WiMAX: Standards and Security
2008-12-06 17:08
281 查看
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
As the demand for broadband services continues to grow worldwide, traditional solutions, such as digital cable and fiber optics, are often difficult and expensive to implement, especially in rural and remote areas. The emerging WiMAX system satisfies the growing need for high data-rate applications such as voiceover IP, video conferencing, interactive gaming, and multimedia streaming. WiMAX deployments not only serve residential and enterprise users but can also be deployed as a backhaul for Wi-Fi hotspots or 3G cellular towers. By providing affordable wireless broadband access, the technology of WiMAX will revolutionize broadband communications in the developed world and bridge the digital divide in developing countries. Part of the WiMAX Handbook, this volume focuses on the standards and security issues of WiMAX. The book examines standardized versus proprietary solutions for wireless broadband access, reviews the core medium access control protocol of WiMAX systems, and presents carriers' perspectives on wireless services. It also discusses the main mobility functions of the IEEE 802.16e standard, describes how to speed up WiMAX handover procedures, presents the 802.16 mesh protocol, and surveys the testing and certification processes used for WiMAX products. In addition, the book reviews the security features of both IEEE 802.16 and WiMAX. With the revolutionary technology of WiMAX, the lives of many will undoubtedly improve, thereby leading to greater economic empowerment. http://rapidshare.com/files/67949781/1420045237.zip http://depositfiles.com/files/2288573
As the demand for broadband services continues to grow worldwide, traditional solutions, such as digital cable and fiber optics, are often difficult and expensive to implement, especially in rural and remote areas. The emerging WiMAX system satisfies the growing need for high data-rate applications such as voiceover IP, video conferencing, interactive gaming, and multimedia streaming. WiMAX deployments not only serve residential and enterprise users but can also be deployed as a backhaul for Wi-Fi hotspots or 3G cellular towers. By providing affordable wireless broadband access, the technology of WiMAX will revolutionize broadband communications in the developed world and bridge the digital divide in developing countries. Part of the WiMAX Handbook, this volume focuses on the standards and security issues of WiMAX. The book examines standardized versus proprietary solutions for wireless broadband access, reviews the core medium access control protocol of WiMAX systems, and presents carriers' perspectives on wireless services. It also discusses the main mobility functions of the IEEE 802.16e standard, describes how to speed up WiMAX handover procedures, presents the 802.16 mesh protocol, and surveys the testing and certification processes used for WiMAX products. In addition, the book reviews the security features of both IEEE 802.16 and WiMAX. With the revolutionary technology of WiMAX, the lives of many will undoubtedly improve, thereby leading to greater economic empowerment. http://rapidshare.com/files/67949781/1420045237.zip http://depositfiles.com/files/2288573
相关文章推荐
- Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications
- Enable and disable ArcGIS Server Security
- Security and System Architecture: Comparison of Android Customizations 阅读笔记
- Internet History, Technology and Security (Week8)
- 推荐:Microsoft Internet Security and Acceleration (ISA) Server 2006 支持更新
- Cocos2dx跨平台编译Android错误:format not a string literal and no format arguments [-Werror=format-security]
- Deepsec 2014 - Memory Forensics And Security Analytics - Detecting Unknown Malware
- android jni 出现format not a string literal and no format arguments [-Werror=format-security]问题
- Please open the about:config page and disable the "security.fileuri.strict_origin_policy" option
- Internet History, Technology and Security (Week⑨)
- Computer Security Conference Ranking and Statistic
- Essential Security: PKI, SSL and Xml Security
- Internet History, Technology and Security (Week3)
- springboot tomcat8 duplicate springSecurityFilterChain and increasing the maximum size of the cache
- XML, Open Standards and How XFDL Fits In
- SharePoint Security and Permission System Overview
- error: format not a string literal and no format arguments [-Werror=format-security]
- Security Software MegaPost (Firewalls and Anti-Viruses)
- Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
- REST Security with JWT using Java and Spring Security