throbber
IEEE Std 802.16™-2004
`(Revision of IEEE Std 802.16-2001)
`
`802.16™
`
`IEEE Standard for
`Local and metropolitan area networks
`
`Part 16: Air Interface for Fixed
`Broadband Wireless Access Systems
`
`IEEE Computer Society
`and the
`IEEE Microwave Theory and Techniques Society
`
`Sponsored by the
`LAN/MAN Standards Committee
`
`IEEE Standards
`IEEE Standards
`
`3 Park Avenue, New York, NY 10016-5997, USA
`
`1 October 2004
`
`Print: SH95246
`PDF: SS95246
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`PETITIONERS 1054-0001
`IPR2016-00758
`
`

`

`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`PETITIONERS 1054-0002
`IPR2016-00758
`
`

`

`IEEE Std 802.16™-2004
`(Revision of
`IEEE Std 802.16-2001)
`
`IEEE Standard for
`Local and metropolitan area networks
`Part 16: Air Interface for Fixed
`Broadband Wireless Access Systems
`
`Sponsor
`LAN/MAN Standards Committee
`of the
`IEEE Computer Society
`
`and the
`IEEE Microwave Theory and Techniques Society
`
`Approved 24 June 2004
`IEEE-SA Standards Board
`

`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`PETITIONERS 1054-0003
`IPR2016-00758
`
`

`

`Grateful acknowledgment is made to Cable Television Laboratories for the permission to use the following
`source material:
`
`Radio Frequency Interface Specification (version 1.1), part of Data-Over-Cable Service Interface
`Specifications, © Copyright 1999, Cable Television Laboratories.
`
`Baseline Privacy Plus Interface Specification, © Copyright 1999, Cable Television Laboratories.
`
`
`
`Abstract: This standard specifies the air interface of fixed broadband wireless access (BWA)
`systems supporting multimedia services. The medium access control layer (MAC) supports a
`primarily point-to-multipoint architecture, with an optional mesh topology. The MAC is structured
`to support multiple physical layer (PHY) specifications, each suited to a particular operational
`environment. For operational frequencies from 10–66 GHz, the PHY is based on single-carrier
`modulation. For frequencies below 11 GHz, where propagation without a direct line of sight
`must be accommodated, three alternatives are provided, using OFDM, OFDMA, and single-
`carrier modulation. This standard revises and consolidates IEEE Std 802.16-2001, IEEE Std
`802.16a™-2003, and IEEE Std 802.16c™-2002.
`
`Keywords: fixed broadband wireless access network, metropolitan area network, microwave,
`millimeter wave, WirelessMAN® standards
`
`The Institute of Electrical and Electronics Engineers, Inc.
`3 Park Avenue, New York, NY 10016-5997, USA
`
`Copyright © 2004 by the Institute of Electrical and Electronics Engineers, Inc.
`All rights reserved. Published 1 October 2004. Printed in the United States of America.
`
`IEEE, 802, and WirelssMAN are registered trademarks in the U.S. Patent & Trademark Office, owned by the Institute of
`Electrical and Electronics Engineers, Incorporated.
`
`WirelessMAN-OFDM, WirelessMAN-OFDMA, WirelessMAN-SC, and WirelessMAN-SCa, are trademarks owned by the
`Institute of Electrical and Electronics Engineers, Incorporated.
`
`Print:
`PDF:
`
`ISBN 0-7381-4069-4 SH95246
`ISBN 0-7381-4070-8 SS95246
`
`No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without the prior
`written permission of the publisher.
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`PETITIONERS 1054-0004
`IPR2016-00758
`
`

