ImageVerifierCode 换一换
格式:DOCX , 页数:28 ,大小:68.74KB ,
资源ID:21828316      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/21828316.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(22100175040000clause67commentresolutionford4文档格式.docx)为本站会员(b****7)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

22100175040000clause67commentresolutionford4文档格式.docx

1、This document contains resolutions for the following comments:77, 78, 84, 94, 128, 134, 136, 141, 142, 145, 165, 259 Text modification for comment resolution is indicated in bold and italics encapsulated in square brackets. For some comments there is more than one modification required.R0 is an amen

2、dment to resolutions to comments against D4, that are updated against the numbering of the D5 draft (editorial instructions in R1 are against numbering/pagination in D5), in addition to resolution for a couple of new comments in Clause 7.R1-R3 detail comment resolution modifications discussed in the

3、 November 2010 plenary.Notice: This document has been prepared to assist IEEE 802.22. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contr

4、ibutor(s) reserve(s) the right to add, amend or withdraw material contained herein.Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyr

5、ight in the IEEEs name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEEs sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contrib

6、ution may be made public by IEEE 802.22.Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures , including the statement IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from t

7、he patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard. Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the develo

8、pment process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair Apurva Mody as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard

9、being developed within the IEEE 802.22 Working Group. If you have questions, contact the IEEE Patent Committee Administrator at .Comment 77/78/84Several comments are related to consolidating the fragmentation/packing subheader. The resolution to this comment is provided to facilitate discussion of t

10、he design of the new subheader. The other comments related to this will then be resolved in turn.There are two major modifications to the Fragmentation/Packing subheader. One, is the consolidation of the two subheaders. Two, it is removal for support of two different counting methods for counting fr

11、agments. We have two methods for counting fragments, one used for when ARQ is applied and when when ARQ isnt applied. It is of the opinion of the MAC ad-hoc chair that we dont need two different methods. Referring back to 802.16-2009, the 3bit counting method is optional. So, the recommendation is t

12、o remove it. We should note that if a Fragmentation/Packing subheader is added to a PDU mapped to a connection using ARQ, the then Type field Bit2 (Extended Type) shall be set to 1.Also, note that the ARQ feedback subheader is independent of the fragmentation/packing process. If purpose of new Fragm

13、entation/Packing, is set to packing (i.e. set to 1), then the ARQ Feedback subheader is the 1st packed item. This is stated in 6.8.1.2.4.modify Section 6.8.1.2.2 as follows-Start of text Modification-6.8.1.2.2 Fragmentation/Packing SubheaderTable 6 Fragmentation/Packing subheader formatSyntaxSizeNot

14、esFragmentation_Subheader_Format() Purpose1 bit0 = Fragmentation subheader1 = Packing subheaderFC2 bitsIndicates the fragmentation state of the payload:00 = no fragmentation01 = last fragment10 = first fragment11 = continuing (middle) fragmentif (ARQ-enabled Connection) BSN10 bitsSequence number of

15、the first block in the current SDU fragmentElse FSNSequence number of the current SDU fragment. This field increments by one (modulo 1024) for each fragment, including unfragmented SDUs. If (Purpose = 1) Length11 bitsLength of SDU fragment being packed Else/if (Purpose = 0) Reserved3 bits -End of te

16、xt Modification-modify Table 110, pg 87 line 1 as followsElement IDLength(bytes)ValueScope21Bit 0: Ability to receive requests piggybacked with data Bits 1-7: reserved (set to zero)CBC-REQ, CBC-RSPComment 134This comment reflects reformatting some tables associated with the configuration of SCM rela

17、ted message parameters. modify Tables 166-173 as followsTable 166 SCM EAP Start - Message AttributesKey Sequence Number4 bitsAK Sequence NumberTable 167 SCM EAP Transfer - Message AttributesLength of EAP Payload16 bitsLength of EAP Payload (in octets)EAP PayloadVariableContains EAP authentication Da

18、taTable 168 SCM Key-Request attributesAK sequence numberSAIDSecurity association identifier - GSAID for multicast or broadcast serviceGroup Key Indicator0 = this key request is for a TEK1 = this request is for a GTEK, only applicable if SAID refers to a GSA.CPE Random64 bitsA 64 bit random number ge

19、nerated in the CPE.Table 169 SCM Key-Reply attributesKey Sequence Number AK sequence number SAID Security association identifier - GSAID for multicast or broadcast service. Older TEK/GTEK 128 bitsOlder generation TEK/GTEK relevant to SAID/GSAID Older TEK/GTEK Sequence NumberSequence Number for older

20、 generation of TEK/GTEK. This maps to the value EKS field is set to in GMH of PDU encrypted with this TEK/GTEK.Remaing Lifetime for Older TEK/GTEK24 bitsRemaining time for older TEK/GTEK in units of 10ms frames.Newer TEK/GTEK Newer generation TEK/GTEK, relevant to SAID/ GSAID. New TEK/GTEK Sequence

21、Number Sequence Number for newer generation of TEK/GTEK. This maps to the value EKS field is set to in GMH of PDU encrypted with this TEK/GTEK.Remaing Lifetime for New TEK/GTEKRemainging time for older TEK/GTEK in units of 10ms frames.CPE Random The same random number included in the SCM Key Request

22、 message BS Random Random # generated by the BSTable 170 SCM Key-Reject attributesSecurity association identifier Confirmation Code 8 bitsError code (see 6.10.24) identifying reason for rejection of the SCM Key-Request message.A same random number included in the SCM Key Request message Table 171 SC

23、M GSA-Add attributesMulticast SID9 bitsSID of multicast groupSAID for GSA applied to the mutlicast groupCryptographic Suite for GTEK application & transportCryptographic suite that controls how GTEK is applied and transported to CPE. This can be either 0x03 or 0x04 (see Table 194).Cryptographic Suit

24、e for GKEK/GTEK GenerationCryptographic suite that controls how GKEK & GTEK is generated at BS. This can be either 0x06 or 0x07 (see Table 194).GKEK GKEK for GSA used to protect GTEK when transported to CPE in Key-Reply. This field is protected with the KEK associated with the AK.Remainging GKEK Lif

25、etimeRemaining lifetime in which GKEK can be used to protect GTEKs in SCM Key-Reply messages. In units of 10ms frames.Table 172 SCM GSA-Remove attributesNumber of SAID“N” Number of SAIDs for GSA (GSAIDs) that are to be removedSAID(s)N * 16 bitsList of SAIDs for GSAs that are to be removedTable 173 S

26、CM TEK-Invalid attributesSecurity Association Identifier Error code (see 6.10.24) identifying reason for SCM TEK-Invalid message. Comment 136This comment reflects harmonizing the Message Response Code numbers in Table 176 and Table 79. A new message response code table is propose to be moved to the end of Section 6.10.remove the text on lines 11-12 and Table 78 on pg 73remove section 6.10.21.9insert new section at the end of sec

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1