`(Revision of IEEE Std 802.16-2001)
`
`802.16™
`
`IEEE Standard for
`Local and metropolitan area networks
`
`Part 16: Air Interface for Fixed
`Broadband Wireless Access Systems
`
`IEEE Computer Society
`and the
`IEEE Microwave Theory and Techniques Society
`
`Sponsored by the
`LAN/MAN Standards Committee
`
`IEEE Standards
`IEEE Standards
`
`3 Park Avenue, New York, NY 10016-5997, USA
`
`1 October 2004
`
`Print: SH95246
`PDF: SS95246
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`1
`
`APPLE 1005
`
`
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`2
`
`
`
`IEEE Std 802.16™-2004
`(Revision of
`IEEE Std 802.16-2001)
`
`IEEE Standard for
`Local and metropolitan area networks
`Part 16: Air Interface for Fixed
`Broadband Wireless Access Systems
`
`Sponsor
`LAN/MAN Standards Committee
`of the
`IEEE Computer Society
`
`and the
`IEEE Microwave Theory and Techniques Society
`
`Approved 24 June 2004
`IEEE-SA Standards Board
`
`®
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`3
`
`
`
`Grateful acknowledgment is made to Cable Television Laboratories for the permission to use the following
`source material:
`
`Radio Frequency Interface Specification (version 1.1), part of Data-Over-Cable Service Interface
`Specifications, © Copyright 1999, Cable Television Laboratories.
`
`Baseline Privacy Plus Interface Specification, © Copyright 1999, Cable Television Laboratories.
`
`
`
`Abstract: This standard specifies the air interface of fixed broadband wireless access (BWA)
`systems supporting multimedia services. The medium access control layer (MAC) supports a
`primarily point-to-multipoint architecture, with an optional mesh topology. The MAC is structured
`to support multiple physical layer (PHY) specifications, each suited to a particular operational
`environment. For operational frequencies from 10–66 GHz, the PHY is based on single-carrier
`modulation. For frequencies below 11 GHz, where propagation without a direct line of sight
`must be accommodated, three alternatives are provided, using OFDM, OFDMA, and single-
`carrier modulation. This standard revises and consolidates IEEE Std 802.16-2001, IEEE Std
`802.16a™-2003, and IEEE Std 802.16c™-2002.
`
`Keywords: fixed broadband wireless access network, metropolitan area network, microwave,
`millimeter wave, WirelessMAN® standards
`
`The Institute of Electrical and Electronics Engineers, Inc.
`3 Park Avenue, New York, NY 10016-5997, USA
`
`Copyright © 2004 by the Institute of Electrical and Electronics Engineers, Inc.
`All rights reserved. Published 1 October 2004. Printed in the United States of America.
`
`IEEE, 802, and WirelssMAN are registered trademarks in the U.S. Patent & Trademark Office, owned by the Institute of
`Electrical and Electronics Engineers, Incorporated.
`
`WirelessMAN-OFDM, WirelessMAN-OFDMA, WirelessMAN-SC, and WirelessMAN-SCa, are trademarks owned by the
`Institute of Electrical and Electronics Engineers, Incorporated.
`
`Print:
`PDF:
`
`ISBN 0-7381-4069-4 SH95246
`ISBN 0-7381-4070-8 SS95246
`
`No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without the prior
`written permission of the publisher.
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`4
`
`
`
`IEEE Standards documents are developed within the IEEE Societies and the Standards Coordinating Committees of the
`IEEE Standards Association (IEEE-SA) Standards Board. The IEEE develops its standards through a consensus
`development process, approved by the American National Standards Institute, which brings together volunteers
`representing varied viewpoints and interests to achieve the final product. Volunteers are not necessarily members of the
`Institute and serve without compensation. While the IEEE administers the process and establishes rules to promote fairness
`in the consensus development process, the IEEE does not independently evaluate, test, or verify the accuracy of any of the
`information contained in its standards.
`
`Use of an IEEE Standard is wholly voluntary. The IEEE disclaims liability for any personal injury, property or other
`damage, of any nature whatsoever, whether special, indirect, consequential, or compensatory, directly or indirectly resulting
`from the publication, use of, or reliance upon this, or any other IEEE Standard document.
