IEEE MAC and PHY Specifications for Broadband WMAN

Size: px
Start display at page:

Download "IEEE MAC and PHY Specifications for Broadband WMAN"

Transcription

1 IEEE MAC and PHY Specifications for Broadband WMAN 中央大學通訊系許獻聰 edu.tw TKU HSNL WMAN - 1

2 Resources Part Source : Roger B. Marks, National Institute of Standards and Technology Boulder, Colorado, USA Chair, IEEE Working Group TKU HSNL WMAN - 2

3 Broadband Access to Buildings Metro Ethernet Wireless Ethernet First/Last mile access Fast local connection to network Target Applications (similar as DSL and CableModem)» Data» Voice» Video distribution» Real-time videoconferencing High-capacity cable/fiber to every user is expensive Network operators demand it Business and residential customers demand it TKU HSNL WMAN - 3

4 Wireless Metropolitan Area Network TKU HSNL WMAN - 4

5 Application TKU HSNL WMAN - 5

6 Features (1/2) Broad bandwidth Up to Mbit/s in 28 MHz channel (in GHz) (UWB?)» 32Mb/s Mb/s» 20/25/28MHz per channel line of sight is required and multipath is negligible (short wavelength). Supports multiple services simultaneously with full QoS Efficiently transport IPv4, IPv6, ATM, Ethernet, etc. Wireless transportation system. Bandwidth on demand (frame by frame) Similar to HIPERLAN Type II (frame-based protocol) Centralized control MAC designed for efficient used of spectrum Comprehensive, modern, and extensible security ()tensions to mobility are coming next. TKU HSNL WMAN - 6

7 Features (2/2) Supports multiple frequency allocations from 2-66 GHz in (10-66GHz) and a (2-11GHz) Single carrier (SC) for line-of of-sight situations OFDM and OFDMA for non-line line-of-sight situations» OFDMA : orthogonal frequency division multiple access Access schemes: TDD (time division duplex) and FDD (frequency division duplex) Link adaptation: Adaptive modulation and coding Point-to-multipoint (star) topology and mesh network extension Support for adaptive antennas and space-time coding (in a) Extensions to mobility. (IEEE e started from Jan. 2003) ()tensions to mobility are coming next. TKU HSNL WMAN - 7

8 IEEE Standard and amendments Fixed Broadband Wireless Access (FBWA) Systems Air Interface (MAC and PHY) Band 10-66GHz (ranges 1/2/3 : GHz/ GHz) 25/28MHz per channel 23.5GHz/ GHz/43.5- line-of of-sight (LOS) requirement One PHY» WirelessMAN-SC (Single Sarrier) Point-to to-multipoint Topology (Star) TDD/FDD with burst profile option (depending on SNR) Completed in October 2001 Published in April 2002 Followup interoperability projects c (Profiles): published in Jan (PICS): in ballot; completion expected Mar 2003» PICS : Protocol Implementation Conformance Statement ( 10-66GHz Coexistence of FBWA Systems )» Focus on 23.5 to 43.5 GHz (local multipoint distribution service (LMDS), millimeter wave, etc.,)» WiMAX submitted proposal in Jan 2003 TKU HSNL WMAN - 8

9 IEEE a Standard Medium Access Control Modifications and Additional Physical Layer Specifications for 2 11 GHz Band 2-11GHz Non-line line-of-sight (NLOS) requirement and Multi-path issue Near-LOS License-exempt exempt band GHz (802.11a and HIPERLAN II) Three PHYs» WirelessMAN-SC2 (single carrier)» WirelessMAN-OFDM (multiple carriers with 256-point transform) is mandatory for license exempt bands» WirelessMAN-OFDMA (multiple carriers with 2048-point transform) Multiple access is provided by addressing a subset of the multiple carriers to individual receivers. Advanced Antenna Systems (AAS) is optional Add mesh network topology (MAC) provide automatic repeat request (ARQ) retransmission (MAC) Completed in November 2002 and Approved April 2003 IEEE e (mobility) first meeting in 2004 D5 IEEE a (coexistence including 2-11GHz) TKU HSNL WMAN - 9

10 IEEE a Standard license-exempt bands below 11 GHz The PHY and MAC introduce mechanisms such as dynamic frequency selection (DFS) to detect and avoid interference. TKU HSNL WMAN - 10

11 IEEE Standard IEEE Std Air Interface for Fixed Broadband Wireless Access Systems - IEEE d Approved 24 June 2004 This standard revises and consolidates IEEE Std , IEEE Std a -2003, and IEEE Std c IEEE Std f MIB IEEE Std g System/resource/handover Management Interoperability TKU HSNL WMAN - 11

12 IEEE e Enhance IEEE PHY is similar to Focus on 2-6GHz MHZ per channel Enhance OFDMA PHY Data rate» Supports 2048-point, 1024-point, 512-point and 128-point FFT 10Mhz/channel, OFDM-64QAM provides 30Mbps Max. moving speed : 120km/h Range : several Kms Chip appears in 2006 vs. IEEE Below 3.5GHz Max. moving speed : 250Km/h (high-speed train) vs. 3G TKU HSNL WMAN - 12

13 Wimax Evolution Source : Siemens, 2004 TKU HSNL WMAN - 13

14 WiMAX Forum WiMAX (Worldwide Interoperability for Microwave Access) Like WECA in IEEE WLAN Mission: To promote deployment of BWA by using a global standard and certifying interoperability of products and technologies. Principles: Support IEEE x 2-66 GHz (16a : 2-11 GHz and 16 : 10-66GHz) Propose access profiles for the IEEE standard Guarantee known interoperability level Open for everyone to participate Developing & submitting baseline test specs TKU HSNL WMAN - 14

15 Point-to-Multipoint configuration Two components Subscriber Stations (SSs( SSs)» SS typically serves a building (business or residence) Base Station (BS)» connected to public networks» BS serves Subscriber Stations» provide SS with first-mile(or last mile) access to public networks Compared to a Wireless LAN Multimedia QoS not only contention-based connection-oriented Many more users Much higher data rates Much longer distances TKU HSNL WMAN - 15

16 Mesh Topology (defined in a) Dynamic topology Self-organizing network More complicated TKU HSNL WMAN - 16

17 IEEE vs. ETSI Frequent communications between WG and ETSI (European Telecom Standards Institute) ETSI HIPERACCESS Above 11 GHz (outdoor, 11-40GHz, 5Km, 25Mb/s) ETSI began first, but IEEE finished first has encouraged harmonization ETSI HIPERMAN Below 11 GHz (outdoor) IEEE began first Healthy cooperation Harmonized with a OFDM HIPERMAN ETSI HIPERLAN 5GHz (indoor/outdoor) 6-54Mb/s Irrelative with ETSI HIPERLINK 17GHz (150m, point-2-point) point) 155Mb/s (OC3) Irrelative with TKU HSNL WMAN - 17

18 MAC Overview Connection-oriented oriented Supports difficult user environments High bandwidth, hundreds of users per channel For variable Continuous and burst traffic Very efficient use of spectrum Protocol-Independent core (ATM, IP, Ethernet, ) Balances between stability of contentionless and efficiency of contention-based operation Negotiate the burst profile between sender and receiver Flexible QoS offerings CBR, rt-vbr, nrt-vbr, BE, with granularity within classes Supports multiple PHYs TKU HSNL WMAN - 18

19 Protocol Stack Packet convergence Sublayer (PCS) ATM packet SSCS (security sublayer ) TKU HSNL WMAN - 19

20 Service Specific Convergence Sublayer (SSCS) The CS performs the following functions: accepting higher-layer PDUs from the higher layer performing classification of higher-layer PDUs processing (if required) the higher-layer PDUs based on the classification delivering CS PDUs to the appropriate MAC SAP receiving CS PDUs from the peer entity Currently, two CS specifications are provided Asyncronous Transfer Mode (ATM) CS Packet CS» Such as IP, PPP, Ethernet, etc., Other CSs may be specified in the future. TKU HSNL WMAN - 20

21 Packet Convergence Sublayer (PCS) Packet convergence sublayer (PCS) The packet CS resides on top of the Common Part Sublayer (CPS) The PCS performs the following functions, utilizing the services of the MAC sublayer: a) Classification of the higher-layer protocol PDU into the appropriate connection b) Suppression of payload header information (optional) c) Delivery of the resulting CS PDU to the MAC SAP associated with the service flow for transport to the peer MAC SAP d) Receipt of the CS PDU from the peer MAC SAP e) Rebuilding of any suppressed payload header information (optional) TKU HSNL WMAN - 21

