MAC Overview NCHU CSE WMAN - 1

Size: px
Start display at page:

Download "MAC Overview NCHU CSE WMAN - 1"

Transcription

1 MAC Overview NCHU CSE WMAN - 1

2 MAC Overview Connection-oriented Supports difficult user environments High bandwidth, hundreds of users per channel For variable Continuous and Burst traffic Very efficient use of spectrum Protocol-Independent core (ATM, IP, Ethernet, ) Balances between stability of contentionless and efficiency of contention-based operation Negotiate the burst profile between sender and receiver Flexible QoS offerings CBR, rt-vbr, nrt-vbr, BE, ERT-VR(16e and 16m) Supports multiple PHYs Handover NCHU CSE WMAN - 2

3 Protocol Stack Packet convergence Sublayer (PCS) ATM Packet SSCS (security sublayer ) NCHU CSE WMAN - 3

4 Fixed + Mobile Standard NCHU CSE WMAN - 4

5 Features NCHU CSE WMAN - 5

6 Brief Functions Convergence Sublayer (CS) Mapping external network data into MAC SDU» Classifying external network SDU» Associating to MAC connection ID» Payload header suppression (PHS) Common Part Sublayer (CPS) Core MAC functionality» System access» Bandwidth allocation» Connection establishment» Connection maintenance» Handover and Power management Security Sublayer PHY» Authentication (RSA X.509/EAP)» Security key exchange (3DES)» Encryption (AES) Multiple sections NCHU CSE WMAN - 6

7 Service Specific Convergence Sublayer (SSCS) The CS performs the following functions: accepting higher-layer PDUs from the higher layer performing classification of higher-layer PDUs processing (if required) the higher-layer PDUs based on the classification delivering CS PDUs to the appropriate MAC SAP receiving CS PDUs from the peer entity Currently, two CS specifications are provided Asyncronous Transfer Mode (ATM) CS Packet CS» Such as IP, PPP, Ethernet, etc., Other CSs may be specified in the future. NCHU CSE WMAN - 7

8 Packet Convergence Sublayer (PCS) Packet convergence sublayer (PCS) The packet CS resides on top of the Common Part Sublayer (CPS) The PCS performs the following functions, utilizing the services of the MAC sublayer: a) Classification of the higher-layer protocol PDU into the appropriate connection b) Suppression of payload header information (optional) c) Delivery of the resulting CS PDU to the MAC SAP associated with the service flow for transport to the peer MAC SAP d) Receipt of the CS PDU from the peer MAC SAP e) Rebuilding of any suppressed payload header information (optional) NCHU CSE WMAN - 8

9 Packet Packet Process Procedure A classifier is a set of matching criteria applied to each packet It consists of some protocol-specific packet matching criteria (destination IP address, for example), a classifier priority, and a reference to a CID. The service flow characteristics of the connection provide the QoS for that packet Several classifiers may each refer to the same service flow. (many to one) Downlink classifiers are applied by the BS to packets and uplink classifiers are applied at the SS. A packet fails to match the set of defined classifiers. CS/SS shall discard the packet. Classifier(s) CID CID/SFID PHSI mapper SFID SFID/QoS mapper SFID/PHSI (sender) CID/PHSI (receiver) PHS ruler QoS Parameters (used in scheduler) NCHU CSE WMAN - 9

10 Object model Each object has a number of attributes the attribute names that uniquely identify it are underlined. Optional attributes are denoted with brackets. NCHU CSE WMAN - 10

11 Classifications A MAC SDU is mapped onto a particular connection for transmission between MAC peers According to protocol-specific packet matching criteria (e.g. destination IP address), classifier priority and a reference to a CID (connection ID)» creates an association with the service flow ID (SFID) 32 bits service flow ID (SFID) (32 bits) Conn. ID (CID) (16 bits) PHS CID+PHSI PHS NCHU CSE WMAN - 11

12 Classifications PHS service flow ID (SFID) Conn. ID (CID) NCHU CSE WMAN - 12

13 Classifications A MAC SDU is mapped onto a particular connection for transmission between MAC peers according to protocol-specific packet matching criteria (e.g. IP address), classifier priority and a reference to a CID. SS and BS use multiple classifiers. Each classifier contains a priority field which determines the search order for the classifier. Searching algorithm is similar to policy-based search algorithm (e.g. Firewall) Classifiers can be added by dynamic signaling. Simple Network Management Protocol (SNMP)- based operations can only view Classifiers, no add/delete NCHU CSE WMAN - 13

14 Common Part Sublayer (CPS) The MAC CPS provides the core MAC functionality of system access, bandwidth allocation, connection establishment, and connection maintenance: a) System Access b) Bandwidth Request/Allocation c) Connection Establishment/Maintenance e) Quality of Service (QoS) NCHU CSE WMAN - 14

15 Security Sublayer The security sublayer providing a) authentication, b) secure key exchange c) Encryption Two component protocols Encapsulation protocol» Cryptographic suites Privacy and Key management protocol (PKMv1/v2)» Create and exchange Traffic Encryption Key (TEK) PKM Identifier (one byte)» SS uses the identifier to match a BS response to the SS requests.» In PKMv1, only SS keeps track of the identifier. (w/o mobility)» In PKMv2, both SS and BS keep track of the identifier. (w/ mobility) NCHU CSE WMAN - 15

