You are on page 1of 2

WiMAX has envisioned four potency-related usages for the scenarios:

1. Nomadic scenarios − From a diverse point of attachment every customer is granted to

use a decided service provider station and recommunicate.

2. Portable scenarios–With the expectation of a best effort transfer every nomadic access

is given to a mobile device.

3. Straight forward potency Scenarios − During handoff every service provider may

advance at rates up to 60 kmph with brief breaks in time duration of 1 sec.

4. Full potency Scenarios − < 50 ms latency and less than 1% packet loss is assisted by

120 kmph potency and smooth handoff .

To assist portability to full potency over the time and then evolve fixed and nomadic

applications there is a possibility that WiMAX will firstly be implemented. To assist potency

administration the IEEE 802.16e-2005 specification states a construction that in particular

specification states for maintain and observe user stations and signaling mechanisms as it

moves from one stop to another.

WiMAX security hazards

While Developing any Security system it is required to consider all the approaches and

details by which security of the system could be at risk and build necessary security

measures.

Various risk to WiMAX Security are mentioned below

Man-in-the-middle: This type of security issue occurs when a set up station imitates a base

station, only to a supporter, or via multimode acting across supporter and the base stop.
Secrecy break: This type of violation takes the form of the person who violates capturing

customer details transmitted over the modes of the connection. These packets which contain

details of customer details can be retracted later.

Theft of services: This occurs when unauthorized customers are able to access the services.

Denial of Service (physical): Deprecation of the network performance by physically breaking

the physical modes of network.

Denial of Service (Protocol): This type of service includes overloading of network that is

creation of DOS on the systems. This is done by creation of new traffic or modification of old

traffic. This also happens when important pages of the websites are targeted by many users

again and again creating request overload which results in slow response in network.

You might also like