22 Packet Process Procedure A classifier is a set of matching criteria applied to each packet It consists of some protocol-specific packet matching criteria (destination IP address, for example), a classifier priority, and a reference to a CID. The service flow characteristics of the connection provide the QoS for that packet Several classifiers may each refer to the same service flow. Downlink classifiers are applied by the BS to packets it is transmitting and uplink classifiers are applied at the SS. a packet fails to match the set of defined classifiers. CS/SS shall discard the packet. Packet Classifier(s) CID/SFID CID PHSI mapper SFID SFID/QoS mapper SFID/PHSI (sender) CID/PHSI (receiver) PHS ruler QoS Parameters (used in scheduler) TKU HSNL WMAN - 22

23 Common Part Sublayer (CPS) The MAC CPS provides the core MAC functionality of system access, bandwidth allocation, connection establishment, and connection maintenance: a) System Access b) Bandwidth Request/Allocation c) Connection Establishment/Maintenance e) Quality of Service (QoS( QoS) TKU HSNL WMAN - 23

24 Security Sublayer The security sublayer providing a) authentication, b) secure key exchange, and c) Encryption Two component protocols Encapsulation protocol» Cryptographic suites Key management protocol (PKM)» Create and exchange traffic encryption key (TEK) TKU HSNL WMAN - 24

25 Classifications A MAC SDU is mapped onto a particular connection for transmission between MAC peers According to protocol-specific packet matching criteria (e.g. destination IP address), classifier priority and a reference to a CID (connection ID)» creates an association with the service flow ID (SFID) 32 bits service flow ID (SFID) Conn. ID (CID) PHS CID+PHSI PHS TKU HSNL WMAN - 25

26 Classifications PHS service flow ID (SFID) Conn. ID (CID) TKU HSNL WMAN - 26

27 Classifications A MAC SDU is mapped onto a particular connection for transmission between MAC peers according to protocol-specific packet matching criteria (e.g. IP address), classifier priority and a reference to a CID. SS and BS use multiple classifiers. Each classifier contains a priority field which determines the search order for the classifier. Searching algorithm is similar to policy-based search algorithm (e.g. Firewall) Classifiers can be added by dynamic signaling. Simple Network Management Protocol (SNMP)- based operations can only view Classifiers, no add/delete TKU HSNL WMAN - 27

28 Payload Header Suppression (PHS) For some payload protocols, each payload consists of an 8-bit payload header suppression index (PHSI) followed by the actual payload. A value of zero in the PHSI indicates no payload header suppression has been applied to the PDU. Otherwise, the value in the index identifies the rules for suppression. MAC header 8-bit PHSI refer the payload header suppression field (PHSF) TKU HSNL WMAN - 28

29 Payload Header Suppression (PHS) If PHS is enabled at MAC connection, each MAC SDU is prefixed with a PHSI, which references the Payload Header Suppression Field (PHSF). The classifier uniquely maps packets to its associated PHS Rule. The receiving entity uses the CID and the PHSI to restore the PHSF. (CID+PHSI PHSF/PHSM/PHSS) When a classifier is deleted, any associated PHS rule shall also be deleted. TKU HSNL WMAN - 29

30 PHS operation TKU HSNL WMAN - 30

31 Payload Header Suppression (PHS) Rule Payload header suppression valid (PHSV) : option to verify or not verify the payload header before suppressing it Payload header suppression mask (PHSM) option to allow select bytes not to be suppressed. Such as IP sequence numbers should not be supressed Payload header suppression size (PHSS) Payload header suppression field (PHSF) Payload header suppression index (PHSI) Service flow ID (SFID). PHS rules are indexed by the combination of (SFID, PHSI) Preconfigured header format or higher-level signaling protocols are outside the scope of specification TKU HSNL WMAN - 31

32 PHS with masking A,C,E are compressed Only sends B and E TKU HSNL WMAN - 32

33 PHS Rules The BS shall define the PHSI when the PHS Rule is created The SS or BS may define the PHSS and PHSF. To change the value of a PHSF on a service flow, a new PHS rule shall be defined It is possible to partially specify a PHS rule (in particular the size of the rule) at the time a service flow is created Values of some fields [for example: IP addresses, User Datagram Protocol (UDP) port numbers, etc.] may be unknown and would be provided in a subsequent DSC as part of the activation of the service flow using the Set PHS Rule DSC Action TKU HSNL WMAN - 33

34 PHS Signaling PHS requires the creation of the following three objects: a) Dynamic Service Flow (DSA/DSC/DSD) Addition/Change/Deletion b) Classifier c) PHS rule (PHSI is assigned by BS) TKU HSNL WMAN - 34

35 Connection ID (CID) A unidirectional mapping between BS and SS MAC peers for the purpose of transporting a service flow s traffic Connections are identified by a connection identifier (CID) All traffic is carried on a connection, even for service flows that implement connectionless protocols CID maps to a service flow identifier (SFID), which defines the Quality of Service (QoS( QoS) parameters of the service flow associated with that connection. Security associations (SAs( SAs) also exist between keying material and CIDs. TKU HSNL WMAN - 35

36 Connection ID (CID) Connections are identified by a 16-bit CID At SS initialization, three management connections in each direction (uplink and downlink) shall be established between the SS and the BS. The basic connection is used for exchanging short, time- urgent management messages.» such as DBPC-REQ/RSP : Downlink Burst Profile Change Req/Rsp, RNG-REQ/RSP : Ranging Req/Rsp The primary management connection is used for exchanging longer, more delay tolerant MAC management messages.» Such as DSA/DSC/DSD_REQ/RSP/ACK, REG_REQ/RSP The Secondary Management Connection is used for transferring delay tolerant, standards based DHCP, TFTP, SNMP, etc., management messages. TKU HSNL WMAN - 36

37 Connection ID (CID) BS returns Basic CID and Primary CID to SS via RNG-RSP messages. BS returns Secondary CID to SS via REG-RSP messages (optional). The same CID value is assigned to both members (uplink and downlink) of each connection pair. Many higher-layer sessions may operate over the same wireless CID. TKU HSNL WMAN - 37

38 Connection ID (CID) TKU HSNL WMAN - 38

39 MAC Protocol TKU HSNL WMAN - 39

40 MAC overview Wireless link operates with sectorized antenna is capable of handling multiple independent sectors simultaneously (channel reuse) Subscriber stations share the uplink to the BS on a demand basis. Four different types of uplink scheduling mechanisms Unsolicited bandwidth grants (CBR) Polling (unicast polling)» guarantees applications receive service on a deterministic basis (delay tolerant services) Contention procedures» contention may be used to avoid individual polling of SSs that have been inactive for a long period (multicast/broadcast polling) Bandwidth stealing» a portion of the bandwidth allocated in response to a bandwidth request for a connection to send another bandwidth request rather than sending data Piggyback (via grant subheader ; w/o scheduling) TKU HSNL WMAN - 40

41 MAC overview Service flows provide a mechanism for uplink and downlink QoS management. In particular, they are integral to the bandwidth allocation process. An SS requests uplink bandwidth on a per connection basis (implicitly identifying the service flow). Bandwidth is granted by the BS to an SS as an aggregate of grants in response to per connection requests from the SS. TKU HSNL WMAN - 41

42 MPDU format 6 octets MAC PDU formats CRC capability is mandatory for SCa, OFDM and OFDMA PHY layers HT=0 Generic HT=1 Bandwidth Request Connections are identified by a 16-bit CID. TKU HSNL WMAN - 42

43 Generic MAC Header Management frame TKU HSNL WMAN - 43

44 Type encodings (in Generic Header) Type bits Bit mapping TKU HSNL WMAN - 44

45 Bandwidth Request MAC Header 000 : incremental (BS adds the needed quantity of CID) 001 : aggregate (BS replaces the needed quantity of CID) TKU HSNL WMAN - 45

46 Bandwidth Request The Bandwidth Request shall have the following properties: a) length of the header = 6 bytes b) EC field = 0 (indicating no encryption) c) CID (Basic) indicates the connection for which uplink bandwidth is requested. d) Bandwidth Request (BR) field indicates the number of bytes requested. e) The allowed types for bandwidth requests are 000 for incremental and 001 for aggregate. TKU HSNL WMAN - 46

47 Subheader Types Five types of subheaders Mesh Fragmentation FASTFEEDBACK_Allocation (MIMO) Grant Management Packing The subheaders are inserted in MAC PDUs immediately following the Generic MAC header. Sequence» Grant -> Fragmentation» Mesh -> others» others -> FastFeedback_allocation The Packing and Fragmentation subheaders are mutually exclusive and shall not both be present within the same MAC PDU TKU HSNL WMAN - 47