16 Payload Header Suppression (PHS) For some payload protocols, each payload consists of an 8-bit payload header suppression index (PHSI) followed by the actual payload. A value of zero in the PHSI indicates no payload header suppression has been applied to the PDU. Otherwise, the value in the index identifies the rules for suppression. MAC header 8-bit PHSI denotes the payload header suppression field (PHSF) NCHU CSE WMAN - 16

17 Payload Header Suppression (PHS) If PHS is enabled at MAC connection, each MAC SDU is prefixed with a PHSI, which references the Payload Header Suppression Field (PHSF). The classifier uniquely maps packets to its associated PHS Rule. The receiving entity uses the CID and the PHSI to restore the PHSF. (CID+PHSI PHSF/PHSM/PHSS) When a classifier is deleted, any associated PHS rule shall also be deleted. NCHU CSE WMAN - 17

18 PHS operation NCHU CSE WMAN - 18

19 Payload Header Suppression (PHS) Rule Payload header suppression valid (PHSV) : option to verify or not verify the payload header before suppressing it Payload header suppression mask (PHSM) option to allow select bytes not to be suppressed. Such as IP sequence numbers should not be supressed Payload header suppression size (PHSS) Payload header suppression field (PHSF) Payload header suppression index (PHSI) Service flow ID (SFID). PHS rules are indexed by the combination of (SFID, PHSI) Preconfigured header format or higher-level signaling protocols are outside the scope of specification NCHU CSE WMAN - 19

20 PHS with masking A,C,E are compressed Only sends B and E NCHU CSE WMAN - 20

21 PHS Rules The BS shall define the PHSI when the PHS Rule is created The SS or BS may define the PHSS and PHSF. To change the value of a PHSF on a service flow, a new PHS rule shall be defined It is possible to partially specify a PHS rule (in particular the size of the rule) at the time a service flow is created Values of some fields [for example: IP addresses, User Datagram Protocol (UDP) port numbers, etc.] may be unknown and would be provided in a subsequent DSC as part of the activation of the service flow using the Set PHS Rule DSC Action Dynamic Service Change NCHU CSE WMAN - 21

22 PHS Signaling PHS requires the creation of the following three objects: a) Dynamic Service Flow (DSA/DSC/DSD) Addition/Change/Deletion b) Classifier c) PHS rule (PHSI is assigned by BS) NCHU CSE WMAN - 22

23 Connection ID (CID) A unidirectional mapping between BS and SS MAC peers for the purpose of transporting a service flow s traffic Connections are identified by a connection identifier (CID) All traffic is carried on a connection, even for service flows that implement connectionless protocols CID maps to a service flow identifier (SFID), which defines the Quality of Service (QoS) parameters of the service flow associated with that connection. Security associations (SAs) also exist between keying material and CIDs. NCHU CSE WMAN - 23

24 Connection ID (CID) Connections are identified by a 16-bit CID At SS initialization, three management connections in each direction (uplink and downlink) shall be established between the SS and the BS. The basic connection is used for exchanging short, timeurgent management messages.» such as DBPC-REQ/RSP : Downlink Burst Profile Change Req/Rsp, RNG-REQ/RSP : Ranging Req/Rsp The primary management connection is used for exchanging longer, more delay tolerant MAC management messages.» Such as DSA/DSC/DSD_REQ/RSP/ACK, REG_REQ/RSP The Secondary Management Connection is used for transferring delay tolerant, standards based DHCP, TFTP, SNMP, etc., management messages. (IP-based packets) NCHU CSE WMAN - 24

25 Connection ID (CID) BS returns Basic CID and Primary CID to SS via RNG-RSP messages. BS returns Secondary CID to SS via REG-RSP messages (optional). The same CID value is assigned to both members (uplink and downlink) of each connection pair. Many higher-layer sessions may operate over the same wireless CID. NCHU CSE WMAN - 25

26 Connection ID (CID) NCHU CSE WMAN - 26

27 CIDs e NCHU CSE WMAN - 27

28 Multicast and Broadcast Connections Any available traffic CID value may be used for the service SSs do not know its is multicast/broadcast Connections (MBS only from the BS view) ARQ is not applicable to multicast connections. If a downlink multicast connection is to be encrypted, each SS participating in the connection shall have an additional security association (SA) Issue : MBS in e NCHU CSE WMAN - 28

29 Envelopes Setup by BS authorized envelope provisioned authorization model dynamic authorization model NCU MWNL WMAN Service Flow - 29

30 Service Flow Addition 3-way handshaking SS-initiated DSA DSX-RVD (DSx Received) BS-initiated DSA NCHU CSE WMAN - 30

31 Service Flow Change provisioned SS-initiated DSC BS-initiated DSC NCHU CSE WMAN - 31

32 QoS (16e-2005) Global service flows Global service class names and associated AuthorizedQoSParamSets Global service class names are employed as a baseline convention for communicating AuthorizedQoSParamSet or AdmittedQoSParamSet Different from service class name (in ) 1. may not be modified by BS 2. remain consistent among all BS 3. rules-based naming system whereby the global service class name itself contains referential QoS Parameter codes. composite name parsed in nine information fields of format ISBRLSPTR (ISTBRLSPR), elements reference extensible lookup tables. NCHU CSE WMAN - 32

