DESIGN AND IMPLEMENTATION OF IEEE MAC LAYER SIMULATOR

Similar documents
Int. J. of Advanced Networking and Applications 181 Volume: 01 Issue: 03 Pages: (2009)

Institute of Electrical and Electronics Engineers (IEEE)

Wireless Communication. IEEE Wireless Metropolitan Area Network (wman)

MAC layer: structure and QoS support. PhD student: Le Minh Duong

scalable for various applications WIRELESS COMMUNICATIONS Radiocommunications testers

WiMAX Capacity Enhancement: Capacity Improvement of WiMAX Networks by Dynamic Allocation of Subframes

Chapter - 1 INTRODUCTION

Abstract of the Book

MAC Overview NCHU CSE WMAN - 1

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet

WiMAX Security: Problems & Solutions

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network

Sujesh P. Lal VIT University, TN, INDIA

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS

Protocol Implementation Conformance Statement for IEEE Standard

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

WiMAX Technology and Deployment for Last-Mile Wireless Broadband and Backhaul Applications

The IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks

IEEE /15. IEEE Broadband Wireless Access Working Group < Title Interpretation of IEEE Standard 802.

Evaluating VoIP using Network Simulator-2

Switched Multimegabit Data Service (SMDS)

Nokia Fax:

Chapter 10: Wireless Networking. School of information science and Engineering, SDU

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

Overview of Networks

Design and Implementation of IEEE MAC Layer Simulator

Switched Multimegabit Data Service

What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator

Optical networking technology

IEEE Broadband Wireless Access Working Group <

Comparative Assessments for Different WiMAX Scheduling Algorithms

E3-E4 (CM MODULE) WiMAX OVERVIEW & BSNL WiMAX PROJECT

Development of MD8430A for LTE-Advanced Tests

IP Core Expertise From WireIE

Chapter 1 Introduction

Mobile WiMAX EPL 657. Panayiotis Kolios

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

IEEE C802.16e-03/20r1. IEEE Broadband Wireless Access Working Group <

Cellular Communication

A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks

IEEE m Reference Model

Cross-Layer Optimized Architecture of MBS over Mobile WiMAX

HIPERLAN/2 and a: A Comparative Study

SS Initialization Overview

CABLE NETWORKS INTRODUCTION TO CABLE NETWORK TECHNOLOGIES AND PROTOCOLS

MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4

Mission Critical MPLS in Utilities

ETSI Project BRAN Hiperlan Type 2 for IEEE 1394 Applications System Overview

SECURITY ISSUES OF WIMAX

Flexible Resource Allocation in IEEE Wireless Metropolitan Area Networks

NCTUns Simulation Tool for WiMAX Modeling

Key Performance Aspects of an LTE FDD based Smart Grid Communications Network

Performance Evaluation of WiFiRe using OPNET

1xEV Opportunities in Broadband Workshop

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group <

IEEE /WIMAX- Overview. E.Borcoci

DOCSIS. Introduction. Gabor Major. UPC Magyarorszag Kft. Liberty Global Inc.

Performance Evaluation of WiFiRe using OPNET

Alcatel-Lucent 1675 LambdaUnite MultiService Switch

PSD2A Computer Networks. Unit : I-V

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.

Draft Permanent Document. < Requirements Document >

Implementation of WiFiRe PHY Sectorization in OPNET

Wireless# Guide to Wireless Communications. Objectives

Wireless Wireline Convergence. Tod Sizer, Director Broadband and Wireless Research Center Bell Laboratories

IEEE Broadband Wireless Access Working Group < Performance enhancement with efficient mapping of outer-coded MBS streams

Beyond 3G Wireless. K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA)

802.11n in the Outdoor Environment

NGN: The Evolution of Wireless Networks

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Performance Analysis of UGS and BE QoS classes in WiMAX

White Paper. Massive Capacity Can Be Easier with 4G-Optimized Microwave Backhaul

GLOSSARY. A syslog or SNMP message notifying an operator or administrator of a problem.

Initial PHY Layer System Proposal for Sub 11 GHz BWA

DAY 2. HSPA Systems Architecture and Protocols

Performance of Soft Handover FBSS Compared to Hard Handover in case of High Speed in IEEE e for Multimedia Traffic

1.1 Beyond 3G systems

Introduction to Mobile Broadband (imb)

Table of Contents. Introduction...3. WiMAX Forum overview...4. WiMAX Technology framework...4. Key elements of WiMAX Technology...