48 MPDU Transmission long Ethernet packet Short ATM cells TKU HSNL WMAN - 48

49 Concatenation Mandatory capability Multiple MAC PDUs may be concatenated into a single transmission in either the uplink or downlink directions. each MAC PDU is identified by a unique CID Bandwidth stealing TKU HSNL WMAN - 49

50 Packing The capability of unpacking is mandatory. pack multiple MAC SDUs into a single MAC PDU. Differs from concatenation Packing makes use of the connection attribute indicating whether the connection carries fixed- length or variable-length length packets. The construction of PDUs varies for ARQ and non- ARQ connections with respect to packing and fragmentation syntax TKU HSNL WMAN - 50

51 Packing for non-arq connections Packing fixed-length MAC SDUs the Request/Transmission Policy shall be set to allow packing and prohibit fragmentation, and the SDU size shall be included in DSA-REQ message when establishing the connection If the MAC SDU size is n bytes, the receiver unpacks simply by knowing that the length field in the MAC header will be n k+j, where k is the number of MAC SDUs packed into the MAC PDU and j is the size of the MAC header and any prepended MAC subheaders. no added overhead TKU HSNL WMAN - 51

52 Packing for non-arq connections Packing variable-length MAC SDUs indication of where one MAC SDU ends and another begins. the MAC attaches a Packing subheader (PSH) to each MAC SDU unfragmented MAC SDUs and MAC SDU fragments may both be present in the same MAC PDU TKU HSNL WMAN - 52

53 Packing for non-arq connections Simultaneous fragmentation and packing allows efficient use of the airlink when a Packing subheader (PSH) is present, the fragmentation information for individual MAC SDUs or MAC SDU fragments is contained in the corresponding Packing subheader. Else (If no PSH is present), the fragmentation information for individual MAC SDU fragments is contained in the corresponding Fragmentation subheader (FSH) TKU HSNL WMAN - 53

54 Packing for non-arq connections PSH FSH PSH TKU HSNL WMAN - 54

55 Packing for ARQ-enabled connections Each of the packed MAC SDU or MAC SDU fragments or ARQ feedback payload requires its own Packing subheader A MAC SDU may be partitioned into multiple fragments that are then packed into the same MAC PDU for the first transmission. MAC PDUs may have fragments from the same or different SDUs, including a mix of first transmissions and retransmissions. The 11-bit BSN and 2-bit FC fields uniquely identify each fragment or non-fragmented SDU. TKU HSNL WMAN - 55

56 Payload Type Payload Type indicates whether MAC subheaders (Packing/Fragmentation/Grant) present or not. packing/ fragmentation packing/ fragmentation/ grant/ p+g/ f+g TKU HSNL WMAN - 56

57 MAC Subheader Three types of MAC subheaders may be present. The grant management subheader is used by an SS to convey bandwidth management needs to its BS. The fragmentation subheader contains information that indicates the presence and orientation in the payload of any fragments of SDUs. (e.g. long Ethernet packet) The packing subheader is used to indicate the packing of multiple SDUs into a single PDU. (e.g. ATM cells) TKU HSNL WMAN - 57

58 Fragmentation Subheader format TKU HSNL WMAN - 58

59 Grant Subheader format (incremental mode only 16bits vs. 19 bits) is used to request to be polled for a different, non-ugs connection set when service flow has exceeded its transmit queue depth TKU HSNL WMAN - 59

60 Packing Subheader format TKU HSNL WMAN - 60

61 MAC Management Messages MAC Management messages on the Basic, Broadcast, and Initial Ranging connections shall neither be fragmented nor packed. Primary Management is allowed! 1 byte TKU HSNL WMAN - 61

62 MAC Management Messages TKU HSNL WMAN - 62

63 MAC Management Messages TKU HSNL WMAN - 63

64 MAC Management Messages AAS : adaptive antenna system TKU HSNL WMAN - 64

65 SS Initialization Overview Downlink Sync Auth. Key Xchange Get Uplink Parameters Setup Time Ranging Register Download Configuration File Capability Negotiation DHCP Setup connection and service flow TKU HSNL WMAN - 65

66 Steps 1) Scan for downlink channel and establish synchronization with the BS 2) Obtain transmit parameters (from UCD message) (uplink channel descriptor) 3) Perform ranging (RNG( RNG-REQ REQ and RNG-RSP RSP) 4) Negotiate basic capabilities 5) Authorize SS and perform key exchange 6) Perform registration 7) Establish IP connectivity (DHCP( DHCP) optional 8) Establish time of day optional 9) Transfer operational parameters (TFTP( TFTP) optional 10) Set up connections Option : indicated by REG-REQ message TKU HSNL WMAN - 66

67 Uplink Channel Descriptor (UCD) message Configuration Change Count Incremented by one (modulo 256) by the BS whenever any of the values of this channel descriptor change. This value is also referenced from the UL-MAP messages. Ranging Backoff Start Initial backoff window size for initial ranging contention Ranging Backoff End Final backoff window size for initial ranging contention Request Backoff Start Initial backoff window size for contention BW requests Request Backoff End Final backoff window size for contention BW requests All above parameters are expressed as a power of 2. Values of n range 0 15 the highest order bits shall be unused and set to 0 The Uplink_Burst_Profile is a compound TLV encoding that associates with a UIUC, TKU HSNL WMAN - 67

68 Uplink map (UL-MAP) message Uplink Channel ID (for Channelized PHY) UCD Count Matches the value of the Configuration Change Count of the UCD, which describes the uplink burst profiles that apply to this map. Allocation Start Time Effective start time of the uplink allocation defined by the UL-MAP units are PHY-specific (pp. 153)» minislots : SC and SCa PHY layers» symbols and subchannels : OFDM and OFDMA PHY layers Map IEs The contents of a UL-MAP IE is PHY-specification dependent. TKU HSNL WMAN - 68

69 Uplink interval definition Request IE BS specifies an uplink interval for bandwidth requests The character of this IE changes depending on the type of CID used in the IE» Broadcast or multicast CID (poll) : an invitation for SSs to contend for requests.» Unicast CID (poll) : an invitation for a particular SS to request bandwidth» part of a QoS scheduling scheme that is vendor dependent For bandwidth request contention opportunities, the BS shall allocate a grant that is an integer multiple of the value of Bandwidth request opportunity size (in unit of PS) which shall be published in each UCD transmission. TKU HSNL WMAN - 69

70 Uplink interval definition Initial Ranging IE An interval is allocated in UL-MAPs» the maximum round-trip propagation delay plus the transmission time of the RNG-REQ message For ranging contention opportunities, the BS shall allocate a grant that is an integer multiple of the value of Ranging request opportunity size, (in unit of PS) which shall be published in each UCD transmission. Data Grant Burst Type IEs provide an opportunity for an SS to transmit one or more uplink PDUs. TKU HSNL WMAN - 70

71 Ranging request (RNG-REQ) message transmitted by the SS at initial ranging (initialization) and data grant intervals (periodically) To determine network delay To determine power To change downlink burst profile If sent in a data grant interval, the CID is always equal to the Basic CID. the SS received the UCD TKU HSNL WMAN - 71

72 Ranging Request (RNG-REQ) message when the SS is attempting to join the network, two parameters are included in the RNG-REQ message Requested Downlink Burst Profile (1 byte)» Bits 0-3 : DIUC» Bits 4-7 : 4 LSB of Configuration Change Count value SS MAC Address during initial ranging on the SS s Basic connection, the parameter MAC Version is provided 1 : : c-2002 and its predecessors 3 : a-2003 and its predecessors 4 : AAS broadcast capability may be included in the RNG-REQ message: Applied for SCa/OFDM/OFDMA TKU HSNL WMAN - 72

73 Ranging Request (RNG-REQ) message after the SS has received an RNG-RSP, two parameters are included in the subsequent RNG-REQ message : Requested Downlink Burst Profile (1 byte)» Bits 0-3 : DIUC» Bits 4-7 : 4 LSB of Configuration Change Count value Ranging Anomalies (1 byte)» Bit #0 SS already at maximum power.» Bit #1 SS already at minimum power.» Bit #2 Sum of commanded timing adjustments is too large. TKU HSNL WMAN - 73

74 Ranging response (RNG-RSP) message transmitted by the BS in response to a received RNG-REQ may also be transmitted asynchronously to send corrections based on measurements that have been made on other received data or MAC messages TKU HSNL WMAN - 74

