IEEE 802.21d-2015
$85.58
IEEE Standard for Local and metropolitan area networks — Part 21: Media Independent Handover Services Amendment 4: Multicast Group Management
Published By | Publication Date | Number of Pages |
IEEE | 2015 |
Amendment Standard – Superseded. Mechanisms to enable multicast group management for MIH services is specified in this standard. The specification defines management primitives and messages that enable a user to join, leave or update group membership and security mechanisms to protect multicast communication.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 802.21d™-2015 Front cover |
3 | Title page |
5 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
8 | Participants |
10 | Introduction |
11 | Contents |
13 | IMPORTANT NOTICE |
14 | 2. Normative references 3. Definitions |
15 | 4. Abbreviations and acronyms |
16 | 5. General architecture 5.1 Introduction 5.1.12 Group communications |
17 | 6. MIHF services 6.2 Service management 6.2.1 General 6.2.2 Service management primitives |
18 | 6.2.7 MIH group configuration and manipulation 6.4 Media independent command service 6.4.1 Command service flow model 7. Service access points (SAPs) and primitives 7.2 SAPs 7.2.3 Media Independent SAP: MIH_SAP |
19 | 7.4 MIH_SAP primitives 7.4.2 MIH_Register |
21 | 7.4.4 MIH_Event_Subscribe 7.4.5 MIH_Event_Unsubscribe |
22 | 7.4.14 MIH_Link_Get_Parameters 7.4.15 MIH_Link_Configure_Thresholds |
23 | 7.4.16 MIH_Link_Actions |
24 | 7.4.21 MIH_Net_HO_Commit |
29 | 7.4.35 MIH_MN_Group_Manipulate |
32 | 7.4.36 MIH_Net_Group_Manipulate |
36 | 7.4.37 MIH_Pull_Certificate |
38 | 7.4.38 MIH_Push_Certificate |
41 | 7.4.39 MIH_Revoke_Certificate |
44 | 8. Media independent handover protocol 8.2 MIH protocol description 8.2.2 MIH protocol acknowledgement service |
46 | 8.2.3 MIH protocol transaction state diagram |
47 | 8.2.4 Other considerations 8.3 MIH protocol identifiers |
49 | 8.4 MIH protocol frame format 8.4.2 Protected MIH protocol frame format |
51 | 8.6 MIH protocol messages 8.6.1 MIH messages for service management |
62 | 9. MIH protocol protection |
63 | 9.5.1 Key distribution for multicast MIH message protection |
66 | 9.5.2 GKB generation by the complete subtree method |
78 | 9.5.3 Secure group manipulation procedures |
89 | 9.6 Group addressed message protection |
90 | 9.6.2 Multicast message protection |
91 | 9.6.3 Signature and credential management |
94 | 9.6.4 Group ciphersuites |
95 | 9.6.5 Group key distribution Ciphersuites |
96 | Annex A (informative) Bibliography |
97 | Annex F (normative) Data type definition F.3 Derived data types |
103 | Annex L (normative) MIH protocol message code assignments |
104 | Annex M (normative) Protocol implementation conformance statement (PICS) proforma M.8 PICS proforma tables |
105 | Annex T (informative) Examples of fragmented GKB operation |
107 | Annex U (normative) Use of Bloom Filter for certificate revocation U.1 General U.2 Calculating Bloom Filter output for revoked certificates U.3 Certificate revocation check U.4 False positive case |
110 | Back cover |