[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

stds-802-16: SYSREQ COMMENT



Attached are a few comments.

[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Tony

[Starting Page #]
1

[Starting Line #]
35

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
E

[Detailed Description of Proposed Insertion, Deletion, Change]
Change "These bearer services impact directly" to "This system interoperability and compatibility impacts directly on"

[Reason for Edit]
more accurate terminology.

[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Tony

[Starting Page #]
17

[Starting Line #]
6

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Delete "But 802.16 protocols should allow... " to and including line 14.

[Reason for Edit]
These lines add no value to the 802.16 system requirements.
[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Tony

[Starting Page #]
17

[Starting Line #]
31

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
E

[Detailed Description of Proposed Insertion, Deletion, Change]
Change "(see section 5.4)" to "(see section 5.5)".

[Reason for Edit]
error in reference.
[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Anthony

[Starting Page #]
20

[Starting Line #]
15

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Insert "- frequency reuse
	- antenna sectoring patterns
	- digital baseband filtering
	- type of modulation
	- RF equipment
	- back off power requirements
	- traffic statistics/profiles
	- average fade rate of the channel
	- accurate rain fade prediction model"

[Reason for Edit]
to create more complete list.
[Submitter's Last Name] 
Guillemette

[Submitter's First Name]
Phil

[Starting Page #]
23

[Starting Line #]
12

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Insert "Resource Management"

[Reason for Edit]
Resource management was forgotten in the list of management functions.
[Submitter's Last Name] 
Guillemette

[Submitter's First Name]
Phil

[Starting Page #]
23

[Starting Line #]
30

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
E

[Detailed Description of Proposed Insertion, Deletion, Change]
Delete "The 802.16 working group may consider ... security specification [68][3]."

[Reason for Edit]
Serves no purpose in terms of system requirements.
[Submitter's Last Name] 
Guillemette

[Submitter's First Name]
Phil

[Starting Page #]
23

[Starting Line #]
30

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Delete lines 35 through 42.

[Reason for Edit]
The security requirements that are "mandatory" and those that "optional" will be highlighted in 8.1 subsections.
[Submitter's Last Name] 
Guillemette

[Submitter's First Name]
Phil

[Starting Page #]
23

[Starting Line #]
31

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Insert after 1st sentence, "Some procedures are mandatory for 802.16 compliance and others are optional.  Whether a procedure is mandatory or optional will be specified in the 802.16 interoperability standard."

[Reason for Edit]
This is just to highlight that not all security procedures are mandatory.
[Submitter's Last Name] 
Guillemette

[Submitter's First Name]
Phil

[Starting Page #]
24

[Starting Line #]
7

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]

Change lines 7 through 10 to 

"There are two levels of authentication for an 802.16 network.  The first level of authentication is when the STS authenticates itself with the BTS at the STS's network entry.  This initial authentication must be very strong in order to prevent 'enemy' STS from entering the network or an 'enemy' BTS from emulating a real BTS.  Once the initial authentication at this level is complete, future authentication at this level can be a little more relaxed.  This level of authentication must be provided by the 802.16 MAC layer.

The second level of authentication is between the subscriber and the BWA network.  This may or may not be the responsibility of the 802.16 protocols.  It may be handled by higher layer protocols.

An additional level of authentication may exist between the other two.  This additional layer is the authentication of the subscriber with the STS.  This is beyond the scope of the 802.16 protocol."

[Reason for Edit]
This change is to reflect the different levels of authentication.
[Submitter's Last Name] 
Guillemette

[Submitter's First Name]
Phil

[Starting Page #]
24

[Starting Line #]
17

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]

Delete lines 17 through 31.

[Reason for Edit]
Authorisation is directly related to authentication and therefore does not require to be addressed seperately.
[Submitter's Last Name] 
Guillemette

[Submitter's First Name]
Phil

[Starting Page #]
24

[Starting Line #]
38

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]

Delete "Public-key-based mechnisms are in wide use today."

[Reason for Edit]
Adds no value.
[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Tony

[Starting Page #]
5

[Starting Line #]
6

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
E

[Detailed Description of Proposed Insertion, Deletion, Change]
Insert "Residential" into figure 2-1

[Reason for Edit]
As it is today, the price points do not allow for an effective cost margin however, in the future, the price points should allow the residential market to be accessed.
[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Anthony

[Starting Page #]
6

[Starting Line #]
11

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Delete "I. Frigui: delete this paragraph"

[Reason for Edit]
We should not remove the ability to efficiently transport digital audio/video streams to subscribers.  Otherwise we may be limiting the future applications of the 802.16 protocols and hinder their potential for success.
[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Anthony

[Starting Page #]
6

[Starting Line #]
11

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Delete "I. Frigui: delete this paragraph"

[Reason for Edit]
We should not remove the ability to efficiently transport digital audio/video streams to subscribers.  Otherwise we may be limiting the future applications of the 802.16 protocols and hinder their potential for success.
[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Tony

[Starting Page #]
5

[Starting Line #]
6

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
E

[Detailed Description of Proposed Insertion, Deletion, Change]
Insert "Residential" into figure 2-1

[Reason for Edit]
As it is today, the price points do not allow for an effective cost margin however, in the future, the price points should allow the residential market to be accessed.
[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Tony

[Starting Page #]
6

[Starting Line #]
24

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
E

[Detailed Description of Proposed Insertion, Deletion, Change]
Delete "However, since an 802.16 network may ... radio is a dubious proposition."

[Reason for Edit]
This sentence does not really belong here.  It makes a statement that is true because of today's technology but will not hold true once technology advances.  Also the reference to POTS should not be there.
[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Tony

[Starting Page #]
7

[Starting Line #]
14

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Delete lines 14 through 32 and lines 2 through 5 on page 8.

[Reason for Edit]
The properties of telephony services need not be defined within the scope of this document, instead refer to 2.2.2.2.  This section should refer to bandwidth, delay and reliability only.

[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Tony

[Starting Page #]
8

[Starting Line #]
31

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Delete "Whether ATM will dominate the future ... may someday compete with ATM."

[Reason for Edit]
This sentence has no relenance to the scope of this document and is purely speculative in nature.

[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Tony

[Starting Page #]
11

[Starting Line #]
18

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Delete "it is expected that the maximum usable range of 802.16 radios falls in the region of 5 to 15 Km."

[Reason for Edit]
More realistic terrestrial applications are in teh 1-3 Km range when considering such factors as QoS adn appropriate SNR that maintains QoS and BER.  Working group should derive appropriate propagation model.

[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Tony

[Starting Page #]
17

[Starting Line #]
1

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Delete figure 5-1.

[Reason for Edit]
As the pico cell network is defined in figure 5-1, the complexity imposed on frequency planning, co-channel and adjacent frequency interference, impose a high penalty on the network management system.  this in turn makes the end-to-end system more complex but would be suited for stand alone campus environments.  Perhaps the pico cell network can be incorporated as an extension of the standard in the future.
[Submitter's Last Name] 
Mascioli

[Submitter's First Name]
Tony

[Starting Page #]
17

[Starting Line #]
5

[(T)echnical for Content-Related Material; (E)ditorial for typos, 
grammar, etc.]
T

[Detailed Description of Proposed Insertion, Deletion, Change]
Change "1-50 Mbps" to "2-155 Mbps"

[Reason for Edit]
This change is for consistency with the remainder of the document.