4 Admission Control 154</p> <p>6.4.1 MAC Layer Connections 154</p> <p>6.4.2 Bandwidth Request Procedures 156</p> <p>6.4.3 Bandwidth Allocation Procedures 158</p> <p>6.5 Scheduling Service 160</p> <p>6.5.1 Scheduling Architecture in Mobile WiMAX 160</p> <p>6.5.2 Packet Schedulers Overview 162</p> <p>6.6 Maintaining QoS During Handover 165</p> <p>6.6.1 WiMAX Handover Schemes 165</p> <p>6.6.2 Optimizing Handover to Maintain the Required QoS 168</p> <p>6.7 Enhancing WiMAX QoS Issues: Research Work 170</p> <p>6.7.1 New QoS Mechanisms 171</p> <p>6.7.2 The WEIRD Project 171</p> <p>6.7.3 WiFi and WiMAX QoS Integration 173</p> <p>6.8 Further Reading 175</p> <p>6.9 Summary 176</p> <p>References 176</p> <p><b>7 Mobility Management in WiMAX Networks 179</b><br /> <i>Ikbal Chammakhi Msadaa, Daniel Cˆamara and Fethi Filali</i></p> <p>7.1 Mobile WiMAX Architecture 180</p> <p>7.2 Horizontal Handover in 802.16e 183</p> <p>7.2.1 Network Topology Acquisition 183</p> <p>7.2.2 Handover Process 186</p> <p>7.2.3 Fast BS Switching (FBSS) and Macro Diversity Handover (MDHO) 187<br /> <br /> Discussion 188</p> <p>7.3 Optimized 802.16e Handover Schemes 188</p> <p>7.3.1 L2 Handover Schemes 190</p> <p>7.3.2 L2-L3 Cross-Layer Handover Schemes 190</p> <p>7.3.3 Mobile IPv6 Fast Handovers Over IEEE 802.16e Networks 191</p> <p>Discussion 195</p> <p>7.4 Vertical Handover 195</p> <p>7.4.1 Vertical Handover Mechanisms Involving 802.16e Networks 196</p> <p>7.4.2 IEEE 802.21, Media-Independent Handover Services 197</p> <p>Discussion 200</p> <p>7.5 Roaming 200</p> <p>7.5.1 WiMAX Roaming Interface 203</p> <p>7.5.2 The Roaming Process 203</p> <p>7.6 Mobility Management in WiMESH Networks 204</p> <p>7.7 Conclusion 207</p> <p>7.8 Summary 207</p> <p>References 208</p> <p><b>Part D Advanced Topics 211</b></p> <p><b>8 QoS Challenges in the Handover Process 213</b><br /> <i>Marina Aguado, Eduardo Jacob, Marion Berbineau and Ivan Lledo Samper</i></p> <p>8.1 Introduction 213</p> <p>8.2 Handover in WiMAX 214</p> <p>8.3 The IEEE802.16 Handover Process 215</p> <p>8.3.1 The Network Entry Procedure 215</p> <p>8.3.2 Network Topology Advertising and Acquisition 218</p> <p>8.3.3 The Association Procedure 220</p> <p>8.3.4 Handover Stages in the IEEE 802.16 Standard 221</p> <p>8.3.5 Handover Execution Methods 225</p> <p>8.4 The Media Independent Handover Initiative – IEEE 802.21 227</p> <p>8.4.1 MIH Interactions with Layer 2 and Layer 3 Protocols 229</p> <p>8.4.2 MIH Scope and Limitations 229</p> <p>8.5 Enhancing the Handover Process 230</p> <p>8.5.1 Fast Ranging Mechanism 230</p> <p>8.5.2 Seamless Handover Mechanism 231</p> <p>8.5.3 Initiatives in the Cell Reselection Stage 232</p> <p>8.5.4 Initiatives in the Execution Stage 232</p> <p>8.6 Handover Scheduling 233</p> <p>8.7 Handover Performance Analysis 234</p> <p>8.8 Summary 238</p> <p>References 238</p> <p><b>9 Resource Allocation in Mobile WiMAX Networks 241</b><br /> <i>Tara Ali Yahiya</i></p> <p>9.1 Introduction 241</p> <p>9.2 Background on IEEE 802.16e 242</p> <p>9.2.1 The Medium Access Control Layer – MAC 242</p> <p>9.2.2 The Physical Layer – PHY 243</p> <p>9.3 System Model 248</p> <p>9.4 OFDMA Key Principles–Analysis and Performance Characterizations 249</p> <p>9.4.1 Multiuser Diversity 249</p> <p>9.4.2 Adaptive Modulation and Coding – Burst Profiles 250</p> <p>9.4.3 Capacity Analysis – Time and Frequency Domain 250</p> <p>9.4.4 Mapping Messages 252</p> <p>9.5 Cross-Layer Resource Allocation in Mobile WiMAX 252</p> <p>9.6 Channel Aware Class Based Queue (CACBQ) – The Proposed Solution 253</p> <p>9.6.1 System Model 253</p> <p>9.6.2 Channel Aware Class Based Queue (CACBQ) Framework 255</p> <p>9.7 Summary and Conclusion 257</p> <p>References 258</p> <p><b>10 QoS Issues and Challenges in WiMAX and WiMAX MMR Networks 261</b><br /> <i>Kiran Kumari, Srinath Narasimha and Krishna M. Sivalingam</i></p> <p>10.1 Introduction 261</p> <p>10.1.1 Motivation 262</p> <p>10.2 Multimedia Traffic 263</p> <p>10.2.1 Voice Codecs 264</p> <p>10.2.2 Video Codecs 265</p> <p>10.2.3 QoS Specifications 267</p> <p>10.2.4 QoS