A Secure and Service-Oriented Network Control Framework for WiMAX Networks

Size: px
Start display at page:

Download "A Secure and Service-Oriented Network Control Framework for WiMAX Networks"

Transcription

1 WIRELESS BROADBAND ACCESS: WIMAX AND BEYOND A Secure and Service-Oriented Network Control Framework for WiMAX Networks Kejie Lu and Yi Qian, University of Puerto Rico Hsiao-Hwa Chen, National Sun Yat-Sen University ABSTRACT WiMAX, Worldwide Interoperability for Microwave Access, is an emerging wireless communication system that can provide broadband access with large-scale coverage. As a cost-effective solution, multihop communication is becoming more and more important to WiMAX systems. To successfully deploy multihop WiMAX networks, security is one of the major challenges that must be addressed. Another crucial issue is how to support different services and applications in WiMAX networks. Since WiMAX is a relatively new standard, very little work has been presented in the literature. In this article we propose a secure and service-oriented network control framework for WiMAX networks. In the design of this framework we consider both the security requirements of the communications and the requirements of potential WiMAX applications that have not been fully addressed previously in the network layer design. The proposed framework consists of two basic components: a service-aware control framework and a unified routing scheme. Besides the design of the framework, we further study a number of key enabling technologies that are important to a practical WiMAX network. Our study can provide a guideline for the design of a more secure and practical WiMAX network. INTRODUCTION WiMAX (Worldwide Interoperability for Microwave Access) is an emerging wireless communication system that is expected to provide high data rate communications in metropolitan area networks (MANs) [1]. In the past few years, the IEEE working group has developed a number of standards for WiMAX. The first standard was published in 2001, which aims to support the communications in the GHz frequency band. In 2003 IEEE a was introduced to provide additional physical layer specifications for the 2 11 GHz frequency band. These two standards were further revised in 2004 (IEEE ). Recently, IEEE e has also been approved as the official standard for mobile applications. In the physical (PHY) layer, IEEE supports four PHY specifications for the licensed bands. These four specifications are Wireless- MAN-SC (single carrier), -SCa, -OFDM (orthogonal frequency-division multiplexing), and -OFDMA (orthogonal frequency-division multiple access). In addition, the standard also supports different PHY specifications (-SCa, -OFDM, and -OFDMA) for the unlicensed bands: wireless high-speed unlicensed MAN (WirelessHUMAN). Most PHYs are designed for non-line-of-sight (NLOS) operation in frequency bands below 11 GHz, except -SC, which is for operation in the GHz frequency band. To support multiple subscribers, IEEE supports both time-division duplex (TDD) and frequency-division duplex (FDD) operations. In the medium access control (MAC) layer, IEEE supports two modes: point-to-multipoint (PMP) and mesh. The former organizes nodes into a cellular-like structure consisting of a base station (BS) and subscriber stations (SSs). The channels are divided into uplink (from SS to BS) and downlink (from BS to SS), and both uplink and downlink channels are shared among the SSs. PMP mode requires all SSs to be within the transmission range and clear line of sight (LOS) of the BS. On the other hand, in mesh mode an ad hoc network can be formed with all nodes acting as relaying routers in addition to their sender and receiver roles, although there may still be nodes that serve as BSs and provide backhaul connectivity. As a cost-effective solution, multihop communication is becoming more and more important to WiMAX system. To successfully deploy multihop WiMAX networks, security is one of the major challenges that must be addressed /07/$ IEEE

2 Base station Subscriber station Wireless link Figure 1. WiMAX network architectures: a) PMP mode; b) mesh mode. Another important issue is how to support different services and applications in WiMAX networks. Since WiMAX is a relatively new standard, very little work has been conducted in the literature. In [2] the authors provided a survey on the security schemes used in the IEEE standard [1]. They further analyzed the security flaws in the standard. Several improvements have been proposed since then. Nevertheless, we notice that the security mechanism of IEEE is mainly focused on security in the MAC layer, which may not be able to provide sufficient security in multihop scenarios and satisfy the requirements of emerging applications in WiMAX networks. In this article we propose a secure and service-oriented network control framework for WiMAX networks. The main motivation of our study is that we need to take into account both the security concerns and the requirements of potential WiMAX applications. The proposed framework consists of two important components: A service-aware control framework A unified routing scheme In our study we show that the proposed framework is suitable for various application scenarios and can provide sufficient security from the network perspective. In addition to the design of the framework, we also study a number of key enabling technologies that are very important to the framework. Our study can provide a guideline to the design of a more secure and practical WiMAX network. The rest of the article is organized as follows. We firstbriefly review the architectures of WiMAX networks. We then study the challenges and requirements in the design of the network layer for WiMAX networks. Based on the analysis, we propose and elaborate on a secure and service-oriented control framework. Within the proposed framework, we identify a number of important technologies, followed by conclusions. WIMAX NETWORK ARCHITECTURES According to the IEEE standard [1], WiMAX technology supports two operation modes: PMP and mesh. A WiMAX PMP network aims at providing last-mile access to a broadband Internet service provider (ISP). An (a) Relay station Mobile station (b) example of the network topology is illustrated in Fig. 1a, where the WiMAX network includes one BS and a number of SSs. On the other hand, mesh mode implies the requirement of supporting multihop ad hoc networking by SSs. An example of a WiMAX mesh network is illustrated in Fig. 1b. Notice that in this figure, we assume that BS can provide access to the Internet; a relay station (RS) is a special type of SS that can forward traffic flows to BSs or other RSs; and a mobile station (MS) is an SS that can move in the network. Compared to PMP mode, mesh mode is more flexible and can be used to quickly deploy the infrastructure. In fact, a more general term for mesh mode, wireless mesh network, has attracted great attention in the past few years [3 5]. Currently, different IEEE standard groups are working on providing wireless mesh support in a variety of networks, including wireless personal area networks and wireless local area networks [5]. It is worth noting that a concept of mobile multihop relay (MMR) networking has also been introduced for PMP mode in IEEE e, which may expand the coverage area and enhance throughput through multihop paths [5]. One of the motivations for the MMR scheme is to overcome the problem that mesh mode is not compatible with PMP mode. To summarize the existing architectures of WiMAX networks, we observe that multihop communications will become a basic feature in the near future. CHALLENGES AND REQUIREMENTS IN NETWORK LAYER DESIGN In the previous section we provide a brief review of existing and proposed architectures for WiMAX networks. In reality, to successfully deploy WiMAX networks, a number of challenging issues must be addressed. In this article we focus on two major issues in network layer design: security, and support of existing and future applications. In the rest of this section we first discuss the common requirements of security in WiMAX networks and possible attacks to WiMAX networks. We then address the current and potential application scenarios of WiMAX networks. It is worth noting that a concept of mobile multihop relay (MMR) networking has also been introduced for PMP mode in IEEE e, which may expand the coverage area and enhance throughput through multihop paths. 125