75 Ranging response (RNG-RSP) message Ranging Status 1 = continue, 2 = abort, 3 = success, 4 = rerange Timing Adjust Information (signed 32-bit) Power Adjust Information (signed 8-bit, 0.25 db units) Downlink Frequency Override Center frequency, in khz, SS redoes initial ranging. Uplink Channel ID Override Licensed bands: The identifier of the uplink channel with which the SS is to redo initial ranging License-exempt bands: The Channel Nr where the SS should redo initial ranging. Downlink Operational Burst Profile (2 bytes) Byte 0: the least robust DIUC that may be used by the BS for transmissions to the SS. Byte 1: Configuration Change Count value of DCD defining the burst profile associated with DIUC. TKU HSNL WMAN - 75

76 Ranging response (RNG-RSP) message Basic CID (2 bytes) A required parameter if the RNG-RSP message is being sent on the Initial Ranging CID in response to a RNG-REQ message that was sent on the Initial Ranging CID. Primary Management CID (2 bytes) A required parameter if the RNG-RSP message is being sent on the Initial Ranging CID in response to a RNG-REQ message that was sent on the Initial Ranging CID. SS MAC Address (48-bit) A required parameter when the CID in the MAC header is the Initial Ranging CID. Offset Frequency Adjust Information (signed 32- bit, Hz units) fine-frequency adjustment within a channel AAS broadcast permission TKU HSNL WMAN - 76

77 Ranging response (RNG-RSP) message WirelessMAN-SCa or WirelessMAN-OFDM PHY-specific parameters Frame Number (3 bytes)» the corresponding RNG-REQ message or subchannelized initial ranging indication (for OFDM) was received.» When Frame Number is included, SS MAC Address shall not appear. Initial Ranging Opportunity Number (1 byte)» Initial Ranging opportunity within the frame in which the corresponding RNG-REQ message or subchannelized initial ranging indication (for OFDM) was received.» If not provided, and Frame Number is included in the message, Initial Ranging Opportunity is assumed to be one. WirelessMAN-OFDM PHY-specific parameter Ranging Subchannel WirelessMAN-OFDMA PHY when an initial ranging message based on code division multiple access (CDMA) is received, Ranging code attributes (OFDMA time symbols reference, subchannel reference, and frame number) TKU HSNL WMAN - 77

78 Registration request (REG-REQ) message Include parameter: Primary Management CID (in the generic MAC header) The CID in the generic MAC header is the Primary Management CID for this SS, as assigned in the RNG-RSP message. TKU HSNL WMAN - 78

79 Registration request (REG-REQ) message The REG-REQ shall contain the following TLVs: Hashed Message Authentication Code (HMAC) Tuple» Shall be final attribute in the message s TLV attribute list.» In Mesh Mode, message digest is calculated using HMAC_KEY_U. IP Version SS Capabilities Encodings Vendor ID Encoding Vendor-specific information Convergence Sublayer Capabilities ARQ Parameters For PMP operation, the REG-REQ shall contain the following TLVs: Uplink CID Support SS management support» w/ or w/o secondary management connection IP management mode TKU HSNL WMAN - 79

80 Registration response (REG-RSP) message Include parameter: Primary Management CID (in the generic MAC header) Response» 0 = OK» 1 = Message authentication failure TKU HSNL WMAN - 80

81 Registration response (REG-RSP) message The REG-RSP shall contain the following TLVs SS Capabilities Encodings» Response to the capabilities of the requester provided in the REG-REQ.» indicates whether or not the capabilities may be used. IP Version Vendor ID Encoding Vendor-specific information ARQ Parameters» ARQ and fragmentation parameters specified by the BS to complete ARQ parameter negotiation for the secondary management connection. IP management mode» Response to REG-REQ indication of whether or not the requester wishes to accept IP-based traffic on the Secondary Management Connection, once the initialization process has completed. TKU HSNL WMAN - 81

82 Contention resolution Collisions may occur during Initial Ranging and Request intervals. After a contention transmission, the SS waits for a Data Grant Burst Type IE in a subsequent map (bandwidth request) waits for a RNG-RSP message (initial ranging) truncated binary exponential backoff with the initial backoff window and the maximum backoff window are controlled by the BS are specified as part of the UCD message and represent a power-of of-two value. Request IEs or Initial Ranging IEs allocate contention intervals in the UL-MAP messages Random backoff (in slots) may across multiple intervals assigned in IEs. TKU HSNL WMAN - 82

83 Contention resolution retry when range timeout (200ms no range response) data grant timeout (10ms no data grant - service QoS dependent) Until reaches the maximum number of retries while deferring, if SS receives a unicast Request IE or Data Grant Burst Type IE, it shall stop the contention resolution process BS may set up the Request (or Ranging) Backoff Start and Request (or Ranging) Backoff End to emulate an Ethernet-style backoff by setting Request (or Ranging) Backoff Start = 0 and Request (or Ranging) Backoff End = 10 in the UCD message Open issue for optimize window (beyond the scope of standard) TKU HSNL WMAN - 83

84 Transmission opportunities The size of an individual transmission opportunity for each type of contention IE shall be published in each transmitted UCD message. The BS shall always allocate bandwidth for contention IEs in integer multiples of these published values. WirelessMAN-SC system for example,» frame duration =1 ms,» each PS = 4 symbols, each minislot = 2 PSs,» uplink preamble =16 symbols = 2 minislots,» SS transition gap (SSTG) = 24 symbols = 3 minislots.» For QPSK, each transmission opportunity requires 8 minislots: 3 for the SSTG, 2 for the preamble, and 3 for the bandwidth request message.» This payload requirement would be specified as a value of 16 (pp. 167) assigned to the UCD TLV Bandwidth request opportunity size TKU HSNL WMAN - 84

85 Transmission opportunities One Request IE with 24 minislots indicates there will be three transmission opportunities TKU HSNL WMAN - 85

86 PHY Layer TKU HSNL WMAN - 86

87 Multiple Access and Duplexing On DL, SS addressed by BS in TDM stream On UL, SS is allotted a variable length TDMA slot Time-Division Duplex (TDD) DL & UL time-share the same RF channel Dynamic asymmetry (also named as Demand Assigned Multiple Access : DAMA) Half-duplex SS does not transmit/receive simultaneously (low cost) Frequency-Division Duplex (FDD) DL & UL on separate RF channels Static asymmetry Full-duplex SSs supported Half-duplex SSs supported (low cost)» SS does not transmit/receive simultaneously» Need resynchronization TKU HSNL WMAN - 87

88 TDD Frame Frame duration: 0.5/1/2 ms (SC), 2.5/4/5/8/10/12.5/20 ms (OFDM), 2/2.5/5/8/10/12.5/20ms (OFDMA) Physical Slot (PS) = 4 symbols (SC/a), 4/sampling_freq(Fs) (OFDM/A) Minislot : A unit of uplink bandwidth allocation equivalent to n physical slots (PSs( PSs), where n = 2 m and m is an integer ranging from 0 through 7. TKU HSNL WMAN - 88

89 Adaptive Burst Profiles Burst profile Modulations and FEC Dynamically assigned according to link conditions Burst by burst, per subscriber station Trade-off capacity vs. robustness in real time Roughly doubled capacity for the same cell Burst profile for downlink broadcast channel is wellknown and robust Other burst profiles can be configured on the fly SS capabilities recognized at registration» SBC-REQ/RSP TKU HSNL WMAN - 89

90 System Parameters QPSK, 16-QAM and 64-QAM TKU HSNL WMAN - 90

91 Radio Link control RLC control transition of burst profile power level ranging RLC begins with periodic BS broadcast of the burst profiles that have been chosen for the uplink and downlink according to rain region and equipment capabilities. Burst profiles for the downlink/uplink are each tagged with a Downlink/Uplink Interval Usage Code (DIUC/UIUC). TKU HSNL WMAN - 91

92 Ranging and Power Control During initialization, the SS performs initial power leveling and ranging using ranging request (RNG- REQ) messages transmitted in initial maintenance windows. The adjustments to the SS s transmit time advance, as well as power adjustments, are returned to the SS in ranging response (RNG-RSP) RSP) messages. For ongoing ranging and power adjustments, the BS may transmit unsolicited RNG-RSP RSP messages commanding the SS to adjust its power or timing. It is not included in burst profile TKU HSNL WMAN - 92