33 Global service flow class name (2005) NCHU CSE WMAN - 33

34 Global service flow class name (2005) parameters Uplink/Downlink indicator Maximum sustained traffic rate» peak information rate» does not include transport, protocol, or network overhead» specifies only a bound, not a guarantee that the rate is available.» The algorithm for policing this parameter is left to vendor differentiation and is outside the scope of the standard. Traffic Indication Preference Maximum traffic burst Minimum reserved traffic rate Maximum latency SDU indicator» fixed-length or variable-length Paging Preference NCHU CSE WMAN - 34

35 Rate NCHU CSE WMAN - 35

36 Delay NCHU CSE WMAN - 36

37 MAC Protocol NCHU CSE WMAN - 37

38 MAC overview Subscriber stations share the uplink to the BS on a demand basis. Four different types of uplink scheduling mechanisms Unsolicited bandwidth grants (CBR) Polling (unicast polling)» guarantees applications receive service on a deterministic basis (delay tolerant services) Contention procedures» contention may be used to avoid individual polling of SSs that have been inactive for a long period (multicast/broadcast polling) Bandwidth stealing» a portion of the bandwidth allocated in response to a bandwidth request for a connection to send another bandwidth request rather than sending data Piggyback (via grant subheader ; w/o scheduling) NCHU CSE WMAN - 38

39 MAC overview Service flows provide a mechanism for uplink and downlink QoS management. In particular, they are integral to the bandwidth allocation process. An SS requests uplink bandwidth on a per connection basis (implicitly identifying the service flow). Bandwidth is granted by the BS to an SS as an aggregate of grants in response to per connection requests from the SS. NCHU CSE WMAN - 39

40 Scheduling services Each connection is associated with a single data service. Each data service is associated with a set of QoS parameters. Managed using the DSA and DSC message dialogs. Four services are supported in Unsolicited Grant Service (UGS), Real-time Polling Service (rtps), Non-real-time Polling Service (nrtps), and Best Effort (BE). Five services are supported in e-2005 UGS (Unsolicited Grant Service) RT-VR (Real-Time - Variable Rate Service) NRT-VR (Non-Real Time - Variable Rate service) BE (Best Efforts) ERT-VR (Extended Real-Time Variable Rate) NCHU CSE WMAN - 40

41 IEEE m Service classes Real-time constant bit-rate (e.g., VoIP without silence suppression) Extended real-time variable bit-rate (e.g., VoIP with silence suppression) Real-time variable bit-rate (e.g., MPEG video) Non-real time variable bit-rate (e.g., FTP, HTTP) Best effort (e.g., ) RT-CBR ERT-VR RT-VR NRT-VR BE Data generated interval Periodic Periodic Periodic Dynamic Dynamic Packet size Fixed Fixed/ dynamic Dynamic Dynamic Dynamic Delay sensitivity High High High Middle Low NCHU CSE WMAN - 41

42 Unsolicited Grant Service (UGS) support real-time data streams consisting of fixed-size data packets issued at periodic intervals Such as T1/E1 and Voice over IP without silence suppression mandatory QoS service flow parameters Maximum Sustained Traffic Rate Maximum Latency Tolerated Jitter Request/Transmission Policy (option) Minimum Reserved Traffic Rate parameter» If present, equals to Maximum Sustained Traffic Rate parameter. In e, UGS is able to support variable length PDUs. Maximum Sustained Traffic Rate is removed Add Unsolicited Grant Interval and SDU size (if fixed) NCHU CSE WMAN - 42

43 Unsolicited Grant Service (UGS) The BS shall provide Data Grant Burst IEs to the SS at periodic intervals based upon the Maximum Sustained Traffic Rate of the service flow. The Grant Management subheader is used to pass status information from the SS to the BS regarding the state of the UGS service flow. Slip Indicator (SI) bit : set when service flow has exceeded its transmit queue depth Poll-me (PM) bit : is used to request to be polled for a different, non-ugs connection. Request : contention-free access NCHU CSE WMAN - 43

44 Real-time Polling Service (rtps) support real-time data streams consisting of variable-sized data packets that are issued at periodic intervals Such as moving pictures experts group (MPEG) video. mandatory QoS service flow parameters Minimum Reserved Traffic Rate Maximum Sustained Traffic Rate Maximum Latency Request/Transmission Policy In e,» SS uses only unicast poll request opportunities in order to obtain uplink transmission opportunities» use unsolicited Data Grant Burst Types for uplink transmission as well» contention-free manner Add Traffic priority and Unsolicited Polling Interval NCHU CSE WMAN - 44

45 Non-real-time Polling Service (nrtps) support delay-tolerant data streams consisting of variable-sized data packets for which a minimum data rate is required such as FTP mandatory QoS service flow parameters Minimum Reserved Traffic Rate Maximum Sustained Traffic Rate Traffic Priority Request/Transmission Policy» unicast poll : BS typically polls nrtps CIDs on an interval on the order of one second or less» timely unicast request opportunities : contention access» unsolicited Data Grant Burst Types NCHU CSE WMAN - 45

46 Best Effort (BE) support data streams for which no minimum service level is required and therefore may be handled on a space-available basis. mandatory QoS service flow parameters Maximum Sustained Traffic Rate Traffic Priority Request/Transmission Policy» contention request opportunities» Piggyback» Bandwidth steal» Polling NCHU CSE WMAN - 46