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Network Systems for Emerging WAN Applications

Mobile WiMAX in the Evolving Wireless Broadband Landscape

AAA Authentication: New Use Cases

MOTOROLA EXPEDIENCE TECHNICAL OVERVIEW

Broadband and Last Mile Networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Chapter 3 Managing System Settings

Optimizing WiMAX: A Dynamic Strategy for Reallocation of Underutilized Downlink Sub-Frame to Uplink in TDD Mode

TIME SCHEDULE. 2 Physical Layer 15. Course General Outcomes: Sl. G.O On completion of this course the student will be able :

Mobile Network Evolution Part 2

It is the process of sharing data, programs, and information between two or more computers.

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

Effect Change of Speed on Delay and Throughput for Handover Types in Mobile WI-Max Network

EXHIBIT A-1 to Appendix D to DIR Contract NO. DIR-TEX-AN-NG-CSA-ICXXX. Service Description: PCI Texas South Region Dedicated Burstable/Shared Network

WCDMA evolution: HSPA and MBMS

H.323. Definition. Overview. Topics

Request Mechanisms to Reduce the Contention Period in : A Comparison

Transcription:

DESIGN AND IMPLEMENTATION OF IEEE 802.16 MAC LAYER SIMULATOR H. M. Shamitha 1, H. M. Guruprasad 1, Kishore. M 2, Ramesh. K 3 Department of Electronics and Communication 1 Proudadhevaraya Institute of Technology, Hospet, India 2 Green Revolution, Hospet, India 3 Department of Computer Science, Karnataka State Women s University, Bijapur, India ABSTRACT The IEEE 802.16 Wireless MAN is a broadband wireless access network, which provides high-rate network connections to stationary sites, operates over greater distances, provides more bandwidth, takes advantage of a broader range of frequencies, and supports a greater variety of deployment architectures, including non-line-ofsight operation. The medium access control layer protocol includes an initialization procedure designed to eliminate the need for manual configuration. Upon installation, a Subscriber Station begins scanning its frequency list to find an operating channel. It may be programmed to register with a specified Base Station. Systems shall support the applicable procedures for entering and registering a new Subscriber Station or a new node to the network. This project concentrates upon the network initialization procedure to bring up the subscriber and base stations in the 802.16 network. It also provides the Dynamic Service Management procedure for transportation connections. Socket programming has been used to perform simulations. KEYWORDS: MAC, IEEE 802.16, SAP I. INTRODUCTION The IEEE 802.16 medium access control layer (MAC) protocol is designed for point-to-multipoint broadband wireless access applications. It addresses the need for very high bit rates, both uplink (to the Base station) and downlink (from the Base station). The medium access control layer is capable of supporting multiple physical layer specifications optimized for the frequency bands of the application. This paper deals with various steps for initialization between BS and SS. The 802.16 specification accommodates MAC management messages that allow the base station to query the subscriber station. The objective of this paper is to design a IEEE 802.16 MAC layer for broadband wireless access. It is a complex and efficient protocol. Access and bandwidth allocation algorithms must accommodate hundreds of terminals per channel. Terminals may be shared by multiple end users. The services required by these end users are time-division multiplex (TDM) voice and data, Internet Protocol (IP) connectivity, and packetized voice over IP (VoIP). The 802.16 MAC accommodates both continuous and bursty traffic. Additionally, these services expect to be assigned quality of service in keeping with the traffic types. The IEEE 802.16 offers an alternative to cabled access networks, such as fiber optic links, coaxial systems using cable modems, and digital subscriber line (DSL) links. Wireless systems have the capacity to address broad geographic areas without the costly infrastructure development required in deploying cable links to individual sites, hence the technology 462 Vol. 5, Issue 1, pp. 462-469