`
`The IEEE does not warrant or represent the accuracy or content of the material contained herein, and expressly disclaims
`any express or implied warranty, including any implied warranty of merchantability or fitness for a specific purpose, or that
`the use of the material contained herein is free from patent infringement. IEEE Standards documents are supplied “AS IS.”
`
`The existence of an IEEE Standard does not imply that there are no other ways to produce, test, measure, purchase, market,
`or provide other goods and services related to the scope of the IEEE Standard. Furthermore, the viewpoint expressed at the
`time a standard is approved and issued is subject to change brought about through developments in the state of the art and
`comments received from users of the standard. Every IEEE Standard is subjected to review at least every five years for
`revision or reaffirmation. When a document is more than five years old and has not been reaffirmed, it is reasonable to
`conclude that its contents, although still of some value, do not wholly reflect the present state of the art. Users are cautioned
`to check to determine that they have the latest edition of any IEEE Standard.
`
`In publishing and making this document available, the IEEE is not suggesting or rendering professional or other services
`for, or on behalf of, any person or entity. Nor is the IEEE undertaking to perform any duty owed by any other person or
`entity to another. Any person utilizing this, and any other IEEE Standards document, should rely upon the advice of a
`competent professional in determining the exercise of reasonable care in any given circumstances.
`
`Interpretations: Occasionally questions may arise regarding the meaning of portions of standards as they relate to specific
`applications. When the need for interpretations is brought to the attention of IEEE, the Institute will initiate action to prepare
`appropriate responses. Since IEEE Standards represent a consensus of concerned interests, it is important to ensure that any
`interpretation has also received the concurrence of a balance of interests. For this reason, IEEE and the members of its
`societies and Standards Coordinating Committees are not able to provide an instant response to interpretation requests except
`in those cases where the matter has previously received formal consideration. At lectures, symposia, seminars, or educational
`courses, an individual presenting information on IEEE standards shall make it clear that his or her views should be considered
`the personal views of that individual rather than the formal position, explanation, or interpretation of the IEEE.
`
`Comments for revision of IEEE Standards are welcome from any interested party, regardless of membership affiliation with
`IEEE. Suggestions for changes in documents should be in the form of a proposed change of text, together with appropriate
`supporting comments. Comments on standards and requests for interpretations should be addressed to:
`
`Secretary, IEEE-SA Standards Board
`
`445 Hoes Lane
`
`P.O. Box 1331
`
`Piscataway, NJ 08855-1331USA
`NOTE−Attention is called to the possibility that implementation of this standard may require use of subject
`matter covered by patent rights. By publication of this standard, no position is taken with respect to the
`existence or validity of any patent rights in connection therewith. The IEEE shall not be responsible for
`identifying patents for which a license may be required by an IEEE standard or for conducting inquiries into the
`legal validity or scope of those patents that are brought to its attention.
`
`Authorization to photocopy portions of any individual standard for internal or personal use is granted by the Institute of
`Electrical and Electronics Engineers, Inc., provided that the appropriate fee is paid to Copyright Clearance Center. To
`arrange for payment of licensing fee, please contact Copyright Clearance Center, Customer Service, 222 Rosewood Drive,
`Danvers, MA 01923 USA; +1 978 750 8400. Permission to photocopy portions of any individual standard for educational
`classroom use can also be obtained through the Copyright Clearance Center.
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`5
`
`
`
`Introduction
`
`(This introduction is not part of IEEE Std 802.16-2004, IEEE Standard for Local and metropolitan area
`networks—Part 16: Air Interface for Fixed Broadband Wireless Access Systems.)
`
`This standard specifies the air interface of fixed broadband wireless access (BWA) systems supporting
`multimedia services. The medium access control layer (MAC) supports a primarily point-to-multipoint
`architecture, with an optional mesh topology. The MAC is structured to support multiple physical layer (PHY)
`specifications, each suited to a particular operational environment. For operational frequencies from 10–66
`GHz, the WirelessMAN-SC PHY, based on single-carrier modulation, is specified. For frequencies below 11
`GHz, where propagation without a direct line of sight must be accommodated, three alternatives are provided:
`WirelessMAN-OFDM (using orthogonal frequency-division multiplexing), WirelessMAN-OFDMA (using
`orthogonal frequency-division multiple access), and WirelessMAN-SCa (using single-carrier modulation).
