Note: Page numbers followed by f indicate figures and t indicate tables.


Access class barring (ACB) 110, 111f
Access stratum (AS) 
extended DRX cycle 274–275
power-saving state 275–278
Adaptive Modulation and Coding (AMC) mechanism 112
Ad hoc application level security model 231
Aggregated traffic models 138–139, 142–144
Alliance for Telecommunications Industry Solutions (ATIS) 18
Application security 244
Application-specific encryption 260
Automating building management 191–192


Bespoke body 105–106
BETaaS project 19
Billing and provisioning interfaces 253
Bootstrapping 237–242 See also Security bootstrap
Broadcast multicast/service center (BMSC) 259–260
Business implications, ...

Get Machine-to-machine (M2M) Communications now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.