47 Extended Real-Time Variable Rate (ERT-VR) service support real-time applications with variable datarates, which require guaranteed data and delay, for example VoIP with silence suppression. QoS parameters (combines UGS and RT-VR) Maximum Latency Tolerated Jitter Minimum Reserved Traffic Rate Maximum Sustained Traffic Rate Traffic Priority Request/Transmission Policy Unsolicited Grant Interval NCHU CSE WMAN - 47

48 Outbound transmission scheduling is performed by BS for downlink, SS for uplink the following items are taken into account for each active service flow: The scheduling service specified for the service flow. The values assigned to the service flow s QoS parameters. The availability of data for transmission. The capacity of the granted bandwidth NCHU CSE WMAN - 48

49 QoS Scheduler NCHU CSE WMAN - 49

50 Outbound Transmission Scheduling NCHU CSE WMAN - 50

MAC layer: structure and QoS support. PhD student: Le Minh Duong

MAC layer: structure and QoS support. PhD student: Le Minh Duong 802.16 MAC layer: structure and QoS support PhD student: Le Minh Duong Content 1. Introduction 2. 802.16 MAC layer 2.1. MAC Service-Specific Convergence Sublayer 2.2. Common Part Sublayer 3. QoS support

More information

Institute of Electrical and Electronics Engineers (IEEE)

Institute of Electrical and Electronics Engineers (IEEE) 2006-03-08 IEEE L802.16-06/004 INTERNATIONAL TELECOMMUNICATION UNION RADIOCOMMUNICATION STUDY GROUPS Document 8A/IEEE-2-E Document 8F/IEEE-1-E 8 March 2006 English only Received: TECHNOLOGY Subject: Question

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < IEEE C802.16maint-08/063r4 Project Title IEEE 802.16 Broadband Wireless Access Working Group ROHC Classification Changes Date Submitted Source(s) 2008-01-24 Muthaiah Venkatachalam

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Procedures Clarifications and Improvement for MBS Logical Channel support in 802.16REV2 2008-04-20

More information

IEEE MAC and PHY Specifications for Broadband WMAN

IEEE MAC and PHY Specifications for Broadband WMAN IEEE 802.16 MAC and PHY Specifications for Broadband WMAN 中央大學通訊系許獻聰 E-mail: stsheu@ce.ncu. edu.tw TKU HSNL WMAN - 1 Resources Part Source : Roger B. Marks, National Institute of Standards and Technology

More information

Wireless Communication. IEEE Wireless Metropolitan Area Network (wman)

Wireless Communication. IEEE Wireless Metropolitan Area Network (wman) 1 IEEE 802.16 Wireless Metropolitan Area Network (wman) 2 Existing Data Network Hierarchy Level Typical Connections Wired Technologies Wireless Technologies Personal Area (PAN) Peripherals and personal

More information

SS Initialization Overview

SS Initialization Overview SS Initialization Overview Downlink Sync Auth. Key Xchange Get Uplink Parameters Setup Time Ranging Register Download Configuration File Capability Negotiation DHCP Setup connection and service flow (provisioned

More information

Nokia Fax:

Nokia Fax: 2002-09-11 IEEE C802.16c-02/09 Project Title Date Submitted 2002-09-11 IEEE 802.16 Broadband Wireless Access Working Group Editorial instructions pertaining to comments submitted

More information

Protocol Implementation Conformance Statement for IEEE Standard

Protocol Implementation Conformance Statement for IEEE Standard 00-0- IEEE C..-0/0 Protocol Implementation Conformance Statement for IEEE Standard 0.-00 00-0- WiMAX PICS v... 0 Contents Foreword... Introduction.... Scope.... References.... Definitions and Abbreviations....

More information

Performance Evaluation of WiFiRe using OPNET

Performance Evaluation of WiFiRe using OPNET Performance Evaluation of WiFiRe using OPNET Under the guidance of: Prof. Sridhar Iyer and Prof. Varsha Apte Dept. of CSE (KReSIT) July 16, 2007 Goal Goal Building. Finding minimum slot length to support

More information

Media Access Control Protocol Based on DOCSIS 1.1

Media Access Control Protocol Based on DOCSIS 1.1 Document Number: IEEE 802.16mp-99/16 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: 1999-11-08 Source: Karl Stambaugh Voice: 480-441-7842 Motorola Inc. Fax: 480-675-2116 8220

More information

Evaluating VoIP using Network Simulator-2

Evaluating VoIP using Network Simulator-2 Athens University of Economic and Business Evaluating VoIP using Network Simulator-2 June 2007 Author: Papantonakos Manos Supervisor Prof.: George Xylomenos Co-Supervisor Prof: George Polyzos About WiMax

More information

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group < 2004-05-172004-05-17 IEEE C802.16e-04/67r1 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Enhancement of 802.16e to Support Secure EAP PKM messages

More information

Document Number: IEEE mp-00/01 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: Source: Glen Sater Voice:

Document Number: IEEE mp-00/01 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: Source: Glen Sater Voice: Document Number: IEEE 802.16.1mp-00/01 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: 1999-12-23 Source: Glen Sater Voice: 480-441-8893 Motorola Inc. Fax: 480-675-2116 8220 E.