93 Burst Profile Set of parameters that describe the uplink or downlink transmission properties associated with an interval usage code (IUC). The burst profile to use for any uplink transmission is defined by the Uplink Interval Usage Code (UIUC). Each UIUC is mapped to a burst profile in the UCD message Each profile contains parameters such as a) modulation type b) forward error correction (FEC) type c) preamble length d) guard times TKU HSNL WMAN - 93

94 Burst Profile If the received CINR goes outside of the allowed operating region, the SS requests a change to a new burst profile using one of two methods If the SS has been granted uplink bandwidth, it shall send a DBPC-REQ message in that allocation. The BS responds with a DBPC-RSP message. If grant is not available and the SS requires a more robust burst profile on the downlink, it shall send a RNG-REQ message in an Initial Ranging interval. Note : using the Basic CID of the SS TKU HSNL WMAN - 94

95 Burst profile transition C/(N+I) :carrier to noise and interference ratio DL-MAP Ranging request (RNG-REQ) or downlink burst profile change request (DBPC-REQ) As SS receives unclear signals! Transition to a more robust burst profile. TKU HSNL WMAN - 95

96 Burst profile Transition C/(N+I) :carrier to noise and interference ratio As SS receives strong signals! Transition to a less robust burst profile. TKU HSNL WMAN - 96

97 Burst profile threshold C/(N+I) :carrier to noise and interference ratio TKU HSNL WMAN - 97

98 Map relevance and synchronization (TDD) ATDD : adaptive time division duplexing TKU HSNL WMAN - 98

99 Map relevance and synchronization (FDD) TKU HSNL WMAN - 99

100 Map relevance WirelessMAN-SC PHY & WirelessMAN-OFDM PHY Allocation Start Time (AST) is subject to the following limitations:» FDD : minimum AST value = round trip delay + T proc, maximum AST value = T f (i.e., the beginning of the next frame).» TDD : the AST value is either the ATDD split or the ATDD split + T f. The allocation shall be within a single frame. WirelessMAN-SCa PHY & WirelessMAN-OFDMA PHY Allocation Start Time shall be subject to the following limitations:» Minimum value: Allocation Start Time T f» Maximum value: Allocation Start Time < 2 T f TKU HSNL WMAN - 100

101 Optional MAC AAS Support Adaptive Antenna System (AAS) - optional the use of more than one antenna element, can improve range and system capacity by adapting the antenna pattern and concentrating its radiation to each individual subscriber. Support in WirelessMAN-SCa, OFDM, and OFDMA spectral efficiency can be increased linearly with the number of antenna elements achieved by steering beams to multiple users simultaneously so as to realize an inter-cell frequency reuse. signal-to-noise ratio (SNR) gain realized by coherently combining multiple signals, and the ability to direct this gain to particular users. MIMO/SIMO/MISO. TKU HSNL WMAN - 101

102 Optional MAC AAS Support provides a mechanism to migrate from a non-aas system to an AAS enabled system dedicating part of the frame to non-aas traffic and part to AAS traffic time TKU HSNL WMAN - 102

103 Optional MAC AAS Support Alerting the BS about presence of a new SS in an AAS system AAS BS may reserve a fixed, pre-defined part of the frame as initial-ranging contention slots (called AAS-alert-slots) for this alert procedure FDD/TDD support use channel state information of both downlink and uplink Two ways :» (reciprocity) using the uplink channel state estimation as the downlink channel state (TDD)» (feedback) transmitting the estimated channel state from the SS to BS. (FDD or TDD) using two MAC control messages:» AAS-FBCK-REQ and AAS-FBCK-RSP» The BS shall provide an uplink allocation to enable the SS to transmit this response.» Using FDD, the BS shall issue AAS-FBCK-REQ messages.» Using TDD, the BS may issue AAS-FBCK messages. (pp. 165) TKU HSNL WMAN - 103

104 Burst FDD Framing Allows scheduling flexibility TKU HSNL WMAN - 104

105 Uplink TDD/FDD Subframe (ranging) (band. req) UIUC: Uplink Interval Usage Code TKU HSNL WMAN - 105

106 TDD Downlink Subframe DIUC: Downlink Interval Usage Code TKU HSNL WMAN - 106

107 FDD Downlink Subframe TDMA portion: transmits data to some half-duplex SSs (the ones scheduled to transmit earlier in the frame than they receive) Need preamble to re-sync (carrier phase) TKU HSNL WMAN - 107

108 Receive/transmit Transition Gap (RTG) in TDD A gap between the uplink burst and the subsequent downlink burst in a TDD transceiver. Not applicable for FDD systems transmit/receive transition gap (TTG) : similar TKU HSNL WMAN - 108

109 Adaptive PHY Adaptive modulation TKU HSNL WMAN - 109

110 Nine Data Rates in Modulation Schemes : QPSK, 16-QAM and 64-QAM 20 MHz/channel (4M PSs/frame/ms = 16Msymols/ms) 32Mbps / 64Mbps / 96Mbps 25 MHz/channel (5M PSs/frame/ms = 20Msymbols/ms) 40Mbps / 80Mbps / 120Mbps 28 MHz/channel (5.6M PSs/frame/ms = 22.4Msymbols/ms) 44.8Mbps / 89.6Mbps / 134.4Mbps Uplink mandatory US European downlink mandatory 0.5, 1 or 2 ms TKU HSNL WMAN - 110

111 10-66 GHz PHY parameters TKU HSNL WMAN - 111

112 Uplink PHY TKU HSNL WMAN - 112

113 Downlink PHY TKU HSNL WMAN - 113

114 Shortened FEC blocks TDMA/TDM case Reed-Solomon over Galois field GF(256) TDMA w/ TDM w/o TKU HSNL WMAN - 114

115 IEEE a Medium Access Control Modifications and Additional Physical Layer Specifications for 2-11 GHz TKU HSNL WMAN - 115

116 802.16a PHY Alternatives Different Applications, Bandplans, and Regulatory OFDM (WirelessMAN( WirelessMAN-OFDM Air Interface) 256-point FFT with OFDM (TDD/FDD) OFDMA (WirelessMAN( WirelessMAN-OFDMA Air Interface) 2048-point FFT with OFDMA (TDD/FDD) CDMA ranging code Single-Carrier (WirelessMAN( WirelessMAN-SCa Air Interface) TDMA (TDD/FDD) BPSK, QPSK, 4-QAM, 16-QAM, 64-QAM Most vendors will use Frequency-Domain Equalization for solving delay spread issue TKU HSNL WMAN - 116

117 Key a MAC/PHY Features 2-11GHz License-exempt exempt band GHz OFDM/OFDMA support ARQ Space-Time Coding (STC) There are two transmit antennas on the BS side and one reception antenna on the SS side. Dynamic Frequency Selection (DFS) license-exempt Adaptive Antenna System (AAS) support Mesh Mode Optional topology for license-exempt operation only (TDD only) Subscriber-to-Subscriber communications Complex topology and messaging TKU HSNL WMAN - 117

118 Features OFDM (WirelessMAN( WirelessMAN-OFDM Air Interface) Two contention based BW request mechanisms» Bandwidth Request Header» Focused Contention Transmission with Contention Code over Contention Channel consisting of 4 carriers OFDMA (WirelessMAN( WirelessMAN-OFDMA Air Interface) Two contention based BW request mechanisms» Bandwidth Request Header» Specifies a Ranging Subchannel and a subset of Ranging Codes that are used for contention-based BW requests (CDMA mechanism) The WirelessHUMAN system provides optional support for Mesh topology. Unlike the point-2-multipoint (PMP) mode, there are no clearly separate downlink and uplink subframes in the Mesh mode. TKU HSNL WMAN - 118

119 Mesh-based WirelessMAN Source: Nokia Networks TKU HSNL WMAN - 119

120 Mesh Networks Mesh systems typically use omnidirectional or 360 steerable antennas, but can also be co-located using sector antennas. Directed Mesh (DM) : The realization of a physical mesh using substantially directional antennas. Nodes : systems in Mesh networks Mesh BS : a system that has a direct connection to backhaul services outside the Mesh network. Mesh SS : all the other systems of a Mesh network Neighbor : The nodes with which a node has direct links Neighborhood :Neighbors of a node form a neighborhood (onehop) Extended neighborhood : all the neighbors of the neighborhood (two-hops) TKU HSNL WMAN - 120

121 Mesh Networks Using distributed scheduling, all the nodes including the Mesh BS shall coordinate their transmissions in their two-hop neighborhood and shall broadcast their schedules (available resources, requests and grants) to all their neighbors. (Optionally) the schedule may also be established by directed uncoordinated requests and grants between two nodes. Nodes shall ensure that the transmissions do not collide with the traffic scheduled by any other node in two-hop neighborhood. TKU HSNL WMAN - 121