3 Server 3 Server 2 Figure 2. An example of manycast in a WiMAX network. Server 4 SECURITY CHALLENGES IN WIMAX NETWORKS General Requirements In general, a secure WiMAX network shall satisfy the following security concerns: Confidentiality: Confidentiality is necessary to ensure that sensitive information is well protected and not revealed to unauthorized third parties. The confidentiality objective is required in a WiMAX network environment to protect information traveling between different stations, since an adversary having the appropriate equipment may eavesdrop on the communication. Authentication: As in conventional systems, authentication techniques verify the identity of the participants in a communication, thus distinguishing legitimate users from intruders. Integrity: From the integrity perspective, there is the danger that information could be altered when exchanged over insecure networks. Lack of integrity could result in many problems since the consequences of using inaccurate information could be disastrous. Integrity controls must be implemented to ensure that information will not be altered in any unexpected way. Availability: In a wireless network, availability can be a major security issue since an adversary can launch a denial-of-service (DoS) attack to block a legitimate user s access to the network. Security Issues As a relatively new standard, security in WiMAX networks has only been addressed in a few previous studies. Early work can be found in [2], which provides a survey on the security schemes used in IEEE standards [1] and analyzes the security flaws in the standard. For instance, one of the flaws is that there is a lack of mutual authentication. In other words, a BS can authenticate an SS, but the SS cannot authenticate the BS. This authentication problem may cause significant security problems. In the literature a number of previous studies have suggested mutual authentication for both communication parties [2]. Although these discussions are very important to the security of the whole system, we notice that the security mechanism of IEEE is mainly focused on the MAC layer. Apparently, only the security in the MAC layer may not be sufficient to protect multihop communications, which will become common in WiMAX mesh or MMR networks. Particularly in WiMAX networks, a security mechanism in the MAC layer can only prevent eavesdropping by other parties through securing every message between adjacent stations. However, in practice an adversary can capture an RS or deploy a corrupted RS [6]. The latter case may be more significant if a broadband wireless service provider wants to choose a customer premises equipment (CPE) station to increase service coverage at low cost. In such scenarios, existing security approaches of IEEE are not sufficient to protect confidentiality in multihop communications. In [6] a transit access point (TAP) is used to represent a station that can perform relay functions. As suggested in [6], how to identify corrupt or compromised RSs is one of the most important security issues in a wireless mesh network. On the other hand, a common threat in wireless networks is a DoS attack, in which an adversary can block radio transmission in a certain area. Although a DoS attack is relatively simple to launch, it is virtually impossible for a WiMAX network to guard against in the PHY and MAC layers. To deal with the above issues, we believe that secure routing [7] will be crucial for multihop communication scenarios from the network perspective. Clearly, such routing problems must be addressed in the design of the network control framework. For example, careful network design can mitigate the compromised RS problem and DoS attacks by choosing one or more different paths for the same traffic flow. APPLICATION SCENARIOS In the previous discussion we address the network design issue from the security perspective. In practice, a good system design also depends on understanding the applications that will be carried in the networks. In this subsection we survey the existing application scenarios and several potential scenarios that have been proposed in the literature. It is important to note that we will also elaborate on the functions that shall be provided in the network layer so as to fulfill the requirements of these applications. Internet Access: Evidently, Internet access will still be the major demand in WiMAX networks, especially when they are newly deployed. To support Internet access, a straightforward method is to provide a unicast connection between SSs (including RSs and MSs) and the BS, which has the link toward the Internet. Group Communications: Since WiMAX networks can cover a relatively large area, it is natural to imagine that many group communications, such as videoconferences, will be important applications in WiMAX networks. To support such communication scenarios, multicast is the key technology. In the past, Internet multicast has not been successful due to its complexity and, more important, because Internet multicast requires global deployment, which is virtually impossible. In a WiMAX network, however, since all nodes are located inside, implementing 126

4 such group communication becomes possible. Metropolitan Area Distributed Service: With the deployment of WiMAX networks, more and more value-added services can be provided in a metropolitan area. To efficiently support a large number of customers, distributed services can be enabled. In other words, a customer can access the service from any of the servers in the network in which these servers are distributed to serve the entire metropolitan area. To enable distributed service, the authors in [8] propose a novel routing framework in the network layer, manycast routing. In this scheme the customer does not need to specify the exact address of a server in the network. Instead, it only needs to indicate the service it wants to access. Moreover, in such a communication scenario, the client (i.e., the customer) can communicate with a subset of all the servers in order to achieve better reliability and/or security. An example of manycast is illustrated in Fig. 2, in which the MS has decided to access servers 1 and 4 simultaneously. Content-Based Distribution: The contentbased routing scheme is a service-oriented communication model [9]. In this scheme the sender of a message does not need to explicitly specify its destination(s). The network layer will automatically deliver the message to receivers that are interested in the content of the message. In [9] the authors proposed to design an overlay network based on broadcast service of the existing network. Quality Guaranteed Applications: For many applications, it is desirable that the network layer can provide a sufficient quality of service (QoS) guarantee, usually in terms of bandwidth, data rate, delay, and delay jitter. However, wireless communications are naturally error-prone; thus, it is difficult to provide such a guarantee in a wireless network. To address this issue, in the literature multipath routing has been studied in many previous works. In general, multipath routing can provide better quality than single-path routing [10]. An example of multipath routing is illustrated in Fig. 3, in which the MS accesses server 3 via two different paths. Multihoming Applications: Multihoming [11] is a technology that can provide services similar to those of multipath routing. The main difference between these two schemes is that in multihoming, one station has two or more IP addresses and generally has the same number of interfaces. In this manner, the station can have multiple paths to access the same resources. In short, the application layer requirements must be addressed in the network layer design. In the next section we provide a solution to satisfy the above applications while providing sufficient security. A SECURE AND SERVICE-ORIENTED NETWORK CONTROL FRAMEWORK In this section we elaborate on a novel control framework to address the security requirements in WiMAX networks, and fulfill the demands of existing and future application scenarios discussed above. Server 3 Server 2 Figure 3. An example of multipath routing in a WiMAX network. COMPONENTS In this framework there are two major components. Service-Aware Control Scheme To efficiently support different applications, the network layer control scheme shall be aware of the availability of different services. In general, the service can be either located in a single node in the network or distributed in multiple locations in the network. To provide these services, the servers must register the type and availability of service to the control framework. Moreover, the availability information shall be updated periodically or based on predefined events. Upon receiving these messages, the control framework will also be responsible for distributing such message to nodes in the network. Unified Routing Scheme With the availability information of the service, a unified routing scheme shall be designed such that all the application scenarios discussed in the last section shall be supported. The packets of a certain flow will be forwarded based on the service and security requirements. CASE STUDIES To illustrate the behaviors of the framework, we use the following cases as examples. Case 1 We first assume that a BS has been registered as the gateway for Internet access in the control framework. Now suppose a regular best-effort Internet access request arrives at the control framework; a single-path unicast routing scheme can be set up for such a request. Notice that in such a scenario, the single path routing scheme cannot defend compromised RSs in a multihop situation. Case 2 For the same application scenario as in case 1, if the customer requires a better QoS for Internet access, a unicast multipath routing scheme can be set up. In this case, since the major concern is to provide better transmission Server 4 127