`

`IEEE Standards documents are developed within the IEEE Societies and the Standards Coordinating Committees of the
`IEEE Standards Association (IEEE-SA) Standards Board. The IEEE develops its standards through a consensus
`development process, approved by the American National Standards Institute, which brings together volunteers
`representing varied viewpoints and interests to achieve the final product. Volunteers are not necessarily members of the
`Institute and serve without compensation. While the IEEE administers the process and establishes rules to promote fairness
`in the consensus development process, the IEEE does not independently evaluate, test, or verify the accuracy of any of the
`information contained in its standards.
`
`Use of an IEEE Standard is wholly voluntary. The IEEE disclaims liability for any personal injury, property or other
`damage, of any nature whatsoever, whether special, indirect, consequential, or compensatory, directly or indirectly resulting
`from the publication, use of, or reliance upon this, or any other IEEE Standard document.
`
`The IEEE does not warrant or represent the accuracy or content of the material contained herein, and expressly disclaims
`any express or implied warranty, including any implied warranty of merchantability or fitness for a specific purpose, or that
`the use of the material contained herein is free from patent infringement. IEEE Standards documents are supplied “AS IS.”
`
`The existence of an IEEE Standard does not imply that there are no other ways to produce, test, measure, purchase, market,
`or provide other goods and services related to the scope of the IEEE Standard. Furthermore, the viewpoint expressed at the
`time a standard is approved and issued is subject to change brought about through developments in the state of the art and
`comments received from users of the standard. Every IEEE Standard is subjected to review at least every five years for
`revision or reaffirmation. When a document is more than five years old and has not been reaffirmed, it is reasonable to
`conclude that its contents, although still of some value, do not wholly reflect the present state of the art. Users are cautioned
`to check to determine that they have the latest edition of any IEEE Standard.
`
`In publishing and making this document available, the IEEE is not suggesting or rendering professional or other services
`for, or on behalf of, any person or entity. Nor is the IEEE undertaking to perform any duty owed by any other person or
`entity to another. Any person utilizing this, and any other IEEE Standards document, should rely upon the advice of a
`competent professional in determining the exercise of reasonable care in any given circumstances.
`
`Interpretations: Occasionally questions may arise regarding the meaning of portions of standards as they relate to specific
`applications. When the need for interpretations is brought to the attention of IEEE, the Institute will initiate action to prepare
`appropriate responses. Since IEEE Standards represent a consensus of concerned interests, it is important to ensure that any
`interpretation has also received the concurrence of a balance of interests. For this reason, IEEE and the members of its
`societies and Standards Coordinating Committees are not able to provide an instant response to interpretation requests except
`in those cases where the matter has previously received formal consideration. At lectures, symposia, seminars, or educational
`courses, an individual presenting information on IEEE standards shall make it clear that his or her views should be considered
`the personal views of that individual rather than the formal position, explanation, or interpretation of the IEEE.
`
`Comments for revision of IEEE Standards are welcome from any interested party, regardless of membership affiliation with
`IEEE. Suggestions for changes in documents should be in the form of a proposed change of text, together with appropriate
`supporting comments. Comments on standards and requests for interpretations should be addressed to:
`
`Secretary, IEEE-SA Standards Board
`
`445 Hoes Lane
`
`P.O. Box 1331
`
`Piscataway, NJ 08855-1331USA
`NOTE−Attention is called to the possibility that implementation of this standard may require use of subject
`matter covered by patent rights. By publication of this standard, no position is taken with respect to the
`existence or validity of any patent rights in connection therewith. The IEEE shall not be responsible for
`identifying patents for which a license may be required by an IEEE standard or for conducting inquiries into the
`legal validity or scope of those patents that are brought to its attention.
`
`Authorization to photocopy portions of any individual standard for internal or personal use is granted by the Institute of
`Electrical and Electronics Engineers, Inc., provided that the appropriate fee is paid to Copyright Clearance Center. To
`arrange for payment of licensing fee, please contact Copyright Clearance Center, Customer Service, 222 Rosewood Drive,
`Danvers, MA 01923 USA; +1 978 750 8400. Permission to photocopy portions of any individual standard for educational
`classroom use can also be obtained through the Copyright Clearance Center.
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`PETITIONERS 1054-0005
`IPR2016-00758
`
`