`This standards revises and consolidates IEEE Standards 802.16-2001, 802.16a-2003, and 802.16c-2002.
`
`Conformance test methodology
`
`The multipart conformance test documents for IEEE Standard 802.16 by “IEEE Standard 802.16/
`ConformanceXX”. For example, the first part of the conformance specification for IEEE 802.16 is designated
`“IEEE Standard 802.16/Conformance01.”
`
`Patents
`
`Attention is called to the possibility that implementation of this standard may require use of subject matter
`covered by patent rights. By publication of this standard, no position is taken with respect to the existence or
`validity of any patent rights in connection therewith. The IEEE shall not be responsible for identifying
`patents or patent applications for which a license may be required to implement an IEEE standard or for
`conducting inquiries into the legal validity or scope of those patents that are brought to its attention. A patent
`holder or patent applicant has filed a statement of assurance that it will grant licenses under these rights
`without compensation or under reasonable rates and nondiscriminatory, reasonable terms and conditions to
`applicants desiring to obtain such licenses. The IEEE makes no representation as to the reasonableness of
`rates, terms, and conditions of the license agreements offered by patent holders or patent applicants. Further
`information may be obtained from the IEEE Standards Department.
`
`Notice to users
`
`Errata
`
`Errata, if any, for this and all other standards can be accessed at the following URL: http://
`standards.ieee.org/reading/ieee/updates/errata/index.html. Users are encouraged to check this URL for
`errata periodically.
`
`Interpretations
`
`Current interpretations can be accessed at the following URL: http://standards.ieee.org/reading/ieee/interp/
`index.html.
`
`iv
`
`Copyright © 2004 IEEE. All rights reserved.
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`6
`
`
`
`Participants
`
`This document was developed by the IEEE 802.16 Working Group on Broadband Wireless Access, which
`develops the WirelessMAN® Standard for Wireless Metropolitan Area Networks.
`
`IEEE 802.16 Working Group Officers
`Roger B. Marks, Chair
`Kenneth Stanwood, Vice Chair
`Dean Chang, Secretary
`
`Primary development was carried out by the Working Group’s Task Group d:
`
`TGd Officers
`Gordon Antonello, Chair
`Itzik Kitroser, Chief Technical Editor
`Robert Nelson, Assistant Editor
`Brian Eidson, SCa PHY Editorial Contributor
`Nico van Waes, Former Chief Technical Editor
`
`The following members of the IEEE 802.16 Working Group on Broadband Wireless Access participated in
`the Working Group Letter Ballot in which the draft of this standard was prepared and finalized for IEEE
`Ballot:
`
`Aditya Agrawal
`Gordon Antonello
`Reza Arefi
`Eli Avivi
`Dean Chang
`Naftali Chayat
`Rémi Chayer
`Brian Eidson
`Carl Eklund
`Marc Engels
`Avraham Freedman
`G. Jack Garrison
`Marianna Goldhammer
`Zion Hadad
`David Johnston
`Panyuh Joo
`Tal Kaitz
`
`Phil Kelly
`Ofer Kelman
`Brian Kiernan
`Itzik Kitroser
`Changhoi Koo
`Jonathan Labs
`Yigal Leiba
`Barry Lewis
`Lingjie Li
`John Liebetreu
`Lars Lindh
`Hui-Ling Lou
`Heinz Lycklama
`Roger B. Marks
`Russell McKown
`Andrew Middleton
`
`Ronald Murias
`Robert Nelson
`Kamlesh Rath
`Gene Robinson
`Yossi Segal
`Radu Selea
`James Simkins
`Kenneth Stanwood
`Carl Stevenson
`Shawn Taylor
`Rainer Ullmann
`Nico van Waes
`Eyal Verbin
`Arthur Wang
`Lei Wang
`Stanley Wang
`Vladimir Yanover
`
`Copyright © 2004 IEEE. All rights reserved.
`
`v
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`7
`
`
`
`The following members of the IEEE Balloting Committee voted on this standard. Balloters may have voted
`for approval, disapproval, or abstention.