5 Path 1 Path 1 Path 3 Path 2 Path 2 Path 4 (a) (b) Figure 4. Examples of case 3: a) a single path; b) multipath. quality, multiple paths are not necessarily node or link disjoint. Case 3 For the same scenario as case 1, if the customer requires a higher level of security, another unicast multipath routing scheme can be set up to provide better confidentiality and maintain the integrity of the message. In such a case, the paths may be link disjoint or even node disjoint. An example of this case can be found in Fig. 4, where we use server to indicate that the node can provide Internet access. Clearly, in this case multiple paths can prevent a single compromised node from decoding the whole message. The use of these multiple paths can be flexible. One possible scenario is that multiple paths are used simultaneously, and the message transmitted through a single path may contain only a subset of the total information, as illustrated in Fig. 4a. At the receiver side, the whole message can be recovered if all or a subset of the messages are received. Another scenario is that only one path will be used at a time, and paths can be used alternatively. Similar to the previous scenario, the forwarding scheme can be designed so that a single node cannot receive the whole message. As shown in Fig. 4b, we can set up four paths between the source-destination pair. All packets can be numbered in sequence, and we can let the packet with sequence number 4k + m travel through path m, where k is any integer and m can be an integer in {1, 2, 3, 4}. Case 4 In this case we assume that a distributed service has been provided in the network, and a number of servers have been registered as nodes that can provide service. In such a scenario, if the application does not have security or reliability concerns, any one of the servers can be selected by the control framework, and a unicast path can be set up. Case 5 For distributed service, if reliability is important to the application, multiple servers can be selected and the manycast routing scheme can be utilized, as illustrated in Fig. 2. Case 6 To address security concerns in distributed service, the manycast and multipath schemes can be combined. An example is shown in Fig. 5, where four paths have been established to accommodate the application. Similar to case 3, these paths can be utilized in different ways. In the first scenario, different nodes act independently, and thus provide the same type of service if they receive the same set of messages. In the second scenario, different nodes can operate in a cooperative manner through control channels, which can be established in advanced. Consequently, only one of the servers is needed to prepare the service, while all others just verify whether the received information is the original information sent from the client. From the perspective of the client, the returned messages from different servers can be compared and verified. ENABLING TECHNOLOGIES To deploy the proposed framework, a number of key technologies must be addressed. In the rest of this section we address these issues. PLACEMENT OF BSS AND RSS In our framework, the placement of BSs and RSs is very important for a broadband wireless service provider to offer a secure communication platform. For example, in Fig. 6a, if there is only one path between one MS and a server, it is not possible to guarantee the security of the communication since a single RS in the path can damage the confidentiality and integrity of the information transmission, or block the traffic flow and affect the availability of the service. On the other hand, if there are two or more paths available, secure communication channels are more likely to exist between the MS and the server, as shown in Fig. 6b. One important issue related to the placement of BSs and RSs is the cost. Apparently, with increasing numbers of BSs and RSs of a service provider, security and availability will increase while cost will also soar. In such a case, it becomes a trade-off between security and cost. On the other hand, given the constraint of cost, the placement of BSs and RSs can be formulated as an optimization problem, which shall be further investigated. SECURITY MANAGEMENT In the proposed framework the security management scheme is very important to the system. Similar to [6], we consider the security management scheme responsible for monitoring the operation of the network and quickly identifying possible security attacks and threats. 128

6 KEY MANAGEMENT In addition to the MAC layer, key management is also important to the network layer. To provide a secure communication channel between the end user and the server, it is important to develop a key management scheme to establish a unique key for each session. In such a scenario the proposed framework can be directly utilized to improve the reliability and security of the key distribution. For instance, an MS can send key material through multiple paths to the server. Since each path may contain only a portion of all the information, the probability of the key material being intercepted by an adversary can be significantly reduced. Another potential research topic in key management is the key distribution scheme for group communication. One simple solution for group communication is to utilize a single group key. However, such an approach is not efficient because of two factors: the key will be exposed if a single group member is compromised; and the communication overhead will become a big burden if a member can frequently join or leave the group, a typical scenario for a system with mobile nodes. Traditionally, a key graph can be introduced to deal with such a scenario. However, we notice that existing solutions are generally based on a tree-like graph, which may not be directly applied to our framework, in which multiple paths can be set up for the communication. Server 3 Path 3 Path 1 Path 2 Server 2 Figure 5. An example of case 6. (a) Path 4 Server 4 SECURE ROUTING In the literature secure routing has been discussed in a number of previous studies [7]. However, we notice that none of them fully address the scenarios discussed in the previous section. In our scheme the routing algorithm takes into account the following issues. Multiple-radio and multiple-channel: In the near future, each node may be equipped with multiple radio interfaces. Therefore, the routing scheme shall take this into account. Multiple destinations: In our framework, an application can require multiple destinations in the network. Although several schemes were discussed in [8], we notice that security concerns were not addressed. For example, there is no requirement for selecting node disjoint paths in these schemes, which may not be sufficient to defend against compromised RS nodes. Multipath routing: As shown in the previous section, the multipath scheme is different from existing methods. First, multipath routing may need to forward messages to different destinations. Second, more paths may need to be set up, as illustrated in Fig. 4b. Heterogeneity of user devices: In practice, the capabilities of user devices (e.g., data rate) are highly heterogeneous. Several application layer schemes and middleware schemes have been proposed recently. However, it is appropriate for the network layer to consider such differences because the capability information of end users can be utilized to help choose the routing method used. To address the secure routing issue, we believe that the emerging network coding technique should be applied because it can provide Figure 6. The importance of the placement of BSs and RSs: a) a single path; b) multiple paths. the optimum solution and reduce the computational complexity for many problems [12]. CONCLUSION (b) WiMAX is a promising wireless communication technology for wireless MANs. In this article we address the design issue in multihop WiMAX networks. Specifically, we propose a secure and service-oriented network control framework in which both security concerns and the requirements of potential WiMAX applications are taken into account. In the framework there are two major components: a service-aware control framework and a unified routing scheme. We then demonstrate how these schemes can provide the required service from the network layer perspective. In addition to the design of the framework, we also study several enabling technologies for the framework, including the deployment of BSs and key management, and secure routing. We believe that our study can provide a guideline for the design of a more secure and practical WiMAX network. 129