More information

A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX

A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX Abdalla A\ Alrahman Mohamed Abdalla 1, Dr. Amin Babiker A\ Nabi 2, Dr. Ashraf A. Osman 3 1,2,3 Department of communication,

More information

Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX

Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX Siddu P. Algur Departmentof Computer Science Rani Chennamma University Belgaum, India Niharika Kumar Department of Information

More information

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS 1999-10-29 Source Phil Guillemette SpaceBridge Networks Corporation

More information

IEEE Broadband Wireless Access Working Group < Changes in Definition of Data Delivery Services

IEEE Broadband Wireless Access Working Group <  Changes in Definition of Data Delivery Services Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Changes in Definition of Data Delivery Services 25-June-2004 Source(s) Re: Vladimir Yanover et al

More information

IEEE m Reference Model

IEEE m Reference Model CHAPTER IEEE 802.16m Reference Model 3 and Protocol Structure INTRODUCTION The IEEE 802.16-2009 standard defines a generic reference model where major functional blocks (i.e., physical layer, security

More information

Multicast and broadcast support in AeroMACS

Multicast and broadcast support in AeroMACS EUROCONTROL AeroMACS Technical Support Version: Working draft Multicast and broadcast support in AeroMACS Note Identifier: Author Elaboration date: AT4_ECTL_TN#18 AT4 wireless (under contract with EUROCONTROL)

More information

IEEE C802.16maint-08/064r3

IEEE C802.16maint-08/064r3 Project Title IEEE 802.16 Broadband Wireless Access Working Group Clarification and Fixes in the MBS definitions and procedures Date Submitted Source(s) 2008-03-10 Kamran Etemad

More information

7/27/2010 LTE-WIMAX BLOG HARISHVADADA.WORDPRESS.COM. QOS over 4G networks Harish Vadada

7/27/2010 LTE-WIMAX BLOG HARISHVADADA.WORDPRESS.COM. QOS over 4G networks Harish Vadada 7/27/2010 HARISHVADADA.WORDPRESS.COM LTE-WIMAX BLOG QOS over 4G networks Harish Vadada Cellular network operators across the world have seen an explosive growth of mobile broadband usage. Traffic volume

More information

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer

More information

IEEE C802.16maint-08/064r4

IEEE C802.16maint-08/064r4 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Clarifications and Improvement in the MBS definitions and procedures in 802.16REV2 2008-03-17 Source(s)

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Multicast and Quality of Service. Internet Technologies and Applications

Multicast and Quality of Service. Internet Technologies and Applications Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering

More information

Quality of Service (QoS) Provisioning in Interconnected Packed-based Networks

Quality of Service (QoS) Provisioning in Interconnected Packed-based Networks ITU Regional Standardization Forum for Africa Livingstone, Zambia 16-18 March 2016 Quality of Service (QoS) Provisioning in Interconnected Packed-based Networks Yvonne Umutoni, Quality of Service Development

More information

Preliminary Performance Evaluation of QoS in DOCSIS 1.1

Preliminary Performance Evaluation of QoS in DOCSIS 1.1 The University of Kansas Technical Report Preliminary Performance Evaluation of QoS in DOCSIS 1.1 Gayathri Chandrasekaran, Mohammed Hawa and David W. Petr ITTC-FY2003-TR-22736-01 January 2003 Sponsor:

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

QoS Policy Parameters

QoS Policy Parameters CHAPTER 6 This chapter describes the parameters, both required and optional, for QoS provisioning using the ISC user interface. Service level QoS parameters include all entry fields in the VoIP, Management,

More information

WiMAX Vs Wi-Fi. 3G Evolution (source: Nokia) Wireless Systems. WiMAX

WiMAX Vs Wi-Fi. 3G Evolution (source: Nokia) Wireless Systems. WiMAX 3G Evolution (source: Nokia) WiMAX Vs Wi-Fi ผศ.ดร.ส ร นทร ก ตต ธรก ล ภาคว ชาว ศวกรรมคอมพ วเตอร คณะว ศวกรรมศาสตร สถาบ นเทคโนโลย พระจอมเกล าเจ าค ณทหารลาดกระบ ง 2 Wireless Systems WiMAX Worldwide Interoperability

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

L2VPN Support on Cable

L2VPN Support on Cable The Layer 2 VPN (L2VPN) Support over Cable feature on the Cisco CMTS provides point-to-point Transparent LAN Service (TLS) in support of the Business Services over DOCSIS (BSOD) Cable Labs specification.

More information

ETSI TS V2.4.1 ( ) Technical Specification

ETSI TS V2.4.1 ( ) Technical Specification TS 102 385-2 V2.4.1 (2007-10) Technical Specification Broadband Radio Access Networks (BRAN); HiperMAN; Conformance Testing for WiMAX/HiperMAN 1.2.1; Part 2: Test Suite Structure and Test Purposes (TSS&TP)

More information

ATM Logical Connections: VCC. ATM Logical Connections: VPC

ATM Logical Connections: VCC. ATM Logical Connections: VPC ATM Logical Connections: VCC Logical Connections in ATM are referred to as virtual channel connections (VCCs). Virtual channel (VC) is a generic term used to describe unidirectional transport of ATM cells

More information

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE 802.16 based WiMAX Network Vinit Grewal Department of Electronics and Communication Engineering National Institute of Technology

More information

Delay Analysis of IEEE Wireless Metropolitan Area Network

Delay Analysis of IEEE Wireless Metropolitan Area Network Delay Analysis of IEEE 802.16 Wireless Metropolitan Area Network Zsolt Saffer Technical University of Budapest 1521 Budapest Hungary safferzs@hit.bme.hu Sergey Andreev State University of Aerospace Instrumentation

More information

IEEE /15. IEEE Broadband Wireless Access Working Group < Title Interpretation of IEEE Standard 802.