`
`John Adams
`Gordon Antonello
`Eladio Arvelo
`John Barnett
`Dean Chang
`Naftali Chayat
`Aik Chindapol
`Todor Cooklev
`Guru Dutt Dhingra
`Thomas Dineen
`Sourav Dutta
`Brian Eidson
`Avraham Freedman
`Theodore Georgantas
`Andrew Germano
`Mariana Goldhamer
`Zion Hadad
`Andreas Hutter
`Raj Jain
`Tony Jeffree
`David Johnston
`
`Tal Kaitz
`Stuart Kerry
`Brian Kiernan
`Itzik Kitroser
`Jonathan Labs
`Yigal Leiba
`Jan-Ray Liao
`Randolph Little
`Gregory Luri
`Roger B. Marks
`Kevin Marquess
`John McKown
`Russell McKown
`Ingolf Meier
`Steve Methley
`George Miao
`Yinghua Min
`Robert R Nelson
`Michael Newman
`Charles Ngethe
`Roger Pandanda
`
`Subbu Ponnuswamy
`Vikram Punj
`Klaus Rapf
`Durga Satapathy
`Yossi Segal
`Neil Shipp
`Gil Shultz
`Yoram Solomon
`Kenneth Stanwood
`Carl Stevenson
`Shawn Taylor
`Scott Valcourt
`Nico van Waes
`Stanley Wang
`Cor van de Water
`Hung-yu Wei
`Vladimir Yanover
`Huanchun Ye
`Oren Yuen
`Surong Zeng
`
`When the IEEE-SA Standards Board approved this standard on 24 June 2004, it had the following
`membership:
`
`Don Wright, Chair
`Steve M. Mills, Vice Chair
`Judith Gorman, Secretary
`Raymond Hapeman
`Richard J. Holleman
`Richard H. Hulett
`Lowell G. Johnson
`Joseph L. Koepfinger*
`Hermann Koch
`Thomas J. McGean
`
`Daleep C. Mohla
`Paul Nikolich
`T. W. Olsen
`Ronald C. Petersen
`Gary S. Robinson
`Frank Stone
`Malcolm V. Thaden
`Doug Topping
`Joe D. Watson
`
`Chuck Adams
`H. Stephen Berger
`Mark D. Bowman
`Joseph A. Bruder
`Bob Davis
`Roberto de Boisson
`Julian Forster*
`Arnold M. Greenspan
`Mark S. Halpin
`
`*Member Emeritus
`
`Also included are the following nonvoting IEEE-SA Standards Board liaisons:
`
`Satish K. Aggarwal, NRC Representative
`Richard DeBlasio, DOE Representative
`Alan Cookson, NIST Representative
`
`Michelle D. Turner
`IEEE Standards Project Editor
`
`vi
`
`Copyright © 2004 IEEE. All rights reserved.
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`8
`
`
`
`CONTENTS
`
`1.
`
`Overview.............................................................................................................................................. 1
`
`1.1 Scope............................................................................................................................................ 1
`1.2 Purpose......................................................................................................................................... 1
`1.3 Frequency bands .......................................................................................................................... 1
`1.3.1
`10–66 GHz licensed bands .............................................................................................. 1
`1.3.2 Frequencies below 11 GHz.............................................................................................. 2
`1.3.3 License-exempt frequencies below 11 GHz (primarily 5–6 GHz) .................................. 2
`1.3.4 Air interface nomenclature and PHY compliance ........................................................... 2
`1.4 Reference model .......................................................................................................................... 3
`
`2.
`
`3.
`
`4.
`
`5.