7 To address the secure routing issue, we believe that the emerging network coding technique shall be applied because it can provide the optimum solution and can reduce the computational complexity for many problems. ACKNOWLEDGMENTS The work reported in this article was partially supported by the U.S. National Science Foundation under the NSF Award Number , a NSF EPSCoR start-up grant in Puerto Rico, and National Science Council, Taiwan, under the grants NSC E and NSC E REFERENCES [1] S. J. Vaughan-Nichols, Achieving Wireless Broadband with WiMAX, IEEE Comp., vol. 37, issue 6, June 2004, pp [2] D. Johnston and J. Walker, Overview of IEEE Security, IEEE Sec. & Privacy, vol. 02, no. 3, May-June 2004, pp [3] Akyildiz and X. Wang, A Survey on Wireless Mesh Networks, IEEE Commun. Mag., vol. 43, no. 9, pp. S23 S30, Sept [4] R. Bruno, M. Conti, and E. Gregori, Mesh Networks: Commodity Multihop Ad Hoc Networks, IEEE Commun. Mag., vol. 43, no. 3, Mar. 2005, pp [5] M. Lee et al., Emerging Standards for Wireless Mesh Technology, IEEE Wireless Commun., vol. 13, no. 2, Apr. 2006, pp [6] N. Ben Salem and J.-P. Hubaux, Securing Wireless Mesh Networks, IEEE Wireless Commun., vol. 13, no. 2, Apr. 2006, pp [7] H. Deng, W. Li, and D. Agrawal, Routing Security in Wireless Ad Hoc Networks, IEEE Commun. Mag., vol. 40, no. 10, Oct. 2002, pp [8] C. Carter et al., Manycast: Exploring the Space Between Anycast and Multicast in Ad Hoc Networks, Proc. Mobi- Com 03, San Diego, CA, Sept. 2003, pp [9] Carzaniga, M. Rutherford, and A. Wolf, A Routing Scheme for Content-Based Networking, Proc. IEEE INFOCOM 04, vol. 2, 7 11 Mar. 2004, pp [10] Zhang and H. Mouftah, QoS Routing for Wireless Ad Hoc Networks: Problems, Algorithms, and Protocols, IEEE Commun. Mag., vol. 43, no. 10, Oct. 2005, pp [11] P. Eronen, IKEv2 Mobility and Multihoming Protocol (MOBIKE), IETF RFC 4555, June [12] D. S. Lun et al., Minimum-Cost Multicast Over Coded Packet Networks, IEEE Trans. Info. Theory, vol. 52, no. 6, June 2006, pp BIOGRAPHIES KEJIE LU (lukejie@ece.uprm.edu) received B.S. and M.S. degrees in telecommunications engineering from Beijing University of Posts and Telecommunications, Beijing, China, in 1994 and 1997, respectively. He received a Ph.D. degree in electrical engineering from the University of Texas at Dallas in In 2004 and 2005 he was a postdoctoral research associate in the Department of Electrical and Computer Engineering, University of Florida. Currently, he is an assistant professor in the Department of Electrical and Computer Engineering, University of Puerto Rico at Mayaguez. His research interests include architecture and protocols design for computer and communication networks, performance analysis, network security, and wireless communications. YI QIAN [M] (yqian@ece.uprm.edu) is an assistant professor in the Department of Electrical and Computer Engineering, University of Puerto Rico at Mayaguez. Prior to joining UPRM in July 2003, he worked for several startup companies, consulting firms, and a large telecommunications equipment manufacture company in the areas of voice over IP, fiber optical switching, Internet packet video, network optimizations and network planning for wireless and satellite networks, as a technical advisor, senior consultant, and senior member of scientific staff. He received a Ph.D. degree in electrical engineering from Clemson University. His current research interests include network security, network management, network modeling, simulation, and performance analysis for next-generation wireless networks, wireless sensor networks, broadband satellite networks, optical networks, high-speed networks, and the Internet. He has publications and patents in all these areas. He has been on numerous conference technical committees including serving as General Chair of the International Symposium on Wireless Pervasive Computing 2007, Technical Program Co-Chair of the IEEE GLOBECOM 2006 Symposium on Wireless Communications and Networking, and Technical Program Co-Chair of the Workshop on Information Assurance 2006 and He is a member of Sigma Xi, ACM, IEICE, IEEE Computer Society, and IEEE Vehicular Technology Society. HSIAO-HWA CHEN (hshwchen@ieee.org) is currently a full professor at the Institute of Communications Engineering, National Sun Yat-Sen University, Taiwan. He has been a visiting professor at the Department of Electrical Engineering, University of Kaiserslautern, Germany, in 1999, Institute of Applied Physics, Tsukuba University, Japan, in 2000, Institute of Experimental Mathematics, University of Essen, Germany, in 2002 (under a DFG Fellowship), Department of Information Engineering, Chinese University of Hong Kong, 2003, and Department of Electronics Engineering, City University of Hong Kong, His current research interests include wireless networking, MIMO systems, and next-generation CDMA technologies for future wireless communications. He has authored or co-authored over 200 technical papers in major international journals and conferences, and five books in the areas of communications, including Next Generation Wireless Systems and Networks (Wiley). He has served or is serving as International Steering Committee member, Symposium Chair, and General Co-Chair of more than 50 international conferences, including IEEE VTC, IEEE ICC, IEEE GLOBECOM, and IEEE WCNC. He has served or is serving as Editor, Editorial Board member, or Guest Editor of many international journals, including IEEE Communications Magazine, IEEE JSAC, IEEE Vehicular Technology, IEEE Wireless Communications Magazine, IEEE Network Magazine, IEEE Transactions on Wireless Communications, IEEE Communications Letters, Wiley s Wireless Communications and Mobile Computing Journal, and Wiley s International Journal of Communication Systems. He is an adjunct professor of Zhejiang University and Shanghai Jiao Tung University, China. Currently he is also Chair of the Radio Communications Committee, IEEE Communications Society. 130

