{"id":398006,"date":"2024-10-20T04:33:22","date_gmt":"2024-10-20T04:33:22","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-21d-2015\/"},"modified":"2024-10-26T08:21:36","modified_gmt":"2024-10-26T08:21:36","slug":"ieee-802-21d-2015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-21d-2015\/","title":{"rendered":"IEEE 802.21d-2015"},"content":{"rendered":"
Amendment Standard – Superseded. Mechanisms to enable multicast group management for MIH services is specified in this standard. The specification defines management primitives and messages that enable a user to join, leave or update group membership and security mechanisms to protect multicast communication.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 802.21d\u2122-2015 Front cover <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | IMPORTANT NOTICE <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 2. Normative references 3. Definitions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4. Abbreviations and acronyms <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5. General architecture 5.1 Introduction 5.1.12 Group communications <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6. MIHF services 6.2 Service management 6.2.1 General 6.2.2 Service management primitives <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.2.7 MIH group configuration and manipulation 6.4 Media independent command service 6.4.1 Command service flow model 7. Service access points (SAPs) and primitives 7.2 SAPs 7.2.3 Media Independent SAP: MIH_SAP <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.4 MIH_SAP primitives 7.4.2 MIH_Register <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7.4.4 MIH_Event_Subscribe 7.4.5 MIH_Event_Unsubscribe <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.4.14 MIH_Link_Get_Parameters 7.4.15 MIH_Link_Configure_Thresholds <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7.4.16 MIH_Link_Actions <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.4.21 MIH_Net_HO_Commit <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.4.35 MIH_MN_Group_Manipulate <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.4.36 MIH_Net_Group_Manipulate <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.4.37 MIH_Pull_Certificate <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 7.4.38 MIH_Push_Certificate <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 7.4.39 MIH_Revoke_Certificate <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 8. Media independent handover protocol 8.2 MIH protocol description 8.2.2 MIH protocol acknowledgement service <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 8.2.3 MIH protocol transaction state diagram <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 8.2.4 Other considerations 8.3 MIH protocol identifiers <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 8.4 MIH protocol frame format 8.4.2 Protected MIH protocol frame format <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 8.6 MIH protocol messages 8.6.1 MIH messages for service management <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 9. MIH protocol protection <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 9.5.1 Key distribution for multicast MIH message protection <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 9.5.2 GKB generation by the complete subtree method <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 9.5.3 Secure group manipulation procedures <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 9.6 Group addressed message protection <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 9.6.2 Multicast message protection <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 9.6.3 Signature and credential management <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 9.6.4 Group ciphersuites <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 9.6.5 Group key distribution Ciphersuites <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | Annex A (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | Annex F (normative) Data type definition F.3 Derived data types <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | Annex L (normative) MIH protocol message code assignments <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Annex M (normative) Protocol implementation conformance statement (PICS) proforma M.8 PICS proforma tables <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | Annex T (informative) Examples of fragmented GKB operation <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | Annex U (normative) Use of Bloom Filter for certificate revocation U.1 General U.2 Calculating Bloom Filter output for revoked certificates U.3 Certificate revocation check U.4 False positive case <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Local and metropolitan area networks — Part 21: Media Independent Handover Services Amendment 4: Multicast Group Management<\/b><\/p>\n |