`

`Introduction
`
`(This introduction is not part of IEEE Std 802.16-2004, IEEE Standard for Local and metropolitan area
`networks—Part 16: Air Interface for Fixed Broadband Wireless Access Systems.)
`
`This standard specifies the air interface of fixed broadband wireless access (BWA) systems supporting
`multimedia services. The medium access control layer (MAC) supports a primarily point-to-multipoint
`architecture, with an optional mesh topology. The MAC is structured to support multiple physical layer (PHY)
`specifications, each suited to a particular operational environment. For operational frequencies from 10–66
`GHz, the WirelessMAN-SC PHY, based on single-carrier modulation, is specified. For frequencies below 11
`GHz, where propagation without a direct line of sight must be accommodated, three alternatives are provided:
`WirelessMAN-OFDM (using orthogonal frequency-division multiplexing), WirelessMAN-OFDMA (using
`orthogonal frequency-division multiple access), and WirelessMAN-SCa (using single-carrier modulation).
`This standards revises and consolidates IEEE Standards 802.16-2001, 802.16a-2003, and 802.16c-2002.
`
`Conformance test methodology
`
`The multipart conformance test documents for IEEE Standard 802.16 by “IEEE Standard 802.16/
`ConformanceXX”. For example, the first part of the conformance specification for IEEE 802.16 is designated
`“IEEE Standard 802.16/Conformance01.”
`
`Patents
`
`Attention is called to the possibility that implementation of this standard may require use of subject matter
`covered by patent rights. By publication of this standard, no position is taken with respect to the existence or
`validity of any patent rights in connection therewith. The IEEE shall not be responsible for identifying
`patents or patent applications for which a license may be required to implement an IEEE standard or for
`conducting inquiries into the legal validity or scope of those patents that are brought to its attention. A patent
`holder or patent applicant has filed a statement of assurance that it will grant licenses under these rights
`without compensation or under reasonable rates and nondiscriminatory, reasonable terms and conditions to
`applicants desiring to obtain such licenses. The IEEE makes no representation as to the reasonableness of
`rates, terms, and conditions of the license agreements offered by patent holders or patent applicants. Further
`information may be obtained from the IEEE Standards Department.
`
`Notice to users
`
`Errata
`
`Errata, if any, for this and all other standards can be accessed at the following URL: http://
`standards.ieee.org/reading/ieee/updates/errata/index.html. Users are encouraged to check this URL for
`errata periodically.
`
`Interpretations
`
`Current interpretations can be accessed at the following URL: http://standards.ieee.org/reading/ieee/interp/
`index.html.
`
`iv
`
`Copyright © 2004 IEEE. All rights reserved.
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`PETITIONERS 1054-0006
`IPR2016-00758
`
`

`

`Participants
`
`This document was developed by the IEEE 802.16 Working Group on Broadband Wireless Access, which
`develops the WirelessMAN® Standard for Wireless Metropolitan Area Networks.
`
`IEEE 802.16 Working Group Officers
`Roger B. Marks, Chair
`Kenneth Stanwood, Vice Chair
`Dean Chang, Secretary
`
`Primary development was carried out by the Working Group’s Task Group d:
`
`TGd Officers
`Gordon Antonello, Chair
`Itzik Kitroser, Chief Technical Editor
`Robert Nelson, Assistant Editor
`Brian Eidson, SCa PHY Editorial Contributor
`Nico van Waes, Former Chief Technical Editor
`
`The following members of the IEEE 802.16 Working Group on Broadband Wireless Access participated in
`the Working Group Letter Ballot in which the draft of this standard was prepared and finalized for IEEE
`Ballot:
`
`Aditya Agrawal
`Gordon Antonello
`Reza Arefi
`Eli Avivi
`Dean Chang
`Naftali Chayat
`Rémi Chayer
`Brian Eidson
`Carl Eklund
`Marc Engels
`Avraham Freedman
`G. Jack Garrison
`Marianna Goldhammer
`Zion Hadad
`David Johnston
`Panyuh Joo
`Tal Kaitz
`
`Phil Kelly
`Ofer Kelman
`Brian Kiernan
`Itzik Kitroser
`Changhoi Koo
`Jonathan Labs
`Yigal Leiba
`Barry Lewis
`Lingjie Li
`John Liebetreu
`Lars Lindh
`Hui-Ling Lou
`Heinz Lycklama
`Roger B. Marks
`Russell McKown
`Andrew Middleton
`
`Ronald Murias
`Robert Nelson
`Kamlesh Rath
`Gene Robinson
`Yossi Segal
`Radu Selea
`James Simkins
`Kenneth Stanwood
`Carl Stevenson
`Shawn Taylor
`Rainer Ullmann
`Nico van Waes
`Eyal Verbin
`Arthur Wang
`Lei Wang
`Stanley Wang
`Vladimir Yanover
`
`Copyright © 2004 IEEE. All rights reserved.
`
`v
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`PETITIONERS 1054-0007
`IPR2016-00758
`
`