An Overview of Various Security Aspects for WiMAX Network Technology

An Overview of Various Security Aspects for WiMAX Network Technology International Journal of Electronics and Computer Science Engineering 781 Available Online at www.ijecse.org ISSN: 2277-1956 An Overview of Various Security Aspects for WiMAX Network Technology Manorma

More information

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.862

More information

WiMAX Security: Problems & Solutions

WiMAX Security: Problems & Solutions (JCSCR) - ISSN 2227-328X WiMAX Security: Problems & Solutions Paul Semaan LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon Abstract This paper is a

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

Cross-Layer QoS Support in the IEEE Mesh Network

Cross-Layer QoS Support in the IEEE Mesh Network Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes Syed R. Zaidi, Shahab Hussain, M. A. Ali Department of Electrical Engineering The City College of The

More information

Kanika, Virk Singh Amardeep, International Journal of Advance Research, Ideas and Innovations in Technology. ISSN: X

Kanika, Virk Singh Amardeep, International Journal of Advance Research, Ideas and Innovations in Technology. ISSN: X ISSN: 2454-132X (Volume2, Issue4) Available online at: www.ijariit.com Analyze the Effect of Base Station and Node Failure and Recovery on the performance of Wimax Kanika Student Adesh Institute of Engineering

More information

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered

More information

International Journal Of Core Engineering & Management Volume-5, Issue-7, October-2018, ISSN No:

International Journal Of Core Engineering & Management Volume-5, Issue-7, October-2018, ISSN No: WIMAX TECHNOLOGY FOR BROADBAND WIRELESS ACCESS: OVERVIEW Nishu M.tech Scholar, ECE Department, SSCET, Badhani, Punjab Er.Reetika AP, ECE Department, SSCET, Badhani, Punjab Abstract The Worldwide Interoperability

More information

Cross-Layer Optimized Architecture of MBS over Mobile WiMAX

Cross-Layer Optimized Architecture of MBS over Mobile WiMAX Cross-Layer Optimized Architecture of MBS over Mobile WiMAX Joohan Lee, Juho Lee, Sungkwon Park* Department of Electronics and Computer Engineering Hanyang University Seoul, Republic of Korea remem2002@hotmail.com,

More information

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS Kamini Jaswal 1, Jyoti 2, Kuldeep Vats 3 1 M.tech, Department of electronics and communication, South point institute of engineering

More information

A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks

A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks Han-Sheng Chuang 1, Liang-Teh Lee 1 and Chen-Feng Wu 2 1 Department of Computer Science and Engineering, Tatung

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Operational Inferences on VANETs in e and p with Improved Performance by Congestion Alert

Operational Inferences on VANETs in e and p with Improved Performance by Congestion Alert The 8th Annual IEEE Consumer Communications and Networking Conference - Special Session Information Dissemination in Vehicular Networks Operational Inferences on VANETs in 802.16e and 802.11p with Improved

More information

Bandwidth Recycling using Variable Bit Rate

Bandwidth Recycling using Variable Bit Rate Bandwidth Recycling using Variable Bit Rate M.Swapna VATHSALYA INSTITUTE OF SCIENCE AND TECHNOLOGY ANANTHARAM, BHONGIR Mobile No:9666255511, E-mail: raviralaswapna@gmail.com Mr. P. V. S. Rama Prasad Associate

More information

The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks

The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks ITU-APT Regional Seminar Busan, Republic of Korea 10 Sept 2004 Ken Stanwood CEO, Cygnus Multimedia Communications Vice-Chair,

More information

Introduction to Mobile Broadband (imb)

Introduction to Mobile Broadband (imb) Introduction to Mobile Broadband (imb) Teaching By Asst.Prof.Dr. Suwat Pattaramalai suwat.pat@kmutt.ac.th Tel. 02-470-9079 Material: http://webstaff.kmutt.ac.th/~suwat.pat/ 3GPP WiMAX FORUM Introduction

More information

Wireless Networking: An Introduction. Hongwei Zhang

Wireless Networking: An Introduction. Hongwei Zhang Wireless Networking: An Introduction Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Networking as resource allocation A taxonomy of current practice Technical elements Outline Networking as resource

More information

ANALYSIS OF LTE VS. WIMAX

ANALYSIS OF LTE VS. WIMAX ANALYSIS OF LTE VS. WIMAX ENSC 427, SPRING 2013, TEAM #08 NG Jackie, 301056206 (jna10@sfu.ca) ZHU Wangyi (Nick), 301159678 (wangyiz@sfu.ca) RAJARATANAM Sutharsan, 200081017 (srajara1@sfu.ca) OVERVIEW INTRODUCTION

More information

Protection Schemes for 4G Multihop wireless Networks

Protection Schemes for 4G Multihop wireless Networks Protection Schemes for 4G Multihop wireless Networks Sridevi, Assistant Professor, Department of Computer Science, Karnatak University, Dharwad Abstract:-This paper describes the relay node protection

More information

What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator

What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator Introduction- What is WiMAX WiMAX -Worldwide Interoperability

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE 802.16 based WiMAX Network Vinit Grewal Department of Electronics and Communication Engineering National Institute of Technology

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

SECURITY ISSUES OF WIMAX

SECURITY ISSUES OF WIMAX SECURITY ISSUES OF WIMAX 1 3 V Venkata Santosh 1, Balajee Maram 2, V KUMAR 3 B.Tech student, CSE Dept., GMR Institute of Technology, Rajam, AP. venkatasantosh.vummididev@gmail.com 2 Asst. Prof., Dept of