IEEE /15. IEEE Broadband Wireless Access Working Group <  Title Interpretation of IEEE Standard 802. Project IEEE 802.16 Broadband Wireless Access Working Group Title Interpretation of IEEE Standard 802.16 Date Submitted 2002-03-15 Source(s) Roger Marks Voice: +1 303 497 3037 mailto:r.b.marks@ieee.org

More information

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16>

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16> Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group A new method to enhance the network entry and re-entry procedures in PMP mode 2004-11-02 Source(s)

More information

Protocol Architecture (diag) Computer Networks. ATM Connection Relationships. ATM Logical Connections

Protocol Architecture (diag) Computer Networks. ATM Connection Relationships. ATM Logical Connections 168 430 Computer Networks Chapter 11 Asynchronous Transfer Mode Protocol Architecture Similarities between ATM and packet switching Transfer of data in discrete chunks Multiple logical connections over

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

IEEE C802.16e-04/201. Project. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-04/201. Project. IEEE Broadband Wireless Access Working Group < IEEE C802.16e-04/201 Project IEEE 802.16 Broadband Wireless Access Working Group Title Enhanced Broadcast/Multicast Capabilities of 802.16e Date Submitted 2004-06-25 Source(s) Yong

More information

PREFACE. The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie ( )

PREFACE. The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie ( ) PREFACE The average Ph.D. thesis is nothing but a transference of bones from one graveyard to another. J. Frank Dobie (1888-1964) The recent standard IEEE 802.16 for fixed Broadband Wireless Access (BWA)

More information

Cisco CMTS Router Quality of Service Features Configuration Guide

Cisco CMTS Router Quality of Service Features Configuration Guide First Published: 2008-02-14 Last Modified: 2015-02-15 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

William Stallings Data and Computer Communications 7 th Edition. Chapter 11 Asynchronous Transfer Mode

William Stallings Data and Computer Communications 7 th Edition. Chapter 11 Asynchronous Transfer Mode William Stallings Data and Computer Communications 7 th Edition Chapter 11 Asynchronous Transfer Mode Protocol Architecture Similarities between ATM and packet switching Transfer of data in discrete chunks

More information

Solutions to Performance Problems in VoIP Over a Wireless LAN

Solutions to Performance Problems in VoIP Over a Wireless LAN Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular

More information

Sujesh P. Lal VIT University, TN, INDIA

Sujesh P. Lal VIT University, TN, INDIA VoIP TRAFFIC SCHEDULING IN Sujesh P. Lal VIT University, TN, INDIA Introduction Popularity of Voice over IP (VoIP) applications such as Skype, Google Talk, and MSN Messenger along with emerging deployment

More information

Comparative Assessments for Different WiMAX Scheduling Algorithms

Comparative Assessments for Different WiMAX Scheduling Algorithms Proceedings of the World Congress on Engineering and Computer Science 9 Vol I WCECS 9, October -, 9, San Francisco, USA Comparative Assessments for Different WiMAX Scheduling Algorithms Ahmed H. Rashwan,

More information

Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation Mechanism

Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation Mechanism 2007-01-15 IEEE C802.16j-07/034r1 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation

More information

QoS in a SOHO Virtual Private Network for IP Telephony

QoS in a SOHO Virtual Private Network for IP Telephony CHAPTER 5 QoS in a SOHO Virtual Private Network for Telephony This chapter provides information about implementing QoS in an AVVID-enabled Small Office Home Office (SOHO) Virtual Private Network (VPN)

More information

Quality of Service Commands policy-map. This command has no default behavior or values.

Quality of Service Commands policy-map. This command has no default behavior or values. Quality of Service Commands policy-map policy-map To create or modify a policy map that can be attached to one or more interfaces to specify a service policy, use the policy-map global configuration command.

More information

Keywords- IEEE , WiMAX, QoS, CBR, Mobility.

Keywords- IEEE , WiMAX, QoS, CBR, Mobility. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A QoS Oriented

More information

ETSI TS V2.2.1 ( )

ETSI TS V2.2.1 ( ) TS 102 385-2 V2.2.1 (2006-06) Technical Specification Broadband Radio Access Networks (BRAN); HiperMAN/WiMAX; Conformance testing for the Data Link Control Layer (DLC); Part 2: Test Suite Structure and

More information

Mobile WiMAX EPL 657. Panayiotis Kolios

Mobile WiMAX EPL 657. Panayiotis Kolios Mobile WiMAX EPL 657 Panayiotis Kolios 1 WiMAX Based on the 802.16 suite of protocols Air interface OFDMA defined under 802.16-2004 Mobility enhancements made under 802.16e include multi-path performance

More information

Flexible Resource Allocation in IEEE Wireless Metropolitan Area Networks

Flexible Resource Allocation in IEEE Wireless Metropolitan Area Networks Flexible Resource Allocation in IEEE 802.16 Wireless Metropolitan Area Networks Spyros A. Xergias, Nikos Passas and Lazaros Merakos Communication Networks Laboratory Department of Informatics & Telecommunications