`
`References............................................................................................................................................ 5
`
`Definitions ........................................................................................................................................... 7
`
`Abbreviations and acronyms ............................................................................................................. 13
`
`Service-specific CS............................................................................................................................ 17
`
`5.2.4
`
`5.1 ATM CS..................................................................................................................................... 17
`5.1.1 CS service definition...................................................................................................... 17
`5.1.2 Data/Control plane ......................................................................................................... 17
`5.1.2.1
`PDU formats .................................................................................................. 17
`5.1.2.2 Classification ................................................................................................. 18
`5.1.2.3
`PHS ................................................................................................................ 18
`5.1.2.4
`Signaling procedure ....................................................................................... 19
`5.2 Packet CS ................................................................................................................................... 20
`5.2.1 MAC SDU format.......................................................................................................... 21
`5.2.2 Classification ................................................................................................................. 21
`5.2.3 PHS ................................................................................................................................ 23
`5.2.3.1
`PHS operation ................................................................................................ 23
`5.2.3.2
`PHS signaling ................................................................................................ 26
`IEEE Std 802.3/Ethernet-specific part........................................................................... 27
`5.2.4.1
`IEEE Std 802.3/Ethernet CS PDU format ..................................................... 27
`5.2.4.2
`IEEE Std 802.3/Ethernet CS classifiers......................................................... 27
`IEEE Std 802.1Q-1998 virtual local area network (VLAN) specific part..................... 28
`5.2.5.1
`IEEE Std 802.1Q-1998 VLAN CS PDU format............................................ 28
`5.2.5.2
`IEEE Std 802.1Q-1998 CS classifiers ........................................................... 28
`IP specific part ............................................................................................................... 28
`5.2.6.1
`IP CS PDU format ......................................................................................... 28
`5.2.6.2
`IP classifiers................................................................................................... 29
`
`5.2.5
`
`5.2.6
`
`6.
`
`MAC common part sublayer.............................................................................................................. 31
`
`6.1 PMP ........................................................................................................................................... 31
`6.2 Mesh........................................................................................................................................... 32
`6.3 Data/Control plane ..................................................................................................................... 33
`6.3.1 Addressing and connections .......................................................................................... 33
`6.3.1.1
`PMP ............................................................................................................... 33
`6.3.1.2 Mesh............................................................................................................... 34
`6.3.2 MAC PDU formats ........................................................................................................ 35
`
`Copyright © 2004 IEEE. All rights reserved.
`
`vii
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`9
`
`
`
`6.3.2.1 MAC header formats ..................................................................................... 35
`6.3.2.2 MAC subheaders and special payloads ......................................................... 39
`6.3.2.3 MAC Management messages ........................................................................ 42
`6.3.3 Construction and transmission of MAC PDUs............................................................ 121
`6.3.3.1 Conventions ................................................................................................. 121
`6.3.3.2 Concatenation .............................................................................................. 123
`6.3.3.3
`Fragmentation .............................................................................................. 123
`6.3.3.4
`Packing......................................................................................................... 124
`6.3.3.5 CRC calculation ........................................................................................... 127
`6.3.3.6
`Encryption of MAC PDUs........................................................................... 127
`6.3.3.7
`Padding ........................................................................................................ 128
`6.3.4 ARQ mechanism.......................................................................................................... 128
`6.3.4.1 ARQ Block Usage ....................................................................................... 128
`6.3.4.2 ARQ Feedback IE format ............................................................................ 130
`6.3.4.3 ARQ parameters .......................................................................................... 132
`6.3.4.4 ARQ procedures .......................................................................................... 132
`6.3.4.5 ARQ-enabled connection setup and negotiation ......................................... 133
`6.3.4.6 ARQ operation............................................................................................. 133
`6.3.5 Scheduling services...................................................................................................... 138
`6.3.5.1 Outbound transmission scheduling .............................................................. 139
`6.3.5.2 Uplink request/grant scheduling .................................................................. 139
`6.3.6 Bandwidth allocation and request mechanisms ........................................................... 141
`6.3.6.1 Requests ....................................................................................................... 141
`6.3.6.2 Grants........................................................................................................... 142
`6.3.6.3
`Polling.......................................................................................................... 142
`6.3.6.4 Contention-based focused Bandwidth Requests for WirelessMAN-
`OFDM.......................................................................................................... 147
`6.3.6.5 Contention-based CDMA Bandwidth Requests for WirelessMAN-
`OFDMA ....................................................................................................... 147