More information

Performance in Wimax Networks Using Vertical Handoff

Performance in Wimax Networks Using Vertical Handoff Performance in Wimax Networks Using Vertical Handoff Renu 1, Anil Dudy 2 Electronics and communication 1, 2,Shri Baba Mastnath Engg. college 1, 2 Email:renudalal89@gmail.com 2, anildudy10@gmail.com 2 Abstract-

More information

A Study on WiMAX: IEEE Standard

A Study on WiMAX: IEEE Standard A Study on WiMAX: IEEE 802.16 Standard Mahdieh Danandeh Oskouei Department of Computer, Shabestar Branch, Islamic Azad University, Shabestar, Iran Seyed Naser Razavi Department of Electrical and Computer

More information

Call for Papers for Communication Theory Symposium

Call for Papers for Communication Theory Symposium Call for Papers for Communication Theory Symposium Scope and Motivation: The Communication Theory Symposium covers all aspects related to communication theory, with a focus on topics related to fundamental

More information

Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture

Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture Dionysia Triantafyllopoulou *, National and Kapodistrian University of Athens

More information

BACKBONE NETWORK IN MESH NETWORKS

BACKBONE NETWORK IN MESH NETWORKS SIMULATION BASED ANALYSIS OF VARIOUS QUEUING POLICIES IN LINKS BETWEEN ACCESS POINTS AND Kanu Bala,Dr. Monika Saluja, Shaheed Bhagat Singh State Technical Campus, Ferozpur Punjab,India Abstract: - WiMAX

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

A General Frame Structure for IEEE802.16j Relaying Transmission

A General Frame Structure for IEEE802.16j Relaying Transmission Project IEEE 802.16 Multihop Relay Project < http://ieee802.org/16/relay/index.html > Title Date Submitted A General Frame Structure for IEEE802.16j Relaying Transmission 2007-01-08 Source(s) Yong Sun,

More information

The Integration of Heterogeneous Wireless Networks (IEEE /IEEE ) and its QoS Analysis

The Integration of Heterogeneous Wireless Networks (IEEE /IEEE ) and its QoS Analysis 141 The Integration of Heterogeneous Wireless Networks (IEEE 802.11/IEEE 802.16) and its QoS Analysis Wernhuar Tarng 1, Nai-Wei Chen 1, Li-Zhong Deng 1, Kuo-Liang Ou 1, Kun-Rong Hsie 2 and Mingteh Chen

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

WIMAX. WIMAX (Worldwide Interoperability for Microwave Access ): Field of application:

WIMAX. WIMAX (Worldwide Interoperability for Microwave Access ): Field of application: WIMAX WiMAX (Worldwide Interoperability for Microwave Access) is a technology that focuses on providing data over long distances in a wireless mode, very similar to the cellular mobile concept. WiMAX is

More information

Special Articles on PREMIUM 4G Introduction of LTE Advanced. large-capacity, and low-delay to improve

Special Articles on PREMIUM 4G Introduction of LTE Advanced. large-capacity, and low-delay to improve LTE-Advanced as Further Evolution of LTE for Smart Life LTE-Advanced CA Advanced C-RAN Special Articles on PREMIUM 4G Introduction of LTE Advanced NTT DOCOMO Technical Journal LTE-Advanced, which was launched

More information

THE WIRELESS ACCESSIBILITY WORKSHOP

THE WIRELESS ACCESSIBILITY WORKSHOP Fixed and mobile applications of WiMAX THE WIRELESS ACCESSIBILITY WORKSHOP at CTIA Monica Paolini Senza Fili Consulting Wednesday April 5, 2006 April 6, 2006-2 - Senza Fili Consulting LLC Senza Fili Consulting

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 213 SSR Improvement in OFDMA Femtocell Networks Sandhya Y. A. M.Tech Student, KU Mar Baselios College of Engineering

More information

Comparison Between Wi-Fi and WiMAX

Comparison Between Wi-Fi and WiMAX ENSC 427: COMMUNICATION NETWORKS SPRING 2014 Comparison Between Wi-Fi and WiMAX http://www.sfu.ca/~luodil/427project.html Group 7 Chen, Carter 301141819 Luo, Di 301040237

More information

CHAPTER 6 ROUTING ALGORITHMS FOR WIMAX NETWORKS

CHAPTER 6 ROUTING ALGORITHMS FOR WIMAX NETWORKS CHAPTER 6 ROUTING ALGORITHMS FOR 802.16 WIMAX NETWORKS 6.1. INTRODUCTION The worldwide interoperability for microwave access (WiMAX) [34, 85, 86, 87], a new technology and solution for broadband wireless

More information

Collaboration of Cellular and Broadcast Networks for Media Transmission: A Technical Survey

Collaboration of Cellular and Broadcast Networks for Media Transmission: A Technical Survey Collaboration of Cellular and Broadcast Networks for Media Transmission: A Technical Survey Namratha N PG student, Department of Information Science and Engineering, BMSCE 1 ISE, BMSCE, (India) ABSTRACT

More information

T. P. Meenaa, A. Selvaraj Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India

T. P. Meenaa, A. Selvaraj Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 Routing Protocol for Heterogeneous Wireless Mesh

More information

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks Appl. Math. Inf. Sci. 8, No. 1L, 349-354 (2014) 349 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l44 Energy Optimized Routing Algorithm in Multi-sink

More information

Keynote Speakers CyberC 2010

Keynote Speakers CyberC 2010 Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential

More information

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1 IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. IV (May - Jun. 2014), PP 49-53 Analyzing the performance of WiMAX zone

More information

A Survey on Group Mobility Model and Handover in Mobile WiMAX Network

A Survey on Group Mobility Model and Handover in Mobile WiMAX Network A Survey on Group Mobility Model and Handover in Mobile WiMAX Network 1 Miss. Ishani R. Desai, 2 Prof. Krunal N. Patel 1 Departement of Electronics & Communication. Parul Institute Of Engineering & Technology,

More information

Error-Sensitive Adaptive Frame Aggregation in n WLANs

Error-Sensitive Adaptive Frame Aggregation in n WLANs Error-Sensitive Adaptive Frame Aggregation in 802.11n WLANs Melody Moh, Teng Moh, and Ken Chan Department of Computer Science San Jose State University San Jose, CA, USA Outline 1. Introduction 2. Background

More information

PUBLICATIONS. Journal Papers

PUBLICATIONS. Journal Papers PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.