`

`The following members of the IEEE Balloting Committee voted on this standard. Balloters may have voted
`for approval, disapproval, or abstention.
`
`John Adams
`Gordon Antonello
`Eladio Arvelo
`John Barnett
`Dean Chang
`Naftali Chayat
`Aik Chindapol
`Todor Cooklev
`Guru Dutt Dhingra
`Thomas Dineen
`Sourav Dutta
`Brian Eidson
`Avraham Freedman
`Theodore Georgantas
`Andrew Germano
`Mariana Goldhamer
`Zion Hadad
`Andreas Hutter
`Raj Jain
`Tony Jeffree
`David Johnston
`
`Tal Kaitz
`Stuart Kerry
`Brian Kiernan
`Itzik Kitroser
`Jonathan Labs
`Yigal Leiba
`Jan-Ray Liao
`Randolph Little
`Gregory Luri
`Roger B. Marks
`Kevin Marquess
`John McKown
`Russell McKown
`Ingolf Meier
`Steve Methley
`George Miao
`Yinghua Min
`Robert R Nelson
`Michael Newman
`Charles Ngethe
`Roger Pandanda
`
`Subbu Ponnuswamy
`Vikram Punj
`Klaus Rapf
`Durga Satapathy
`Yossi Segal
`Neil Shipp
`Gil Shultz
`Yoram Solomon
`Kenneth Stanwood
`Carl Stevenson
`Shawn Taylor
`Scott Valcourt
`Nico van Waes
`Stanley Wang
`Cor van de Water
`Hung-yu Wei
`Vladimir Yanover
`Huanchun Ye
`Oren Yuen
`Surong Zeng
`
`When the IEEE-SA Standards Board approved this standard on 24 June 2004, it had the following
`membership:
`
`Don Wright, Chair
`Steve M. Mills, Vice Chair
`Judith Gorman, Secretary
`Raymond Hapeman
`Richard J. Holleman
`Richard H. Hulett
`Lowell G. Johnson
`Joseph L. Koepfinger*
`Hermann Koch
`Thomas J. McGean
`
`Daleep C. Mohla
`Paul Nikolich
`T. W. Olsen
`Ronald C. Petersen
`Gary S. Robinson
`Frank Stone
`Malcolm V. Thaden
`Doug Topping
`Joe D. Watson
`
`Chuck Adams
`H. Stephen Berger
`Mark D. Bowman
`Joseph A. Bruder
`Bob Davis
`Roberto de Boisson
`Julian Forster*
`Arnold M. Greenspan
`Mark S. Halpin
`
`*Member Emeritus
`
`Also included are the following nonvoting IEEE-SA Standards Board liaisons:
`
`Satish K. Aggarwal, NRC Representative
`Richard DeBlasio, DOE Representative
`Alan Cookson, NIST Representative
`
`Michelle D. Turner
`IEEE Standards Project Editor
`
`vi
`
`Copyright © 2004 IEEE. All rights reserved.
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`PETITIONERS 1054-0008
`IPR2016-00758
`
`