More information

Qos Analysis Of Wimax Network

Qos Analysis Of Wimax Network Qos Analysis Of Wimax Network 802.16 Gurpal Singh Sidhu 1, Sandeep Kaushal 2, Dr. Vijay Kumar Banga 3 1 M-Tech scholar, Department of Electronics and Communication Engineering, Amritsar College of Engineering

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS ATM SERVICE CATEGORIES Service Categories : represent particular combinations of traffic parameters and QoS parameters. These parameters are determined by users for a

More information

ACL Rule Configuration on the WAP371

ACL Rule Configuration on the WAP371 Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy)

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy) ATM Asynchronous Transfer Mode (and some SDH) (Synchronous Digital Hierarchy) Why use ATM? Circuit switched connections: After initial setup no processing in network nodes Fixed bit rates, fixed time delay

More information

NCTUns Simulation Tool for WiMAX Modeling

NCTUns Simulation Tool for WiMAX Modeling NCTUns Simulation Tool for WiMAX Modeling (Invited Paper) Shiang-Ming Huang smhuang@csnctuedutw Ya-Chin Sung ycsung@csienctuedutw Yi-Bing Lin liny@linycsienctuedutw Shie-Yuan Wang shieyuan@csienctuedutw

More information

Fragmenting and Interleaving Real-Time and Nonreal-Time Packets

Fragmenting and Interleaving Real-Time and Nonreal-Time Packets CHAPTER 16 Fragmenting and Interleaving Real-Time and Nonreal-Time Packets Integrating delay-sensitive real-time traffic with nonreal-time data packets on low-speed links can cause the real-time packets

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

DESIGN AND IMPLEMENTATION OF IEEE MAC LAYER SIMULATOR

DESIGN AND IMPLEMENTATION OF IEEE MAC LAYER SIMULATOR DESIGN AND IMPLEMENTATION OF IEEE 802.16 MAC LAYER SIMULATOR H. M. Shamitha 1, H. M. Guruprasad 1, Kishore. M 2, Ramesh. K 3 Department of Electronics and Communication 1 Proudadhevaraya Institute of Technology,

More information

Implementation and Evaluation of a MAC Scheduling Architecture for IEEE WirelessMANs

Implementation and Evaluation of a MAC Scheduling Architecture for IEEE WirelessMANs Implementation and Evaluation of a MAC Scheduling Architecture for IEEE 802.16 WirelessMANs by Abhishek Maheshwari Department of Computer Science and Engineering Indian Institute of Technology Kanpur May

More information

Overview of WiMAX (Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai

Overview of WiMAX (Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai (Chapter 2) ENE 490 MON 13:30-16:30 Asst. Prof. Suwat Pattaramalai Background on IEEE 802.16 and WiMAX (Table 2.1 and Table 2.2) Salient Features of WiMAX OFDM-based physical layer: good resistance to

More information

A Study On Broadband Wireless Access-Wimax

A Study On Broadband Wireless Access-Wimax A Study On Broadband Wireless Access-Wimax Pankaj Chouhan & S. R. Mansore Department of Electronics & Communication, Ujjain Engineering College, Ujjain Abstract- The IEEE 802.16 standard, commonly known

More information

IEEE Broadband Wireless Access Working Group < Accept the proposed specification changes on IEEE P802.

IEEE Broadband Wireless Access Working Group <  Accept the proposed specification changes on IEEE P802. Project Title IEEE 802.6 Broadband Wireless Access Working Group TEK generation and update for Handover Date Submitted Source(s) Re: 2008-03-7 Kyeong-Tae Do Eun-Sun Jung Geunhwi

More information

ip rsvp reservation-host

ip rsvp reservation-host Quality of Service Commands ip rsvp reservation-host ip rsvp reservation-host To enable a router to simulate a host generating Resource Reservation Protocol (RSVP) RESV messages, use the ip rsvp reservation-host

More information

Upstream Scheduler Mode Configuration for the Cisco ubr CMTS

Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Document ID: 69704 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Upstream Scheduling in

More information

Review of Important Networking Concepts

Review of Important Networking Concepts Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

IEEE Broadband Wireless Access Working Group < Huawei LB26b, Working Group Letter Ballot on P802.

IEEE Broadband Wireless Access Working Group <  Huawei LB26b, Working Group Letter Ballot on P802. Project Title Date Submitted Source(s) Re: IEEE 802.16 Broadband Wireless Access Working Group Group DSx TLV March 9, 2008 Phillip Barber Huawei E-mail: LB26b, Working Group Letter

More information

A Comprehensive Survey on WiMAX Scheduling Approaches

A Comprehensive Survey on WiMAX Scheduling Approaches 2 A Comprehensive Survey on WiMAX Scheduling Approaches Lamia Chaari, Ahlem Saddoud, Rihab Maaloul and Lotfi Kamoun Electronics and Information Technology Laboratory, National School of Engineering of

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

! Cell streams relating to different media types are multiplexed together on a statistical basis for transmission and switching.