More information

The Impact of Channel Bandwidth with Network Asymmetry in WiMAX Network Using TCP New Reno

The Impact of Channel Bandwidth with Network Asymmetry in WiMAX Network Using TCP New Reno International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 1 The Impact of Channel Bandwidth with Network Asymmetry in WiMAX Network Using TCP New Reno Kailash Chandra

More information

Video Streaming Over the Internet

Video Streaming Over the Internet Video Streaming Over the Internet 1. Research Team Project Leader: Graduate Students: Prof. Leana Golubchik, Computer Science Department Bassem Abdouni, Adam W.-J. Lee 2. Statement of Project Goals Quality

More information

E3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT

E3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT E3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT WELCOME This is a presentation for the E3-E4 Technical (CM- Module) for the Topic: WiMAX Overview & BSNL WiMAX Project Eligibility: Those who have

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,

More information

IEEE s ESS Mesh Networking

IEEE s ESS Mesh Networking IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE

More information

WiMAX Technology and Deployment for Last-Mile Wireless Broadband and Backhaul Applications

WiMAX Technology and Deployment for Last-Mile Wireless Broadband and Backhaul Applications White Paper WiMAX Technology and Deployment WiMAX Technology and Deployment for Last-Mile Wireless Broadband and Backhaul Applications Fujitsu Microelectronics America, Inc. August 2004 Contents Introduction

More information

Improvement of Handoff in Mobile WiMAX Networks Using Mobile Agents

Improvement of Handoff in Mobile WiMAX Networks Using Mobile Agents Improvement of Handoff in Mobile WiMAX Networks Using Mobile Agents Gabriel STOIAN Faculty of Mathematics and Informatics Department of Informatics 13 A.I. Cuza Street ROMANIA gstoian@yahoo.com Abstract:

More information

Mobile Broadband Communications

Mobile Broadband Communications Mobile Broadband Communications (WiMAX & LTE) Teaching By Asst.Prof.Dr. Suwat Pattaramalai suwat.pat@kmutt.ac.th Tel. 02-470-9079 3GPP WiMAX FORUM Mobile Broadband Communications Contents Part I Fundamentals

More information

Optimizing WiMAX: A Dynamic Strategy for Reallocation of Underutilized Downlink Sub-Frame to Uplink in TDD Mode

Optimizing WiMAX: A Dynamic Strategy for Reallocation of Underutilized Downlink Sub-Frame to Uplink in TDD Mode Int. J. Communications, Network and System Sciences, 2009, 2, 888-894 doi:10.4236/ijcns.2009.29103 Published Online December 2009 (http://www.scirp.org/journal/ijcns/). Optimizing WiMAX: A Dynamic Strategy

More information

Dr. Ahmed K. Sadek 2. Experience

Dr. Ahmed K. Sadek 2. Experience Dr. Ahmed K. Sadek Education University of Maryland, College Park Ph.D. in Electrical and Computer Engineering, GPA = 4.0/4.0, May 2007 Thesis title: Cross-Layer Design for Cooperative Communications and

More information

Questions & Answers From Thursday, September 16 Webinar Alternatives Case Examples Frequency and Spectrum Planning Security WiMAX Capabilities

Questions & Answers From Thursday, September 16 Webinar Alternatives Case Examples Frequency and Spectrum Planning Security WiMAX Capabilities Questions & Answers From Thursday, September 16 Webinar Alternatives Case Examples Frequency and Spectrum Planning Security WiMAX Capabilities Alternatives Q: How about PLC? Is it a viable alternative

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

Design and Development of Carrier Assignment and Packet Scheduling in LTE-A and Wi-Fi

Design and Development of Carrier Assignment and Packet Scheduling in LTE-A and Wi-Fi PhD Defense Design and Development of Carrier Assignment and Packet Scheduling in LTE-A and Wi-Fi Husnu S. Narman Outline Introduction Objective Multi-band in LTE-A Multi-band in Wi-Fi Conclusion Husnu

More information

Collaborative Next Generation Networking

Collaborative Next Generation Networking CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing

More information

Capacity Assurance in Hostile Networks

Capacity Assurance in Hostile Networks PhD Dissertation Defense Wednesday, October 7, 2015 3:30 pm - 5:30 pm 3112 Engineering Building Capacity Assurance in Hostile Networks By: Jian Li Advisor: Jian Ren ABSTRACT Linear network coding provides

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

Part 16: Air Interface for Fixed Broadband Wireless Access Systems

Part 16: Air Interface for Fixed Broadband Wireless Access Systems Draft IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Amendment for Improved Coexistence Mechanisms for License-Exempt Operation

More information

Coexistence goals of VoIP and TCP traffic in mobile WiMAX networks: Performance of flat architecture

Coexistence goals of VoIP and TCP traffic in mobile WiMAX networks: Performance of flat architecture Coexistence goals of VoIP and TCP traffic in mobile WiMAX networks: Performance of flat architecture ZORAN BOJKOVIC (1), DRAGORAD MILOVANOVIC (2) (1) Faculty of Transport and Traffic Engineering, University

More information

Implementation of Quality of Services (QoS) for Based Wireless Mesh Network

Implementation of Quality of Services (QoS) for Based Wireless Mesh Network Implementation of Quality of Services (QoS) for 802.16 Based Wireless Mesh Network Er. Gurpreet Kaur Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er. Jasbir Singh

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

Fiber-Wireless (FiWi) Access Networks

Fiber-Wireless (FiWi) Access Networks Fiber-Wireless (FiWi) Access Networks Eiman Alotaibi Department of Computer Science University of California, Davis Reference: N. Ghazisaidi, M. Martin, and C. Assi, Fiber-Wireless (FiWi) Access Networks:

More information

Initial PHY Layer System Proposal for Sub 11 GHz BWA

Initial PHY Layer System Proposal for Sub 11 GHz BWA Initial PHY Layer System Proposal for Sub 11 GHz BWA Document Number: 802.16.3p-00/40 Date Submitted: 2000-11-08 Source: Anader Benyamin-Seeyar Voice: (514) 822-2014 Harris Corporation Inc. Fax: (514)

More information

Internet Traffic Performance in IEEE Networks

Internet Traffic Performance in IEEE Networks Internet Traffic Performance in IEEE 802.16 Networks Dmitry Sivchenko 1,2,3, Nico Bayer 1,2,3, Bangnan Xu 1, Veselin Rakocevic 2, Joachim Habermann 3 1 T-Systems, SSC ENPS, Deutsche-Telekom-Allee 7, 64295