`

`CONTENTS
`
`1.
`
`Overview.............................................................................................................................................. 1
`
`1.1 Scope............................................................................................................................................ 1
`1.2 Purpose......................................................................................................................................... 1
`1.3 Frequency bands .......................................................................................................................... 1
`1.3.1
`10–66 GHz licensed bands .............................................................................................. 1
`1.3.2 Frequencies below 11 GHz.............................................................................................. 2
`1.3.3 License-exempt frequencies below 11 GHz (primarily 5–6 GHz) .................................. 2
`1.3.4 Air interface nomenclature and PHY compliance ........................................................... 2
`1.4 Reference model .......................................................................................................................... 3
`
`References............................................................................................................................................ 5
`
`Definitions ........................................................................................................................................... 7
`
`Abbreviations and acronyms ............................................................................................................. 13
`
`Service-specific CS............................................................................................................................ 17
`
`2.
`
`3.
`
`4.
`
`5.
`
`5.2.4
`
`5.1 ATM CS..................................................................................................................................... 17
`5.1.1 CS service definition...................................................................................................... 17
`5.1.2 Data/Control plane ......................................................................................................... 17
`5.1.2.1
`PDU formats .................................................................................................. 17
`5.1.2.2 Classification ................................................................................................. 18
`5.1.2.3
`PHS ................................................................................................................ 18
`5.1.2.4
`Signaling procedure ....................................................................................... 19
`5.2 Packet CS ................................................................................................................................... 20
`5.2.1 MAC SDU format.......................................................................................................... 21
`5.2.2 Classification ................................................................................................................. 21
`5.2.3 PHS ................................................................................................................................ 23
`5.2.3.1
`PHS operation ................................................................................................ 23
`5.2.3.2
`PHS signaling ................................................................................................ 26
`IEEE Std 802.3/Ethernet-specific part........................................................................... 27
`5.2.4.1
`IEEE Std 802.3/Ethernet CS PDU format ..................................................... 27
`5.2.4.2
`IEEE Std 802.3/Ethernet CS classifiers......................................................... 27
`IEEE Std 802.1Q-1998 virtual local area network (VLAN) specific part..................... 28
`5.2.5.1
`IEEE Std 802.1Q-1998 VLAN CS PDU format............................................ 28
`5.2.5.2
`IEEE Std 802.1Q-1998 CS classifiers ........................................................... 28
`IP specific part ............................................................................................................... 28
`5.2.6.1
`IP CS PDU format ......................................................................................... 28
`5.2.6.2
`IP classifiers................................................................................................... 29
`
`5.2.5
`
`5.2.6
`
`6.
`
`MAC common part sublayer.............................................................................................................. 31
`
`6.1 PMP ........................................................................................................................................... 31
`6.2 Mesh........................................................................................................................................... 32
`6.3 Data/Control plane ..................................................................................................................... 33
`6.3.1 Addressing and connections .......................................................................................... 33
`6.3.1.1
`PMP ............................................................................................................... 33
`6.3.1.2 Mesh............................................................................................................... 34
`6.3.2 MAC PDU formats ........................................................................................................ 35
`
`Copyright © 2004 IEEE. All rights reserved.
`
`vii
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`PETITIONERS 1054-0009
`IPR2016-00758
`
`

`

`6.3.2.1 MAC header formats ..................................................................................... 35
`6.3.2.2 MAC subheaders and special payloads ......................................................... 39
`6.3.2.3 MAC Management messages ........................................................................ 42
`6.3.3 Construction and transmission of MAC PDUs............................................................ 121
`6.3.3.1 Conventions ................................................................................................. 121
`6.3.3.2 Concatenation .............................................................................................. 123
`6.3.3.3
`Fragmentation .............................................................................................. 123
`6.3.3.4
`Packing......................................................................................................... 124
`6.3.3.5 CRC calculation ........................................................................................... 127
`6.3.3.6
`Encryption of MAC PDUs........................................................................... 127
`6.3.3.7
`Padding ........................................................................................................ 128
`6.3.4 ARQ mechanism.......................................................................................................... 128
`6.3.4.1 ARQ Block Usage ....................................................................................... 128
`6.3.4.2 ARQ Feedback IE format ............................................................................ 130
`6.3.4.3 ARQ parameters .......................................................................................... 132
`6.3.4.4 ARQ procedures .......................................................................................... 132
`6.3.4.5 ARQ-enabled connection setup and negotiation ......................................... 133
`6.3.4.6 ARQ operation............................................................................................. 133
`6.3.5 Scheduling services...................................................................................................... 138
`6.3.5.1 Outbound transmission scheduling .............................................................. 139
`6.3.5.2 Uplink request/grant scheduling .................................................................. 139
`6.3.6 Bandwidth allocation and request mechanisms ........................................................... 141
`6.3.6.1 Requests ....................................................................................................... 141
`6.3.6.2 Grants........................................................................................................... 142
`6.3.6.3
`Polling.......................................................................................................... 142
`6.3.6.4 Contention-based focused Bandwidth Requests for WirelessMAN-
`OFDM.......................................................................................................... 147
`6.3.6.5 Contention-based CDMA Bandwidth Requests for WirelessMAN-
`OFDMA ....................................................................................................... 147
`6.3.6.6 Optional Mesh topology support ................................................................. 148
`6.3.7 MAC support of PHY .................................................................................................. 151
`6.3.7.1
`FDD ............................................................................................................. 151
`6.3.7.2
`TDD ............................................................................................................. 152
`6.3.7.3 DL-MAP ...................................................................................................... 152
`6.3.7.4 UL-MAP ...................................................................................................... 152
`6.3.7.5 Map relevance and synchronization ............................................................ 154
`6.3.7.6 Optional MAC AAS Support of WirelessMAN-SCa, OFDM, and
`OFDMA ....................................................................................................... 162
`6.3.8 Contention resolution................................................................................................... 165
`6.3.8.1
`Transmission opportunities.......................................................................... 167
`6.3.9 Network entry and initialization .................................................................................. 167
`6.3.9.1
`Scanning and synchronization to the downlink ........................................... 169
`6.3.9.2 Obtain downlink parameters........................................................................ 169
`6.3.9.3 Obtain uplink parameters............................................................................. 171
`6.3.9.4 Message flows during scanning and uplink parameter acquisition ............. 173
`6.3.9.5
`Initial ranging and automatic adjustments ................................................... 174
`6.3.9.6 Ranging parameter adjustment .................................................................... 178
`6.3.9.7 Negotiate basic capabilities ......................................................................... 182
`6.3.9.8
`SS authorization and key exchange ............................................................. 184
`6.3.9.9 Registration.................................................................................................. 184
`6.3.9.10 Establish IP connectivity ............................................................................. 187
`6.3.9.11 Establish time of day.................................................................................... 187
`6.3.9.12 Transfer operational parameters .................................................................. 188
`6.3.9.13 Establish provisioned connections............................................................... 190
`
`viii
`
`Copyright © 2004 IEEE. All rights reserved.
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`PETITIONERS 1054-0010
`IPR2016-00758
`
`