! Cell streams relating to different media types are multiplexed together on a statistical basis for transmission and switching. Asynchronous Transfer Mode (ATM) Networks! All source media is first broken down into a stream of fixed sized units known as cells.! Cell streams relating to different media types are multiplexed together

More information

Cisco ubr7200 QoS/MAC Enhancements for Voice and Fax Calls: DOCSIS 1.0+

Cisco ubr7200 QoS/MAC Enhancements for Voice and Fax Calls: DOCSIS 1.0+ Cisco ubr7200 QoS/MAC Enhancements for Voice and Fax Calls: DOCSIS 1.0+ Document ID: 12215 Contents Introduction Prerequisites Requirements Components Used Conventions Brief Theory Summary What Happens

More information

Analysis of QOS in WiMAX Networks

Analysis of QOS in WiMAX Networks Analysis of QOS in WiMAX Networks S. Srivisshudhanan Periyar University Abstract QoS is a key metric for transmission capacity requesting applications in WiMAX (IEEE 802.16 standard) systems. It is accomplished

More information

Multimedia in the Internet

Multimedia in the Internet Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet

More information

WiMAX: MAC Layer Performance Assessments

WiMAX: MAC Layer Performance Assessments WiMAX: MAC Layer Performance Assessments A. Bestetti,G.Giambene, S. Hadzic Alcatel-Lucent, Via Trento, 30, I-20059 Vimercate, Milano, Italy University of Siena, Via Roma, 56, I-53100 Siena, Italy Abstract

More information

OSI Transport Layer. objectives

OSI Transport Layer. objectives LECTURE 5 OSI Transport Layer objectives 1. Roles of the Transport Layer 1. segmentation of data 2. error detection 3. Multiplexing of upper layer application using port numbers 2. The TCP protocol Communicating

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project Title IEEE 802.16 Broadband Wireless Access Working Group HO Latency Reduction Date Submitted Source(s) Re: Abstract 2008-01-22 Sungjin Lee, Geunhwi Lim, Brian Shim Samsung

More information

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN Appendix - C GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering Academic Year: 2016-17 Semester: EVEN COURSE PLAN Semester: VI Subject Code& Name: 10CS64 & Computer

More information

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656

More information

IEEE 802 Executive Committee Study Group on Mobile Broadband Wireless Access <http://ieee802.org/20> Implication of End-user.

IEEE 802 Executive Committee Study Group on Mobile Broadband Wireless Access <http://ieee802.org/20> Implication of End-user. Project Title Date Submitted IEEE 802 Executive Committee Study Group on Mobile Broadband Wireless Access Implication of End-user QoS requirements on PHY & MAC 2003-11 11-1010 C802.2-03/106

More information

UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company

UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company ABSTRACT The ATM unspecified bit rate (UBR) class of service some times referred to as best effort service-

More information

WiMAX Forum Test Procedures

WiMAX Forum Test Procedures WiMAX Forum Mobile Inter-Operability Test (MIOT) WiMAX Forum Approved (2010-09-07) WiMAX Forum Proprietary Copyright 2010 WiMAX Forum. All Rights Reserved. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

More information

IEEE C802.16e-03/20r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-03/20r1. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group IEEE 802.16e Handoff Draft 2003-03-13 Source(s) Itzik Kitroser IEEE802.16e Handoff ad-hoc chair

More information

ETSI TS V1.2.1 ( ) Technical Specification

ETSI TS V1.2.1 ( ) Technical Specification TS 102 545-2 V1.2.1 (2009-03) Technical Specification Broadband Radio Access Networks (BRAN); HiperMAN; Conformance Testing for WiMAX/HiperMAN 1.3.1; Part 2: Test Suite Structure and Test Purposes (TSS&TP)

More information

IEEE /WIMAX- Overview. E.Borcoci

IEEE /WIMAX- Overview. E.Borcoci IEEE /WIMAX- Overview E.Borcoci Contents 1 IEEE Wireless MAN overview...1 1.1 Introduction...2 1.1.1 IEEE 802 standards...2 1.1.2 IEEE Summary...2 1.1.3 WiMAX summary...4 1.1.4 WiMAX Forum...5 1.1.5 Other

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Priority Based Uplink Scheduling Scheme for WiMAX Service Classes

Priority Based Uplink Scheduling Scheme for WiMAX Service Classes I.J. Information Technology and Computer Science, 213, 8, 66-74 Published Online July 213 in MECS (http://www.mecs-press.org/) DOI: 1.5815/ijitcs.213.8.7 Priority Based Uplink Scheduling Scheme for WiMAX

More information

Multimedia Networking

Multimedia Networking CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose

More information

RSVP Support for ATM and PVCs

RSVP Support for ATM and PVCs RSVP Support for ATM and PVCs Last Updated: January 15, 2013 This document describes Cisco Resource Reservation Protocol (RSVP) support for the Asynchronous Transfer Mode/permanent virtual circuits (ATM/PVCs)

More information

Asynchronous Transfer Mode

Asynchronous Transfer Mode ATM Asynchronous Transfer Mode CS420/520 Axel Krings Page 1 Protocol Architecture (diag) CS420/520 Axel Krings Page 2 1 Reference Model Planes User plane Provides for user information transfer Control

More information

Cisco Broadband Wireless Gateway 2.3 Command Reference, IOS Release 12.4(24)YG3

Cisco Broadband Wireless Gateway 2.3 Command Reference, IOS Release 12.4(24)YG3 Cisco Broadband Wireless Gateway 2.3 Command Reference, IOS 12.4(24)YG3 July 15, 2010 aaa accounting, page -5 aaa accounting (wimax agw user group-list submode), page -11 aaa accounting start wait-response,

More information

Configuring RTP Header Compression

Configuring RTP Header Compression Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead and speeds up the transmission of either Real-Time

More information