More information

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks Yen-Bin Lee and Wen-Shyang Hwang Department of Electrical Engineering, National Kaohsiung University of Applied Sciences,

More information

Mobile WiMAX EPL 657. Panayiotis Kolios

Mobile WiMAX EPL 657. Panayiotis Kolios Mobile WiMAX EPL 657 Panayiotis Kolios 1 WiMAX Based on the 802.16 suite of protocols Air interface OFDMA defined under 802.16-2004 Mobility enhancements made under 802.16e include multi-path performance

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

IJCSMS International Journal of Computer Science & Management Studies, Vol. 12, Issue 03, September 2012 ISSN (Online):

IJCSMS International Journal of Computer Science & Management Studies, Vol. 12, Issue 03, September 2012 ISSN (Online): Various handover processes in Wi-Max Deepak Nandal 1, Vikas Nandal 2 1 Asst Prof (CSE), PDM, Bahadurgarh dpk.nandal@yahoo.com 2 Asst. Prof (ECE) UIET, MDU, Rohtak, India nandalvikas@gmail.com Abstract

More information

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

CWC Centre for Wireless Communications. Ari Pouttu, Director - CWC

CWC Centre for Wireless Communications. Ari Pouttu, Director - CWC CWC Centre for Wireless Communications Ari Pouttu, Director - CWC 2 CWC Key Characteristics Project based operation, all funding outside university budget > 25 projects. Research partners include Tekes,

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Optimising Bit Error Rate and Power Consumption Through Systematic Approach for OFDM Systems

Optimising Bit Error Rate and Power Consumption Through Systematic Approach for OFDM Systems Optimising Bit Error Rate and Power Consumption Through Systematic Approach for OFDM Systems Ms.A.Vijayadev 1, Mr.T.Barath Kumar 1, Ms.A.Brinda Devi 1, Ms.P.S.Sivakami 1, Mrs.P.G.Padma Gowri 1 AP, Department

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Scheduling of real-time traffic in IEEE networks

Scheduling of real-time traffic in IEEE networks Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt

More information

Sujesh P. Lal VIT University, TN, INDIA

Sujesh P. Lal VIT University, TN, INDIA VoIP TRAFFIC SCHEDULING IN Sujesh P. Lal VIT University, TN, INDIA Introduction Popularity of Voice over IP (VoIP) applications such as Skype, Google Talk, and MSN Messenger along with emerging deployment

More information

Computer Science and Engineering Ira A. Fulton Schools of Engineering

Computer Science and Engineering Ira A. Fulton Schools of Engineering DEJUN YANG Computer Science and Engineering Ira A. Fulton Schools of Engineering 480-252-4741 Arizona State University dejun.yang@asu.edu Tempe, Arizona 85281 http://www.public.asu.edu/~dyang16/ EDUCATION

More information

Connectivity based Handoff Scheme for WiMAX

Connectivity based Handoff Scheme for WiMAX Connectivity based Handoff Scheme for WiMAX Chandan Kumar Invertis University, India Ravi Shankar Shukla Saudi Electronics University Gaurav Agarwal Invertis University, India ABSTRACT Now days, Wireless

More information

Led by Prof. Hamid Aghvami Presented by Dr. Xiaoli Chu. UK-China Science Bridges: R&D on 4G Wireless Mobile Communications

Led by Prof. Hamid Aghvami Presented by Dr. Xiaoli Chu. UK-China Science Bridges: R&D on 4G Wireless Mobile Communications Led by Prof. Hamid Aghvami Presented by Dr. Xiaoli Chu 1 Introduction Future Work Research Areas Research Projects Statistics 2 King s College London was founded in 1829 and is the fourth oldest university

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

A Heuristic Strategy for IEEE WiMAX scheduler for Quality of Service

A Heuristic Strategy for IEEE WiMAX scheduler for Quality of Service A Heuristic Strategy for IEEE 802.16 WiMAX scheduler for Quality of Service G.S. Paschos, I. Papapanagiotou, C.G. Argyropoulos and S.A. Kotsopoulos Wireless Telecommunication Laboratory Electrical and

More information

A Multi-Commodity Flow Model for Optimal Routing in Wireless MESH Networks

A Multi-Commodity Flow Model for Optimal Routing in Wireless MESH Networks JOURNAL OF NETWORKS, VOL., NO. 3, JUNE 7 A Multi-Commodity Flow Model for Optimal Routing in Wireless MESH Networks Antonio Capone, Fabio Martignon DEI, Politecnico di Milano, Piazza L. da Vinci 3, 33

More information

Operator Controlled Device-to-Device Neighborhood Area Networks: The NSFC D2D-NAN Project

Operator Controlled Device-to-Device Neighborhood Area Networks: The NSFC D2D-NAN Project Operator Controlled Device-to-Device Neighborhood Area Networks: The NSFC D2D-NAN Project 1 Lingyang Song School of Electrical Engineering and Computer Science Peking University, Beijing, China lingyang.song@pku.edu.cn

More information

A Study On Broadband Wireless Access-Wimax

A Study On Broadband Wireless Access-Wimax A Study On Broadband Wireless Access-Wimax Pankaj Chouhan & S. R. Mansore Department of Electronics & Communication, Ujjain Engineering College, Ujjain Abstract- The IEEE 802.16 standard, commonly known

More information

Cross Layer Design in d

Cross Layer Design in d Australian Journal of Basic and Applied Sciences, 3(3): 59-600, 009 ISSN 99-878 Cross Layer Design in 80.6d Ali Al-Hemyari, Y.A. Qassem, Chee Kyun Ng, Nor Kamariah Noordin, Alyani Ismail, and Sabira Khatun

More information

G.epon and Current Status of Related Standardization

G.epon and Current Status of Related Standardization G.epon and Current Status of Related Standardization Ken-Ichi Suzuki Abstract G.epon is an ITU-T (International Telecommunication Union, Telecommunication Standardization Sector) version of the system-level

More information

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018 White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com

More information

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 3 Version 1.0 March 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global

More information

Accountability of WMNs using BEB Algorithm

Accountability of WMNs using BEB Algorithm Accountability of WMNs using BEB Algorithm Shafi Jasuja Department of Information Technology Chandigarh Engineering College, Landran, Mohali, Punjab, India Parminder Singh Department of Information Technology

More information