`

`6.3.9.14 Network Entry and synchronization in Mesh mode .................................... 190
`6.3.10 Ranging ........................................................................................................................ 199
`6.3.10.1 Downlink burst profile management ........................................................... 199
`6.3.10.2 Uplink periodic ranging ............................................................................... 202
`6.3.10.3 OFDMA-based ranging ............................................................................... 204
`6.3.11 Update of channel descriptors...................................................................................... 213
`6.3.12 Assigning SSs to multicast groups............................................................................... 215
`6.3.13 Establishment of multicast connections....................................................................... 218
`6.3.14 QoS .............................................................................................................................. 218
`6.3.14.1 Theory of operation ..................................................................................... 218
`6.3.14.2 Service flows................................................................................................ 219
`6.3.14.3 Object model................................................................................................ 221
`6.3.14.4 Service classes ............................................................................................. 222
`6.3.14.5 Authorization ............................................................................................... 222
`6.3.14.6 Types of service flows ................................................................................. 223
`6.3.14.7 Service Flow Creation ................................................................................. 224
`6.3.14.8 Dynamic service flow modification and deletion ........................................ 226
`6.3.14.9 Service flow management............................................................................ 226
`6.3.15 DFS for license-exempt operation ............................................................................... 263
`6.3.15.1 Introduction.................................................................................................. 263
`6.3.15.2 Testing channels for primary users .............................................................. 263
`6.3.15.3 Discontinuing operations after detecting primary users .............................. 264
`6.3.15.4 Detecting primary users ............................................................................... 264
`6.3.15.5 Scheduling for channel testing..................................................................... 264
`6.3.15.6 Requesting and reporting of measurements................................................. 264
`6.3.15.7 Selecting and advertising a new channel ..................................................... 265
`6.3.16 MAC Management message tunneling in Mesh Mode ............................................... 265
`6.3.17 MAC support for H-ARQ ............................................................................................ 266
`6.3.17.1 Subpacket generation................................................................................... 268
`6.3.17.2 DL/UL ACK/NAK signaling....................................................................... 268
`6.3.17.3 H-ARQ parameter signaling ........................................................................ 268
`6.3.17.4 CQICH Operations ...................................................................................... 268
`
`7.
`
`Security sublayer.............................................................................................................................. 271
`
`7.1 Architecture ............................................................................................................................. 271
`7.1.1 Packet data encryption ................................................................................................. 271
`7.1.2 Key management protocol ........................................................................................... 271
`7.1.3 Security Associations................................................................................................... 272
`7.1.4 Mapping of connections to SAs.......................................................................

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket