WiN5200
Product Description | 17
characteristics of a subscriber’s particular frequency channel. One such STC technique,
known as the Alamouti Code, was published in 1998[4] and has been incorporated into the
WiMAX 16e standard.
2.4.2
Security
Security was a key failing of older broadband wireless systems of the past. The why of it is
easy to comprehend---any network that transmits its data across wireless signals rather than
wires is inherently more open to interference, intrusion or assault. This does not mean solid
broadband wireless security is impossible, just much more difficult.
As broadband wireless networks have matured security features have improved. With the
advent of WiMAX, the security toolsets available to broadband wireless service providers
have reached all time highs of functionality. Today's WiMAX networks can be secured more
effectively than ever before.
WiMAX and IEEE 802.16 Security Sub layer provides for privacy, authentication and
confidentiality across the broadband wireless network. Defined initially by IEEE 802.16-2004
and then corrected and amended by Corrigendum 1 and IEEE 802.16e-2005 respectively, the
Security Sub layer now supports Fixed and Mobile operation.
There are two major differences between the standards. The first difference is that the security
mechanism of the IEEE 802.16-2004 is based on the DOCSIS standard. In the 802.16e-2005
many changes have been made in the security mechanisms. The second difference is in the
flexibility of SS's connection characteristics with the BST. The IEEE 802.16-2004 only supports
fixed access. In fixed access, an SS cannot mitigate to the air interface of a new Base Station
(BST) without performing the network entry again after a connection termination. The IEEE
802.16e-2005 supports mobile access. Mobile access enables an SS to move between various
BST cells while keeping the connection established.
There are five primary aspects of WiMAX security that should be considered when designing
a security plan for a WiMAX network. These range from mitigation techniques at the physical
layer to improved wireless authentication and encryption to intrusion protection and data
transport security. At each level, choices in implementation and security levels can be made;
although in the case of the physical layer options are limited.
2.4.2.1
Physical Layer Security
There are two basic types of attacks that can affect the physical layer of WiMAX. One is
jamming and the other is packet scrambling. The first is relatively straightforward, and is
sometimes the result of interference rather than an attack. Jamming consists of a stronger
Содержание WiN51 Series
Страница 1: ...User s Manual Installation Guide for WiN52XX WiN51XX Series Outdoor CPE...
Страница 6: ...WiN5200 Introduction 6 1 Introduction...
Страница 11: ...WiN5200 Product Description 11 2 Product Description...
Страница 27: ...WiN5200 Mounting 27 3 Mounting...
Страница 30: ...WiN5200 Installation Procedure 30 4 Installation Procedure...
Страница 38: ...WiN5200 Equipment Configuration and Monitoring 38 5 Equipment Configuration and Monitoring...
Страница 44: ...WiN5200 Equipment Configuration and Monitoring 44 6...
Страница 45: ...WiN5200 Management 45 Management...
Страница 52: ...WiN5200 Appendix A Product Specification 52...
Страница 54: ...List of Acronyms WiN5200 Appendix B IDU to ODU Cable Specifications 54...
Страница 56: ...List of Acronyms WiN5200 List of Acronyms 56...