`6.3.6.6 Optional Mesh topology support ................................................................. 148
`6.3.7 MAC support of PHY .................................................................................................. 151
`6.3.7.1
`FDD ............................................................................................................. 151
`6.3.7.2
`TDD ............................................................................................................. 152
`6.3.7.3 DL-MAP ...................................................................................................... 152
`6.3.7.4 UL-MAP ...................................................................................................... 152
`6.3.7.5 Map relevance and synchronization ............................................................ 154
`6.3.7.6 Optional MAC AAS Support of WirelessMAN-SCa, OFDM, and
`OFDMA ....................................................................................................... 162
`6.3.8 Contention resolution................................................................................................... 165
`6.3.8.1
`Transmission opportunities.......................................................................... 167
`6.3.9 Network entry and initialization .................................................................................. 167
`6.3.9.1
`Scanning and synchronization to the downlink ........................................... 169
`6.3.9.2 Obtain downlink parameters........................................................................ 169
`6.3.9.3 Obtain uplink parameters............................................................................. 171
`6.3.9.4 Message flows during scanning and uplink parameter acquisition ............. 173
`6.3.9.5
`Initial ranging and automatic adjustments ................................................... 174
`6.3.9.6 Ranging parameter adjustment .................................................................... 178
`6.3.9.7 Negotiate basic capabilities ......................................................................... 182
`6.3.9.8
`SS authorization and key exchange ............................................................. 184
`6.3.9.9 Registration.................................................................................................. 184
`6.3.9.10 Establish IP connectivity ............................................................................. 187
`6.3.9.11 Establish time of day.................................................................................... 187
`6.3.9.12 Transfer operational parameters .................................................................. 188
`6.3.9.13 Establish provisioned connections............................................................... 190
`
`viii
`
`Copyright © 2004 IEEE. All rights reserved.
`
`Authorized licensed use limited to: Fish & Richardson. Downloaded on March 25,2016 at 14:06:38 UTC from IEEE Xplore. Restrictions apply.
`
`10
`
`
`
`6.3.9.14 Network Entry and synchronization in Mesh mode .................................... 190
`6.3.10 Ranging ........................................................................................................................ 199
`6.3.10.1 Downlink burst profile management ........................................................... 199
`6.3.10.2 Uplink periodic ranging ............................................................................... 202
`6.3.10.3 OFDMA-based ranging ............................................................................... 204
`6.3.11 Update of channel descriptors...................................................................................... 213
`6.3.12 Assigning SSs to multicast groups............................................................................... 215
`6.3.13 Establishment of multicast connections....................................................................... 218
`6.3.14 QoS .............................................................................................................................. 218
`6.3.14.1 Theory of operation ..................................................................................... 218
`6.3.14.2 Service flows................................................................................................ 219
`6.3.14.3 Object model................................................................................................ 221
`6.3.14.4 Service classes ............................................................................................. 222
`6.3.14.5 Authorization ............................................................................................... 222
`6.3.14.6 Types of service flows ................................................................................. 223
`6.3.14.7 Service Flow Creation ................................................................................. 224
`6.3.14.8 Dynamic service flow modification and deletion ........................................ 226
`6.3.14.9 Service flow management............................................................................ 226
`6.3.15 DFS for license-exempt operation ............................................................................... 263
`6.3.15.1 Introduction.................................................................................................. 263
`6.3.15.2 Testing channels for primary users .............................................................. 263
`6.3.15.3 Discontinuing operations after detecting primary users .............................. 264
`6.3.15.4 Detecting primary users ............................................................................... 264
`6.3.15.5 Scheduling for channel testing..................................................................... 264
`6.3.15.6 Requesting and reporting of measurements................................................. 264
`6.3.15.7 Selecting and advertising a new channel ..................................................... 265
`6.3.16 MAC Management message tunneling in Mesh Mode ............................................... 265
`6.3.17 MAC support for H-ARQ ............................................................................................ 266
`6.3.17.1 Subpacket generation................................................................................... 268
`6.3.17.2 DL/UL ACK/NAK signaling....................................................................... 268
`6.3.17.3 H-ARQ parameter signaling ........................................................................ 268
`6.3.17.4 CQICH Operations ...................................................................................... 268
`
`7.
`
`Security sublayer.............................................................................................................................. 271
`
`7.1 Architecture ............................................................................................................................. 271
`7.1.1 Packet data encryption ................................................................................................. 271
`7.1.2 Key management protocol ........................................................................................... 271
`7.1.3 Security Associations................................................................................................... 272
`7.1.4 Mapping of connections to SAs................................................................................... 273
`7.1.5 Cryptographic Suite ..................................................................................................... 273
`7.2 PKM protocol .......................................................................................................................... 273
`7.2.1 SS authorization and AK exchange overview ......