122 Mesh Networks Using centralized scheduling, the Mesh BS shall gather resource requests from all the Mesh SSs within a certain hop range. determine the amount of granted resources for each link the grant messages do not contain the actual schedule, but each node shall compute it by using the predetermined algorithm with given parameters. QoS is provisioned over links on a message-bymessage basis. TKU HSNL WMAN - 122

123 Mesh Networks 48-bit universal MAC address When authorized to the network the node receives a 16-bit node identifier (Node ID) upon a request to the Mesh BS Node ID is transferred in the Mesh subheader, which follows the generic MAC header, in both unicast and broadcast messages. For addressing nodes in the local neighborhood, 8-bit link identifiers (Link IDs) shall be used. The Link ID is transmitted as part of the CID in the generic MAC header in unicast messages. The Link IDs shall be used in distributed scheduling to identify resource requests and grants. Since these messages are broadcast, the receiver nodes can determine the schedule using the transmitter s Node ID in the Mesh subheader, and the Link ID in the payload of the MSH- DSCH (Mesh Mode Schedule with Distributed Scheduling) message. TKU HSNL WMAN - 123

124 Mesh Networks 8 bits Messages with larger Drop Precedence shall have higher dropping likelihood during congestion. TKU HSNL WMAN - 124

125 IEEE and 16a Mesh topology * Mesh topology * 5-6GHz 5MHz/channel ; 200 channels HUMAN : High-Speed Unlicensed Metropolitan Area Network TKU HSNL WMAN - 125

126 OFDM/OFDMA raw bitrates (Mbps) TKU HSNL WMAN - 126

127 Adaptive Antenna System A system adaptively exploiting more than one antenna to improve the coverage and the system capacity Adapt the antenna pattern and concentrating its radiation to each individual subscriber The spectral efficiency can be increased linearly with the number of antenna elements steering beams to multiple users simultaneously so as to realize an inter-cell frequency reuse Reduce interference TKU HSNL WMAN - 127

128 THANK YOU! Questions? TKU HSNL WMAN - 128

MAC Overview NCHU CSE WMAN - 1

MAC Overview NCHU CSE WMAN - 1 MAC Overview NCHU CSE WMAN - 1 MAC Overview Connection-oriented Supports difficult user environments High bandwidth, hundreds of users per channel For variable Continuous and Burst traffic Very efficient

More information

SS Initialization Overview

SS Initialization Overview SS Initialization Overview Downlink Sync Auth. Key Xchange Get Uplink Parameters Setup Time Ranging Register Download Configuration File Capability Negotiation DHCP Setup connection and service flow (provisioned

More information

MAC layer: structure and QoS support. PhD student: Le Minh Duong

MAC layer: structure and QoS support. PhD student: Le Minh Duong 802.16 MAC layer: structure and QoS support PhD student: Le Minh Duong Content 1. Introduction 2. 802.16 MAC layer 2.1. MAC Service-Specific Convergence Sublayer 2.2. Common Part Sublayer 3. QoS support

More information

Institute of Electrical and Electronics Engineers (IEEE)

Institute of Electrical and Electronics Engineers (IEEE) 2006-03-08 IEEE L802.16-06/004 INTERNATIONAL TELECOMMUNICATION UNION RADIOCOMMUNICATION STUDY GROUPS Document 8A/IEEE-2-E Document 8F/IEEE-1-E 8 March 2006 English only Received: TECHNOLOGY Subject: Question

More information

Wireless Communication. IEEE Wireless Metropolitan Area Network (wman)

Wireless Communication. IEEE Wireless Metropolitan Area Network (wman) 1 IEEE 802.16 Wireless Metropolitan Area Network (wman) 2 Existing Data Network Hierarchy Level Typical Connections Wired Technologies Wireless Technologies Personal Area (PAN) Peripherals and personal

More information

Nokia Fax:

Nokia Fax: 2002-09-11 IEEE C802.16c-02/09 Project Title Date Submitted 2002-09-11 IEEE 802.16 Broadband Wireless Access Working Group Editorial instructions pertaining to comments submitted

More information

The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks

The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks ITU-APT Regional Seminar Busan, Republic of Korea 10 Sept 2004 Ken Stanwood CEO, Cygnus Multimedia Communications Vice-Chair,

More information

WiMAX Vs Wi-Fi. 3G Evolution (source: Nokia) Wireless Systems. WiMAX

WiMAX Vs Wi-Fi. 3G Evolution (source: Nokia) Wireless Systems. WiMAX 3G Evolution (source: Nokia) WiMAX Vs Wi-Fi ผศ.ดร.ส ร นทร ก ตต ธรก ล ภาคว ชาว ศวกรรมคอมพ วเตอร คณะว ศวกรรมศาสตร สถาบ นเทคโนโลย พระจอมเกล าเจ าค ณทหารลาดกระบ ง 2 Wireless Systems WiMAX Worldwide Interoperability

More information

Protocol Implementation Conformance Statement for IEEE Standard

Protocol Implementation Conformance Statement for IEEE Standard 00-0- IEEE C..-0/0 Protocol Implementation Conformance Statement for IEEE Standard 0.-00 00-0- WiMAX PICS v... 0 Contents Foreword... Introduction.... Scope.... References.... Definitions and Abbreviations....

More information

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16>

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16> Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group A new method to enhance the network entry and re-entry procedures in PMP mode 2004-11-02 Source(s)

More information

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview Source : Jamshid Khun Jush (Ericsson) (THOMSON multimedia) 1 HIPERLAN/2 Standard A new standard developed by the ETSI Project

More information

Evaluating VoIP using Network Simulator-2

Evaluating VoIP using Network Simulator-2 Athens University of Economic and Business Evaluating VoIP using Network Simulator-2 June 2007 Author: Papantonakos Manos Supervisor Prof.: George Xylomenos Co-Supervisor Prof: George Polyzos About WiMax

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Procedures Clarifications and Improvement for MBS Logical Channel support in 802.16REV2 2008-04-20

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < IEEE C802.16maint-08/063r4 Project Title IEEE 802.16 Broadband Wireless Access Working Group ROHC Classification Changes Date Submitted Source(s) 2008-01-24 Muthaiah Venkatachalam

More information

ETSI BRAN Technical Committee

ETSI BRAN Technical Committee ETSI BRAN Technical Committee Mariana Goldhamer ETSI BRAN Vice-Chair / HiperMAN Acting Chair Alvarion ETSI European Telecommunications Standards Institute 699 member companies from 55 countries in 5 continents

More information

Mobile WiMAX EPL 657. Panayiotis Kolios

Mobile WiMAX EPL 657. Panayiotis Kolios Mobile WiMAX EPL 657 Panayiotis Kolios 1 WiMAX Based on the 802.16 suite of protocols Air interface OFDMA defined under 802.16-2004 Mobility enhancements made under 802.16e include multi-path performance

More information

IEEE C802.16maint-08/064r3

IEEE C802.16maint-08/064r3 Project Title IEEE 802.16 Broadband Wireless Access Working Group Clarification and Fixes in the MBS definitions and procedures Date Submitted Source(s) 2008-03-10 Kamran Etemad

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS 1999-10-29 Source Phil Guillemette SpaceBridge Networks Corporation

More information

IEEE C802.16e-03/20r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-03/20r1. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group IEEE 802.16e Handoff Draft 2003-03-13 Source(s) Itzik Kitroser IEEE802.16e Handoff ad-hoc chair

More information

IEEE /WIMAX- Overview. E.Borcoci

IEEE /WIMAX- Overview. E.Borcoci IEEE /WIMAX- Overview E.Borcoci Contents 1 IEEE Wireless MAN overview...1 1.1 Introduction...2 1.1.1 IEEE 802 standards...2 1.1.2 IEEE Summary...2 1.1.3 WiMAX summary...4 1.1.4 WiMAX Forum...5 1.1.5 Other

More information

DESIGN AND IMPLEMENTATION OF IEEE MAC LAYER SIMULATOR

DESIGN AND IMPLEMENTATION OF IEEE MAC LAYER SIMULATOR DESIGN AND IMPLEMENTATION OF IEEE 802.16 MAC LAYER SIMULATOR H. M. Shamitha 1, H. M. Guruprasad 1, Kishore. M 2, Ramesh. K 3 Department of Electronics and Communication 1 Proudadhevaraya Institute of Technology,