may prove less expensive and may lead to more ubiquitous broadband access. The IEEE 802.16 MAC gives both broadband access and good quality of service (QoS). With the technology expanding in this direction, it is likely that a standard will evolve to support nomadic and increasing mobile users. The paper aims at analyzing the initialization procedure between Base station (BS) and Subscribe station (SS) and discusses the design for the steps involved in the initialization procedure. II. RELATED RESEARCH WORK The 802.16 medium access control (MAC) layer [1, 2] supports many different physical layer specifications, both licensed and unlicensed. Through the 802.16 MAC, every base station dynamically distributes uplink and downlink bandwidth to subscriber stations using time-division multiple access (TDMA). This is the basic difference from the earlier version of 802.11 MAC. 802.11 MAC operating through the use of carrier sensing mechanisms does not provide effective bandwidth control over the radio link. Figure 1depicts the reference model [1, 2] of IEEE 802.16 MAC. The MAC comprises three sub layers these are service specific convergence sub layer, medium access control common part sub layer (MAC CPS), and privacy sub layer. The service specific convergence sub layer (CS) provides transformation or mapping of external network data, received through the CS service access point (SAP), into MAC SDUs received by the MAC common part sub layer (MAC CPS) through the MAC SAP. This includes classifying external network service data units (SDUs) and associating them to the proper MAC service flow and connection identifier (CID). The MAC CPS provides the core MAC functionality of system access, bandwidth allocation, connection establishment, and connection maintenance. The MAC also contains a separate privacy sub layer providing authentication, secure key exchange, and encryption. Data, physical layer (PHY) control, and statistics are transferred between the MAC CPS and the PHY via the PHY SAP. The PHY may include multiple specifications, each appropriate to a particular frequency range and application. III. DESIGN AND IMPLEMENTATION As the MAC is clearly seen to cycle around some determined states, the complete MAC solution is divided into few state machines, namely network entry state machine and dynamic service flow transition state machine. This section provides different views of the system being designed, with many sequence diagrams to show how messages are passed between different entities during runtime. These are in accordance with the UML based design principles. The features considered for design and implementation are listed below. i) Network entry and initialization entity a) Downlink synchronization b) Uplink parameter acquisition c) Initial ranging d) Capability negotiation e) Registration f) Establish IP connectivity g) Establish time of the day h) Transfer operational parameters 3.1 Down link channel synchronization When an SS wishes to enter the network, it scans for a channel in the defined frequency list. Normally an SS is configured to use a specific BS with a given set of operational parameters, when operating in a licensed band. If the SS finds a down link channel and is able to synchronize at the physical layer (PHY ) level (it detects the periodic frame preamble), then the MAC layer looks for DCD and UCD to get information on modulation and other DL and UL parameters. The BS sends downlink channel descriptor (DCD) and DLMAP messages periodically for the downlink synchronization with SS. Once SS synchronizes with BS the SS would wait for uplink channel descriptor (UCD) message for uplink channel characteristics for uplink transmission from BS. Once SS gets the UCD and it waits for uplink map (ULMAP) message for initial maintenance interval for initial ranging. 463 Vol. 5, Issue 1, pp. 462-469

3.2 Initial ranging When an SS has synchronized with the DL channel and received the downlink and UL MAP for a frame, it begins the initial ranging process by sending a ranging request MAC message on the initial ranging interval using the minimum transmission power. If it does not receive a response, the SS sends the ranging request again in a subsequent frame, using higher transmission power. Eventually the SS receives a ranging response. The response either indicates power and timing corrections that the SS must make or it indicates success. If the response indicates corrections, then the SS makes these corrections and sends another ranging request. If the response indicates success, the SS is ready to send data on the upper link. 3.3 Capabilities negotiation After successful completion of initial ranging, the SS sends a capability request message to the BS describing its capabilities in terms of the supported modulation levels, coding schemes, rates, and duplexing methods. The BS accepts or denies the SS, based on its capabilities. The SS sends the SBCREQ message to negotiate SS basic capabilities and it waits for SBCRSP. Once BS receives SBCREQ message and processes the message, it determines enables SS capabilities and sends SBCRSP message to SS. 3.4 Authentication After capability negotiation, the BS authenticates the SS and provides key material to enable the ciphering of data. The SS sends the X.509 certificate of the SS manufacturer and a description of the supported cryptographic algorithms to its BS. The BS validates the identity of the SS, determines the cipher algorithm and protocol that is used, and sends an authentication response to the SS. The response contains the key material to be used by the SS. The SS is required to periodically perform the authentication and key exchange procedures to refresh its key material. 3.5 Registration After successful completion of authentication the SS registers with the network. The SS sends a registration request message to the BS, and the BS sends a registration response to the SS. The registration exchange includes IP version support, SS managed or non-managed support, classification option support, cyclic redundancy check ( CRC) support, and flow control. Once BS authorizes SS, the SS sends registration request (REGREQ) message to BS for registration and waits for REGRSP message. The BS processes the REGREQ message which includes calculating hashed message authentication code (HMAC) over REGREQ message and sets the status of SS as supported in REGRSP. 3.6 IP Connectivity The SS attains an IP address via dynamic host configuration protocol( DHCP) and establishes the time of the day via the internet time protocol. The DHCP server also provides the address of the TFTP server from which the SS can request a configuration file. This file provides a standard interface for providing vendor-specific configuration information. At this point, the SS will invoke DHCP discover message in order to obtain an IP address and any other parameters needed to establish IP connectivity. If the SS has a configuration file, the DHCP response will contain the name of a file which gives further configuration parameters. Establishment of IP connectivity will be performed on the SS s secondary management connection. 3.7 Establishing time of the day The SS and BS need to have the current date and time. This is required for time stamping logged events for retrieval by the management system. After DHCP is successful the SS sends time of the day request to time server. The time server processes the request and sends the response with correct 464 Vol. 5, Issue 1, pp. 462-469

