Guide to Securing WiMAX Wireless Communications

1.5 MB | 3 files | null DOC,null PDF

Originally designed for "last-mile" service, IEEE 802.16-standard technology has developed as a key platform for WMAN coverage. This tutorial will get you up to speed on the WiMAX standard and its applications.

WiMAX technology is a wireless metropolitan area network (WMAN) communications technology that is largely based on the wireless interface defined in the

IEEE 802.16 standard. The industry trade association, the WiMAX Forum, coined the WiMAX trademark and defines the precise content and scope of WiMAX technology through technical specifications that it creates and publishes.

The original purpose of IEEE 802.16 technology was to provide last-mile broadband wireless access as an alternative to cable, digital subscriber line or T1 service. Developments in the IEEE 802.16 standard shifted the technology's focus toward a more cellular-like, mobile architecture to serve a broader market.

Today, WiMAX technology continues to adapt to market demands and provide enhanced user mobility. This document discusses WiMAX wireless communication topologies, components, certifications, security features and related security concerns.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.doc
  • Guide to Securing WiMAX Wireless Communications.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »
Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....  More >>

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....  More >>

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.