More information

ETSI TS V2.4.1 ( ) Technical Specification

ETSI TS V2.4.1 ( ) Technical Specification TS 102 385-2 V2.4.1 (2007-10) Technical Specification Broadband Radio Access Networks (BRAN); HiperMAN; Conformance Testing for WiMAX/HiperMAN 1.2.1; Part 2: Test Suite Structure and Test Purposes (TSS&TP)

More information

Initial PHY Layer System Proposal for Sub 11 GHz BWA

Initial PHY Layer System Proposal for Sub 11 GHz BWA Initial PHY Layer System Proposal for Sub 11 GHz BWA Document Number: 802.16.3p-00/40 Date Submitted: 2000-11-08 Source: Anader Benyamin-Seeyar Voice: (514) 822-2014 Harris Corporation Inc. Fax: (514)

More information

WiMAX: MAC Layer Performance Assessments

WiMAX: MAC Layer Performance Assessments WiMAX: MAC Layer Performance Assessments A. Bestetti,G.Giambene, S. Hadzic Alcatel-Lucent, Via Trento, 30, I-20059 Vimercate, Milano, Italy University of Siena, Via Roma, 56, I-53100 Siena, Italy Abstract

More information

ETSI TS V2.2.1 ( )

ETSI TS V2.2.1 ( ) TS 102 385-2 V2.2.1 (2006-06) Technical Specification Broadband Radio Access Networks (BRAN); HiperMAN/WiMAX; Conformance testing for the Data Link Control Layer (DLC); Part 2: Test Suite Structure and

More information

What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator

What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator Introduction- What is WiMAX WiMAX -Worldwide Interoperability

More information

Overview of WiMAX (Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai

Overview of WiMAX (Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai (Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai Background on IEEE 802.16 and WiMAX (Table 2.1 and Table 2.2) Salient Features of WiMAX OFDM-based physical layer: good resistance to

More information

Part 16: Air Interface for Fixed Broadband Wireless Access Systems

Part 16: Air Interface for Fixed Broadband Wireless Access Systems Draft IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Amendment for Improved Coexistence Mechanisms for License-Exempt Operation

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

NCTUns Simulation Tool for WiMAX Modeling

NCTUns Simulation Tool for WiMAX Modeling NCTUns Simulation Tool for WiMAX Modeling (Invited Paper) Shiang-Ming Huang smhuang@csnctuedutw Ya-Chin Sung ycsung@csienctuedutw Yi-Bing Lin liny@linycsienctuedutw Shie-Yuan Wang shieyuan@csienctuedutw

More information

Providing QoS to Real and Non-Real Time Traffic in IEEE networks

Providing QoS to Real and Non-Real Time Traffic in IEEE networks Providing QoS to Real and Non-Real Time Traffic in IEEE 802.16 networks Joint work with my student Harish Shetiya Dept. of Electrical Communication Engg., Indian Institute of Science, Bangalore Overview

More information

IEEE C802.16maint-08/064r4

IEEE C802.16maint-08/064r4 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Clarifications and Improvement in the MBS definitions and procedures in 802.16REV2 2008-03-17 Source(s)

More information

DOCSIS. Introduction. Gabor Major. UPC Magyarorszag Kft. Liberty Global Inc.

DOCSIS. Introduction. Gabor Major. UPC Magyarorszag Kft. Liberty Global Inc. DOCSIS Introduction Gabor Major UPC Magyarorszag Kft. Liberty Global Inc. Agenda Introduction Signal transmission Provisioning flow Docsis protocol Docsis management traffic QoS Baseline privacy Dynamic

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

HIPERLAN/2 and a: A Comparative Study

HIPERLAN/2 and a: A Comparative Study HIPERLAN/2 and 802.11a: A Comparative Study PADMA BONDE Reader, Department of Computer Science Shri Vaishnav Institute of Technology and Science Indore, INDIA JAYESH BONDE Executive Engineer, Department

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

IEEE C802.16e-05/401r3

IEEE C802.16e-05/401r3 2005-0-07 IEEE C02.e-05/0r Project Title Date Submitted Source(s) IEEE 02. Broadband Wireless Access Working Group Corrections on some TLVs in UCD and DCD for OFDMA 2005-0-07 Jungnam

More information

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group < 2004-05-172004-05-17 IEEE C802.16e-04/67r1 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Enhancement of 802.16e to Support Secure EAP PKM messages

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

802.22b NICT Proposal

802.22b NICT Proposal Authors: 802.22b Proposal IEEE P802.22 Wireless RANs Date: 2011-10-28 Name Company Address Phone email Masayuki Oodo 3-4 Hikarion-Oka, Yokosuka, Japan moodo@nict.go.jp Zhang Xin 20 Science Park Road, #01-09A/10

More information

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE 802.16 based WiMAX Network Vinit Grewal Department of Electronics and Communication Engineering National Institute of Technology

More information

IEEE C802.16e-05/401r2

IEEE C802.16e-05/401r2 0--0 IEEE C0.e-0/0r Project Title Date Submitted Source(s) IEEE 0. Broadband Wireless Access Working Group Corrections on some TLVs in UCD and DCD for OFDMA 00--0 Jungnam Yun, POSDATA

More information

Mesh Networking

Mesh Networking 8 802.16 Mesh Networking Petar Djukic and Shahrokh Valaee CONTENTS 8.1 Introduction... 147 8.2 802.16 Time Division Multiple Access... 150 8.2.1 802.16 Physical Layer... 150 8.2.2 TDMA Framing and Transmission

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project IEEE 802.16 Broadband Wireless Access Working Group Title A WirelessHUMAN TM System Date Submitted Source(s) 2001-01-13 Mika Kasslin Nokia Research Center Itamerenkatu 11-13

More information

Design and Implementation of IEEE MAC Layer Simulator

Design and Implementation of IEEE MAC Layer Simulator IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.8, August 2009 53 Design and Implementation of IEEE 802.16 MAC Layer Simulator Malik Muhammad Asim, Muid Mufti Computer Engineering

More information

CABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS

CABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS CABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS Peter R. Egli 1/15 Contents 1. Cable network architecture 2. Relevant cable network standards 3. DOCSIS 2/15 1. Cable Network architecture

More information

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes Syed R. Zaidi, Shahab Hussain, M. A. Ali Department of Electrical Engineering The City College of The

More information

ARQ support for Primary Management connection

ARQ support for Primary Management connection ARQ support for Primary Management connection IEEE 802.16 Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16maint-08/220 Date Submitted: 2008-05-13 Source: David Comstock E-mail: dcomstock@huawei.com

More information

IEEE /15. IEEE Broadband Wireless Access Working Group < Title Interpretation of IEEE Standard 802.

IEEE /15. IEEE Broadband Wireless Access Working Group <  Title Interpretation of IEEE Standard 802. Project IEEE 802.16 Broadband Wireless Access Working Group Title Interpretation of IEEE Standard 802.16 Date Submitted 2002-03-15 Source(s) Roger Marks Voice: +1 303 497 3037 mailto:r.b.marks@ieee.org

More information

Message definition to support MS network entry in centralized allocation model

Message definition to support MS network entry in centralized allocation model Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Message definition to support MS network entry in centralized allocation model 2007-01-08 Source(s)

More information

IEEE Broadband Wireless Access Working Group < Evaluation Procedure for MAC Protocols

IEEE Broadband Wireless Access Working Group <  Evaluation Procedure for MAC Protocols Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Evaluation Procedure for 802.16 MAC Protocols 2000-04-25 Source Hoon Choi Natl. Inst. of Standards

More information

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16> Applicability of IEEE and HIPERLAN/2 for WirelessHUMAN Systems

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16> Applicability of IEEE and HIPERLAN/2 for WirelessHUMAN Systems Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Applicability of IEEE802.11 and HIPERLAN/2 for WirelessHUMAN Systems 2000-09-08 Source(s) Mika Kasslin

More information

International Journal Of Core Engineering & Management Volume-5, Issue-7, October-2018, ISSN No:

International Journal Of Core Engineering & Management Volume-5, Issue-7, October-2018, ISSN No: WIMAX TECHNOLOGY FOR BROADBAND WIRELESS ACCESS: OVERVIEW Nishu M.tech Scholar, ECE Department, SSCET, Badhani, Punjab Er.Reetika AP, ECE Department, SSCET, Badhani, Punjab Abstract The Worldwide Interoperability

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

IEEE C802.16e-318. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-318. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted Source(s) Re: Abstract Purpose Notice Release Patent Policy and Procedures IEEE 802.16 Broadband Wireless Access Working Group Fix the problem of Scan/Association