Effectiveness Measures 268</p> <p>10.3 Multimedia: WiFi versus WiMAX 269</p> <p>10.3.1 Limitations of Wireless LAN Technologies 269</p> <p>10.3.2 WiMAX MAC Layer 270</p> <p>10.3.3 QoS Architecture for WiMAX 272</p> <p>10.4 QoS Scheduling in WiMAX Networks 273</p> <p>10.4.1 Max-Min Weighted Fair Allocation 274</p> <p>10.4.2 Deficit Fair Priority Queue 274</p> <p>10.4.3 Weighted Fair Queuing 275</p> <p>10.4.4 Weighted Fair Priority Queuing 275</p> <p>10.5 Voice Traffic Scheduling in WiMAX 276</p> <p>10.5.1 Lee’s Algorithm 276</p> <p>10.5.2 UGS with Activity Detection Scheduling (UGS-AD) 277</p> <p>10.5.3 Extended-rtPS Scheduling 277</p> <p>10.5.4 Multi-Tap Scheduling 278</p> <p>10.6 Video Traffic Scheduling in WiMAX 279</p> <p>10.6.1 Opportunistic Scheduling 279</p> <p>10.6.2 Opportunistic DRR 281</p> <p>10.6.3 Summary 282</p> <p>10.7 Introduction to WiMAX MMR Networks 282</p> <p>10.7.1 How WiMAX MMR Networks Work 284</p> <p>10.7.2 Performance Impact 286</p> <p>10.7.3 Radio Resource Management Strategies 287</p> <p>10.8 Scheduling in WiMAX MMR Networks 288</p> <p>10.8.1 Objectives of Scheduling 288</p> <p>10.8.2 Constraints on Scheduling 289</p> <p>10.8.3 Diversity Gains 290</p> <p>10.9 Basic Wireless Scheduling Algorithms 290</p> <p>10.9.1 Round Robin Scheduling 290</p> <p>10.9.2 Max-SINR Scheduling 291</p> <p>10.9.3 Extension for Multi-Hop Case 291</p> <p>10.9.4 Proportional Fair Scheduling 292</p> <p>10.9.5 Extension for Multi-Hop Case 292</p> <p>10.9.6 Performance Comparison 293</p> <p>10.9.7 The PFMR Scheduling Algorithm 293</p> <p>10.10 Scheduling Algorithms for WiMAX MMR Networks 294</p> <p>10.10.1 The Scheduling Problem 294</p> <p>10.10.2 The GenArgMax Scheduling Algorithm 295</p> <p>10.10.3 The TreeTraversingScheduler Algorithm 297</p> <p>10.10.4 The FastHeuristic16j Scheduling Algorithm 299</p> <p>10.10.5 Improved Hop-Specific Scheduling Algorithms 300</p> <p>10.10.6 Performance Evaluation 302</p> <p>10.11 Further Reading 304</p> <p>10.12 Summary 305</p> <p>References 305</p> <p><b>11 On the Integration of WiFi and WiMAX Networks 309</b><br /> <i>Tara Ali Yahiya and Hakima Chaouchi</i></p> <p>11.1 Introduction 309</p> <p>11.2 General Design Principles of the Interworking Architecture 310</p> <p>11.2.1 Functional Decomposition 310</p> <p>11.2.2 Deployment Modularity and Flexibility 310</p> <p>11.2.3 Support for Variety of Usage Models 311</p> <p>11.2.4 Extensive use of IETF Protocols 311</p> <p>11.3 WiFi/Mobile WiMAX Interworking Architecture 311</p> <p>11.4 Network Discovery and Selection 313</p> <p>11.5 Authentication and Security Architecture 314</p> <p>11.5.1 General Network Access Control Architecture 314</p> <p>11.5.2 EAP and PANA 316</p> <p>11.5.3 RADIUS and Diameter 317</p> <p>11.6 Security in WiFi and WiMAX Networks 318</p> <p>11.6.1 Security in WiFi 318</p> <p>11.6.2 Security in WiMAX 319</p> <p>11.6.3 Security Consideration in WiFi-WiMAX 320</p> <p>11.6.4 WiFi-WiMAX Interworking Scenarios 321</p> <p>11.7 Mobility Management 324</p> <p>11.7.1 Handover Support 325</p> <p>11.7.2 Cell Selection 325</p> <p>11.7.3 IP for Mobility Management 326</p> <p>11.7.4 Session Initiation Protocol for Mobility Management 326</p> <p>11.7.5 Identity Based Mobility 328</p> <p>11.8 Quality of Service Architecture 330</p> <p>11.8.1 End-to-End QoS Interworking Framework 330</p> <p>11.8.2 QoS Considerations 332</p> <p>11.9 Summary 335</p> <p>References 335</p> <p><b>12 QoS Simulation and An Enhanced Solution of Cell Selection for WiMAX Network 337</b><br /> <i>Xinbing Wang, Shen Gu, Yuan Wu and Jiajing Wang</i></p> <p>12.1 Introduction 337</p> <p>12.2 WiMAX Simulation Tools – Overview 338</p> <p>12.2.1 NS2 338</p> <p>12.2.2 OPNet Modeler 338</p> <p>12.2.3 QualNet 339</p> <p>12.3 QoS Simulation of WiMAX Network 339</p> <p>12.3.1 Performance Comparison Between Different Services 339</p> <p>12.3.2 Mobility Support 344</p> <p>12.4 Analysis of QoS Simulation Results 353</p> <p>12.4.1 Fixed SSs 353</p> <p>12.4.2 Mobile SSs with Same Speed 356</p> <p>12.4.3 Mobile SSs with Varying Speed 356</p> <p>12.5 Enhancement – A New Solution of Cell Selection 356</p> <p>12.5.1 System Model 356</p> <p>12.5.2 Simulation Result 360</p> <p>12.6 Summary 363</p> <p>References 363</p> <p>Appendix List of Standards 365</p> <p>Index 371</p>