time of the day offset to create local time. Establishment of time of the day will be performed on the SS s secondary management connection. 3.8 Transfer operational parameters After DHCP is successful, the SS will download the SS configuration file using trivial file transfer protocol (TFTP) on the SS s secondary management connection. When the configuration file download has been completed successfully, the SS will notify the BS by transmitting a trivial file transfer protocol complete (TFTPCPLT) message on the SS s primary management connection. Transmissions will continue periodically until a TFTP response (TFTPRSP) message is received with OK response from the BS. Once the download of the configuration file from the TFTP server to SS is over, then the SS sends the TFTPCPLT message to the BS and waits for TFTP response. IV. EXPERIMENTAL RESULTS The network entry process for SS is simulated using Linux Berkeley socket interfaces and designed using enterprise architect UML tool. Figure 1: Downlink synchronization (BS) Figure 2: Downlink synchronization (SS) Figure 3: Initial ranging (BS) 465 Vol. 5, Issue 1, pp. 462-469

Figure 4: Initial ranging (SS) Figure 5: Capabilities negotiation (BS) Figure 6: Capabilities negotiation (SS) Figure 7: Authentication (BS) Figure 8: Authentication (SS) 466 Vol. 5, Issue 1, pp. 462-469

Figure 9: Registration (BS) Figure 10: Registration (SS) \ Figure 11: IP connectivity (BS) Figure 12: IP connectivity (SS) Figure 13: Connection setup using DSA (BS) 467 Vol. 5, Issue 1, pp. 462-469

Figure 14: Connection setup using DSA (SS) Figure 15: Connection modification and termination (BS) V. CONCLUSION Figure 16: Connection modification and termination (SS) The paper aims at providing a design for the IEEE 802.16 protocol in an efficient manner using object oriented design principles. The IEEE 802.16 is a very complicated standard, featuring high adaptiveness to maximize air link usage therefore, it requires sophisticated algorithms. At the same time, its implementation must be easy for users and provide adequate quality of service. The message post mechanism and the packet queuing mechanisms prove to be valuable addition to the way data is passed between upper and lower layer in the stack. This also helps the stack to handle inter module interactions in a clear manner. The simulation studies show that the proposed solution provides quality of service support in terms of bandwidth and delay bounds for all types of traffic classes as defined by the standard. We are currently working on connection admission control and classifier modules which are part of convergence layer of the standard and contribute greatly to quality of service provisioning. The key contribution of this research paper is in the development of a network entry and dynamic service management. The above discussion makes it easy to see why so much anticipation surrounds IEEE s 802.16 standard. Service providers will be free from the substantial upfront costs and risks associated with network build out, allowing them to provide cheaper broadband access to more consumers. Finally, the interoperability and variety of services supported by Wireless MAN ensures rapid adoption and deployment, justifying the praise of 802.16 as the next wireless revolution. 468 Vol. 5, Issue 1, pp. 462-469

REFERENCES [1] IEEE 802.16-2001, IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, Apr. 8, 2002 [2] IEEE P802.16-REVd/D5-2004: Air Interface for Fixed Broadband Wireless Access Systems, available on www.ieee802.org/16 [3] G. Nair, J. Chou, T. Madejski, K. Perycz, D. Putzolu and J. Sydir, IEEE 802.16 medium access control and service Provisioning, Intel Technology Journal, vol. 8, no. 3, pp. 213-28, Aug. 2004. [4] Stanley Wang, Ken Stanwood, Yair Bourlas, Robert Johnson IEEE 802.16.1 Convergence Sub layer for ATM [5] J. Chou, Russ Reynolds, Vladimir Yanover, Shlomi Eini and Radu Selea MAC and PHY MIB for Wireless MAN BS and SS, available on www.ieee802.org/16 AUTHORS H M Shamitha, currently working at Proudadhevaraya Institute of Technology, Hospet, India. Her area of interest includes computer networks, digital circuits, computer organisation. Active member of Indian Society of technical Education, New Delhi. H M Guruprasad, currently working at Proudadhevaraya Institute of Technology, Hospet, India. His area of interest includes analog communication, optical fiber communication, VLSI, VHDL. Active member of Indian Society of technical Education, New Delhi. Kishore M, His area of interest includes wireless communication and networking, antenna theory and design, Smart antenna and its applications. He has various research publications into is credit Ramesh K, currently working at Karnataka State Women s University, Bijapur, India. Department of Computer Science. His area of interest includes wavelength division multiplexing, computer networks. 469 Vol. 5, Issue 1, pp. 462-469