More information

Mobile Broadband Comparison. CDMA Development Group March 2008

Mobile Broadband Comparison. CDMA Development Group March 2008 Mobile Broadband Comparison CDMA Development Group March 2008 Assumptions and Notes for the Technology Comparison This document compares the performance of existing and future mobile communications systems

More information

PREFACE. The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie ( )

PREFACE. The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie ( ) PREFACE The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie (1888-1964) The recent standard IEEE 802.16 for fixed Broadband Wireless Access (BWA)

More information

Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation Mechanism

Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation Mechanism 2007-01-15 IEEE C802.16j-07/034r1 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation

More information

WiMAX and WiFi Interoperability in Next Generation Networks

WiMAX and WiFi Interoperability in Next Generation Networks WiMAX and WiFi Interoperability in Next Generation Networks Pedro Neves Crossnet Workshop Lisbon, February 19 th 2008 Portugal Telecom Inovação, S.A. Contents WiMAX & WiFi Overview Synergies Deployment

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16> The document contains ARQ Proposal for /4 MAC

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16> The document contains ARQ Proposal for /4 MAC Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group ARQ Proposal for 802.16 TG3/4 MAC 2001-03-07 Source(s) Vladimir Yanover et al. [Company] [Address

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

* Author to whom correspondence should be addressed; Tel.: ; Fax:

* Author to whom correspondence should be addressed;   Tel.: ; Fax: Future Internet 2010, 2, 446-468; doi:10.3390/fi2040446 Article OPEN ACCESS future internet ISSN 1999-5903 www.mdpi.com/journal/futureinternet Deficit Round Robin with Fragmentation Scheduling to Achieve

More information

IEEE m Reference Model

IEEE m Reference Model CHAPTER IEEE 802.16m Reference Model 3 and Protocol Structure INTRODUCTION The IEEE 802.16-2009 standard defines a generic reference model where major functional blocks (i.e., physical layer, security

More information

Preliminary Performance Evaluation of QoS in DOCSIS 1.1

Preliminary Performance Evaluation of QoS in DOCSIS 1.1 The University of Kansas Technical Report Preliminary Performance Evaluation of QoS in DOCSIS 1.1 Gayathri Chandrasekaran, Mohammed Hawa and David W. Petr ITTC-FY2003-TR-22736-01 January 2003 Sponsor:

More information

Performance Evaluation of an Uplink Scheduling Algorithm in WiMAX

Performance Evaluation of an Uplink Scheduling Algorithm in WiMAX MEE09:60 Performance Evaluation of an Uplink Scheduling Algorithm in WiMAX Designing the Adaptive Heuristic Uplink Scheduling Algorithm AHUS Oyekanlu Emmanuel Joshi Ajita This thesis is presented as part

More information

Wireless Networking: An Introduction. Hongwei Zhang

Wireless Networking: An Introduction. Hongwei Zhang Wireless Networking: An Introduction Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Networking as resource allocation A taxonomy of current practice Technical elements Outline Networking as resource

More information

IEEE C802.16h-06/114r3. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-06/114r3. IEEE Broadband Wireless Access Working Group < 2006-03-12 IEEE C802.16h-06/114r3 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group OCSI Collusion Collision detection and resolution between systems

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

CS 332 Computer Networks Wireless Networks

CS 332 Computer Networks Wireless Networks CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:

More information

Outline. Introduction WiMAX s Features WiMAX s Competitors Conclusion References Ting-Kai Huang, MNET Lab 2

Outline. Introduction WiMAX s Features WiMAX s Competitors Conclusion References Ting-Kai Huang, MNET Lab 2 WiMAX(802.16) Outline Introduction WiMAX s Features WiMAX s Competitors Conclusion References 2004-12-29 Ting-Kai Huang, MNET Lab 2 Introduction Wireless Technologies UWB (PAN) Wi-Fi (LAN) WiMAX (MAN)

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Flexible Resource Allocation in IEEE Wireless Metropolitan Area Networks

Flexible Resource Allocation in IEEE Wireless Metropolitan Area Networks Flexible Resource Allocation in IEEE 802.16 Wireless Metropolitan Area Networks Spyros A. Xergias, Nikos Passas and Lazaros Merakos Communication Networks Laboratory Department of Informatics & Telecommunications

More information

Internet Traffic Performance in IEEE Networks

Internet Traffic Performance in IEEE Networks Internet Traffic Performance in IEEE 802.16 Networks Dmitry Sivchenko 1,2,3, Nico Bayer 1,2,3, Bangnan Xu 1, Veselin Rakocevic 2, Joachim Habermann 3 1 T-Systems, SSC ENPS, Deutsche-Telekom-Allee 7, 64295

More information

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656

More information

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents

More information

A Deficit Round Robin with Fragmentation Scheduler for IEEE e Mobile WiMAX 1,2

A Deficit Round Robin with Fragmentation Scheduler for IEEE e Mobile WiMAX 1,2 1 A Deficit Round Robin with Fragmentation Scheduler for IEEE 802.16e Mobile WiMAX 1,2 Chakchai So-In, Student Member, IEEE, Raj Jain, Fellow, IEEE, Abdel-Karim Tamimi, Member, IEEE Deficit Round Robin

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.862

More information

WiMAX Security: Problems & Solutions

WiMAX Security: Problems & Solutions (JCSCR) - ISSN 2227-328X WiMAX Security: Problems & Solutions Paul Semaan LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon Abstract This paper is a

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

WCDMA evolution: HSPA and MBMS

WCDMA evolution: HSPA and MBMS Chapter: 3G Evolution 8 WCDMA evolution: HSPA and MBMS Isael Diaz isael.diaz@eit.lth.se Department of Electrical and Information Technology 02-Apr-2009 3G Evolution - HSPA and LTE for Mobile Broadband

More information

WiMAX Forum Conformance Statements

WiMAX Forum Conformance Statements WiMAX Forum Air Interface Trait Packages Open Retail WMF-T24-002-R00v04 WMF Approved (202-04-6) WiMAX Forum Proprietary Copyright 202 WiMAX Forum. All Rights Reserved. WMF-T24-002-R00v04 2 3 4 5 6 7 8

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Proposal to allow Extended Type subheaders for connections where ARQ is not enabled 2004-04-28 Source(s)

More information

Qos Analysis Of Wimax Network

Qos Analysis Of Wimax Network Qos Analysis Of Wimax Network 802.16 Gurpal Singh Sidhu 1, Sandeep Kaushal 2, Dr. Vijay Kumar Banga 3 1 M-Tech scholar, Department of Electronics and Communication Engineering, Amritsar College of Engineering

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

WiMAX Technology and Deployment for Last-Mile Wireless Broadband and Backhaul Applications

WiMAX Technology and Deployment for Last-Mile Wireless Broadband and Backhaul Applications White Paper WiMAX Technology and Deployment WiMAX Technology and Deployment for Last-Mile Wireless Broadband and Backhaul Applications Fujitsu Microelectronics America, Inc. August 2004 Contents Introduction

More information

Introduction to WiMAX Technology

Introduction to WiMAX Technology 1 Introduction to WiMAX Technology Wonil Roh and Vladimir Yanover WiMAX stands for Worldwide Interoperability for Microwave Access. WiMAX technology enables ubiquitous delivery of wireless broadband service

More information

IEEE 802 Standardization: Past, Present and Future

IEEE 802 Standardization: Past, Present and Future IEEE 802 Standardization: Past, Present and Future Dr. Aik Chindapol Siemens Corporate Research Siemens Corporate Research, Inc. IEEE802/IETF vs. 3GPP/3GPP2 Protocol Architecture IETF, IEEE802 3GPP/3GPP2

More information

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802. Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July

More information

E3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT

E3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT E3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT WELCOME This is a presentation for the E3-E4 Technical (CM- Module) for the Topic: WiMAX Overview & BSNL WiMAX Project Eligibility: Those who have

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Table of Contents. Introduction...3. WiMAX Forum overview...4. WiMAX Technology framework...4. Key elements of WiMAX Technology...

Table of Contents. Introduction...3. WiMAX Forum overview...4. WiMAX Technology framework...4. Key elements of WiMAX Technology... White Paper Table of Contents Introduction...3 WiMAX Forum overview...4 WiMAX Technology framework...4 Key elements of WiMAX Technology...4 WiMAX Plugfest Testing...6 Test architecture...6 System-Under-Test

More information

Communication Networks

Communication Networks Communication Networks Chapter 3 Multiplexing Frequency Division Multiplexing (FDM) Useful bandwidth of medium exceeds required bandwidth of channel Each signal is modulated to a different carrier frequency

More information