SEOK YEE TANG has specialized in wireless communications systems throughout her 23 year career, gaining research, practical, management and leadership experience for military, industry and academic applications. In recent years she has worked with a varied range of companies over three continents. Her wireless communications career started with servicing UHF and VHF and HF radio communications sets used for the communications link between the Air Communications Operations Officers and the Air Force Pilots. She also upheld several leadership positions in her military career. Besides her career in Singapore Air Force, she has also worked for Microwave Communication Inc (MCI) in United States. Other universities and companies she has worked for include Mobile Research Group in University of Surrey in United Kingdom, University of Puerto Rico, Institute of Infocomm Singapore, and NEC in United Kingdom. She has also been an active member of the Technical Program Committees for several international Wireless Communications conferences since 2005. Conferences that she has contributed to organizing include Globecom, VTC and Chinacom. In 2008 she left the corporate world and is presently a financial market trader and also an entrepreneur. <p>PETER MÜLLER joined the IBM Zurich Research Laboratory as a Research Staff Member in 1988, and was appointed the secretary of the IEEE Technical Committee on Communications and Information Systems Security in 2007. His research expertise covers a broad range of areas from information systems architecture and simulation techniques to device physics and nano-science. He holds a number of patents, has published more than 50 scientific articles, books, special journal issues and proceedings, as well as serving as a government counsel and chairing many international conferences and workshops.</p> <p>DR. HAMID R. SHARIF is the Henson Distinguished Professor of the Computer and Electronics Engineering Department and the Director of Advanced Telecommunications Engineering Laboratory (TEL) at the University of Nebraska-Lincoln. His current research interests include protocols, security, OoS and performance evaluations in wireless communications and networks. He has authored and co-authored over 160 technical papers in major international journals and refereed conferences. He serves as Steering Committee member, Symposium Chair and General Co-Chair of many international conferences, and also contributes as the Editor, Associate Editor, or Editorial Board member for several journals. He is the Co-Editor-in-Chief of Wiley’s <i>Security and Communication Networks</i> and a senior member of many professional organizations including IEEE. As the current Chapters Coordinator for IEEE Region 4, he is also the past Chair of the IEEE Nebraska Section and past President of the IEEE Nebraska Computer and Communications Societies.</p>
WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. <i>WiMAX Security and Quality of Service</i>, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements. Security is an essential element in the wireless world and Part B is fully dedicated to this topic. Part C provides an in depth analysis of QoS, including mobility management in WiMAX. Finally, Part D introduces the reader to advanced and future topics. <ul> <li>One of the first texts to cover security, QoS and deployments of WiMAX in the same book.</li> <li>Introduces the primary concepts of the interdisciplinary nature of WiMAX security and QoS, and also includes discussion of hot topics in the field.</li> <li>Written for engineers and researchers, answering practical questions from industry and the experimental field in academia.</li> <li>Explains how WiMAX applications’ security and QoS are interconnected and interworked among the cross layers.</li> </ul>

Diese Produkte könnten Sie auch interessieren: