Вы находитесь на странице: 1из 79

c



  
Topics to be covered
˜ Introduction
˜ What is WiMAX?
˜ IEEE 802.16 Extensions
˜ Architecture
˜ Functionality
˜ WiMAX Protocol
˜ Scenario
˜ Features
˜ Security Issues
˜ Benefits
˜ WiFi vs WiMAX
˜ WiMAX Applications
˜ Future of WiMAX
˜ Conclusion
˜ References
Introduction
˜ c   £ In your home, you have either a DSL or
cable modem At the office, your company may be using a T1
or T3 line.
line.

˜ 3   £ In your home, you may have set up a WiFi


router that lets you surf the Web while you lounge with your
laptop on the road, you can find WiFi hot spots in restaurants,
hotels, coffee shops and libraries.

˜ è 
 £ If you are still using dial£up, chances are that
either broadband access is not available, or you think that
broadband access is too expensive
^ontd..
˜ The main problems with broadband access are that
it is pretty expensive and it doesn't reach all areas.

˜ The main problem with WiFi access is that hot


spots are very small, so coverage is limited (up to
100£150 meters).
˜ There is a need for a system which provides high
speed of Broadband and is wireless instead of
wired.

˜ 3 (Worldwide Interoperability Microwave


Access) provides these features .Its also known as
IEEE 802.16
3 t is 3iMAX?
˜ 3  (Worldwide Interoperability for microwave access)
˜ A technology based on an evolving standard for point£to£
multi point wireless networking
˜ The commercialization of IEEE 802.16 standard
˜ Solution for Wireless Metropolitan Area Network
˜ BWA (Broadband Wireless Access) Solution
˜ Comply with European BWA standard
˜ European Telecommunications Standards Institutes's
High£performance radio metropolitan area network
(HiperMAN)
^ontd..
Coverage range up to 50km and speeds up to 70Mbps(shared
among users).
pertion of 3iMAX

˜ WiMAX consists of two parts

˜ A 3  , similar in concept to a cell£phone tower £


A single WiMAX tower can provide coverage to a very
large area ££ as big as 3,000 square miles
˜ A 3 
   The receiver and antenna could be a
small box or PCMCIA card, or they could be built into a
laptop the way WiFi access is today
ervice Types

˜ §   
˜ A Service where a small antenna on your computer
connects to the tower. In this mode, WiMAX uses a lower
frequency range ££ 2 GHz to 11 GHz (similar to WiFi)

˜   
˜ A Service where a fixed dish antenna points straight at the
WiMAX tower from a rooftop or pole. Line£of£sight
transmissions use higher frequencies, with ranges reaching
a possible 66 GHz
IEEE 802.16
˜ IEEE 802.16 was completed on Oct, 2004

˜ Range £ 30£mile (50£km) radius from base station

˜ Speed £ 70 megabits per second

˜ Line£of£sight not needed between user and base station

˜ Frequency bands £ 2 to 11 GHz and 10 to 66 GHz (licensed and


unlicensed bands)

˜ Defines both the MAC and PHY layers and allows multiple PHY£
layer specifications
IEEE Extensions

˜ ½ 
[ use the licensed and license£exempt frequencies from 2 to 11Ghz
[ Support Mesh£Network

˜ ½ 
[ Increase spectrum to 5 and 6GHz
[ Provide QoS (for real£time voice and video service)

˜ ½ 
[ Represents a 10 to 66GHz system profile

˜ ½ 
[ Improvement and fixes for 802.16a

˜ ½ 
[ Addresses on Mobile
[ Enable high£speed signal handoffs necessary for communications with
users moving at vehicular speeds
Arc itecture
‰ P2MP(Point to Multi point)
[ Wireless MAN
[ BS connected to Public Networks
[ BS serves Subscriber Stations(SS)
[ Provides SS with first mile access to Public
Networks

‰ Mesh Architecture
[ Optional architecture for WiMAX
?2M? Arc itecture
3iMAX Mes Arc itecture
3iMAX FUN^TINALITY
3iMAX ?rotocol
˜ Covers MAC layer and PHY layer
[ PHY layer
[ Transmission Convergence sublayer
[ MAC layer
ueference Model
? Y Lyer
˜ In the design of the PHY specification for 10±66 GHz, line£of£sight
propagation was deemed a practical necessity.
˜ Because of the point£to£multipoint architecture, the BS basically transmits
a TDM signal, with individual subscriber stations allocated time slots
serially.
˜ The PHY specification defined for 10±66 GHz uses burst single£carrier
modulation with adaptive burst profiling in which transmission
parameters, including the modulation and coding schemes, may be
adjusted individually to each subscriber station (SS) on a frame£by£frame
basis. Both TDD and burst FDD variants are defined.
˜ Channel bandwidths of 20 or 25 MHz (typical U.S. allocation) or 28 MHz
(typical European allocation) are specified, along with Nyquist square£
root raised£cosine pulse shaping with a roll off factor of 0.25.
^ontd..
‰ Adaptive Burst Profiles
[ On DL, multiple SS's can associate the same DL burst
[ On UL, SS transmits in an given time slot with a
specific burst

‰ Allows use of directional antennas


[ Improves range

‰ Allows use of two different duplexing schemes:


[ Frequency Division Duplexing (FDD)
[ Time Division Duplexing (TDD)

‰ Support for both full and half duplex stations


Adptive ? Y
FDD (Frequency Division
Duplexing)
‰ In case of FDD both uplink and downlink channels are on
      

‰ The capability of downlink to be transmitted in bursts


simultaneously supports two different modulation
types
[ Full Duplex SS's( which can transmit and receive
simultaneously)
[ Half Duplex SS's( which cannot)
FDD Fre bursting
TDD (Tie Division Duplexing)

‰ In case of TDD both uplink and downlink transmissions


share the same frequency but are separated on time

‰ A TDD frame has a fixed duration and also consists of one


uplink and one downlink frame

‰ TDD framing is Adaptive


Tie Division Duplexing
Dt utes

‰     


  ^     
       
  
 
    
‰          
     
  !

‰   " 


"   #$"
  
Mediu Access ^ontrol(MA^)
‰ WirelessMAN: Point£to£Multipoint and optional mesh
topology

‰ Connection£Oriented
[ Connection ID(CID),Service Flows(FS)

‰ MAC layer is further subdivided into three layers


[ Convergence sub£layer (CS)
[ Common part sub£layer (CPS)
[ Privacy sub£layer
MA^ Addressing
‰ SS has 48£bit 802.3 MAC address

‰ BS has 48£bit base station ID


[ Not a MAC address

‰ Connection ID (CID)
[ 16 bit
[ Used in MAC PDU
[ Connection Oriented Service
Fre tructure nd ?DU
˜ Each MAC packet consists of the three components,
[ A J  , which contains frame control
information.
[ A variable length  ‘, which contains
information specific to the frame a e.
[ A    (FCS), which contains an
IEEE 32£bit cyclic redundancy code (CRC).
MA^ ?DU

   

&  '(^
^ ^
MA^ ?DU 
 % %

  %

G n ri MA^ H a r rmat BW R . H a r rmat


(H a r (H ) = ) (H a r (H ) = )
 )
)  ^ )* )  + 
 ^

  %  %  
  %
 ^ %
 %

 
) % ^  % +  % ^  %

 
^  % ^% ^  % ^%
MA^ ^ ub Lyer
‰ Interoperability requires convergence sub£layer to be service
specific

‰ Separate CS layers for ATM & packet protocols

‰ CS Layer:
[ Receives data from higher layers
[ Classifies data as ATM cell or packet
[ Forwards frames to CPS layer
^ontd..
‰ Packet Convergence Sub£Layer
[ Initial support for Ethernet, VLAN, IPv4, and IPv6
[ Payload header suppression
[ Full QoS support

‰ ATM Convergence Sub£Layer


[ Support for VP/VC switched connections
[ Support for end£to£end signaling of dynamically
created connections
[ ATM header suppression
[ Full QOS support
MA^ ^? Lyer
‰ Performs typical MAC functions such as addressing
[ Each SS assigned 48£bit MAC address
[ Connection Identifiers used as primary address after
initialization

‰ MAC policy determined by direction of transmission


[ Uplink is DAMA£TDM
[ Downlink is TDM

‰ Data encapsulated in a common format facilitating


interoperability
[ Fragment or pack frames as needed
[ Changes transparent to receiver
MA^ ?DU Types
‰ Data MAC PDUs
[ HT = 0
[ Payloads are MAC SDUs/segments, i.e., data from
upper layer (CS PDUs)
[ Transmitted on data connections

‰ Management MAC PDUs


[ HT =0
[ Payloads are MAC management messages or IP packets
encapsulated in MAC CS PDUs
[ Transmitted on management connections

‰ BW Req. MAC PDUs


[ HT =1; and no payload, i.e., just a Header
MA^ ?DU Trnsission
‰ MAC PDU¶s are transmitted on PHY bursts

‰ The PHY burst can contain multiple FEC blocks

‰ Concatenation
[ Multiple MAC PDU's can be concatenated into a single
transmission in either uplink or downlink direction

‰ Fragmentation
[ Each MAC SDU can be divided into one or more MAC
PDU's

‰ Packing
[ Packs multiple MAC SDU's into a single MAC PDU
MA^ ?rivcy ub Lyer

‰ Provides secure communication


[ Data encrypted with cipher clock chaining mode of
DES

‰ Prevents theft of service


[ SSs authenticated by BS using key management protocol
Trnsission ^onvergence
ublyer
˜ This layer performs the transformation of variable length
MAC protocol data units (PDUs) into the fixed length FEC
blocks (plus possibly a shortened block at the end) of each
burst.
˜ The TC layer has a PDU sized to fit in the FEC block
currently being filled. It starts with a pointer indicating
where the next MAC PDU header starts within the FEC
block. The TC PDU format allows resynchronization to the
next MAC PDU in the event that the previous FEC block
had irrecoverable errors.
3 

Consider a scenario where a wimax£enabled computer is 10


˜

miles away from the wimax base station.

A special encryption code is given to computer to gain


˜

access to base station.

The base station would beam data from the Internet required
˜

for computer (at speeds potentially higher than today's


cable modems)
^

˜  ,   


  !!  
 
 !   
  
,  -   -   ! 
  
 
   

˜3   



 !!  !   .!
, /"
    / %

˜ !3-  
 
. !/      
  , /  
3  

˜

˜  ! 


˜

˜^
 


˜      !  ! 0 


%  , 

˜         


  !
 ,

˜   !     ,  


 ,  !  
  "!


˜    !!  !


        
 !
˜ !  !, 1 ,
     !  
 
 
  


˜ !  
   
- 
!,   
-  
  
-, 

 "!" 
˜      !  
, !!  c

˜0   ! 2


- !    !  
!   
!,  !!
  
-  ! !      
 
!,  !!  
- 3!^   !!
  !   
!, 
- 3! !!  ! ,

!, 

!,
˜ 
!, ^    
 
 
    !   
     , 
   
c

˜ 
!,     !
     .1    
  

˜       ,c


      !, 0   
, 
 
!c    


˜"!  4 

˜        


 
  

˜      -   


  ! % 5  

˜67^ , - 


^
 

˜     ,  

˜ "!   #$" ! 

˜    


0  
   

˜   
     , 
   
!  ,  , 

˜      


,c

˜      


    
   !  !
  
!,   , 
    

˜,  2

-   !  


  !, 

-    % 



    ! ! c
   

˜  
  !  ! 
,^      

˜^6 !  !  


 ^ ! 

˜  , ^ 3 .


 ^  

˜^     


!   .   !
^
X  

˜  X   


 !!  ! c

˜X    !     


  !  

˜X  48 !  - 


   !   
,c
^

˜X   9 


 

˜ X 0   !   


c X 
    
0    
   
 
  ! ,    

˜X   ^ X-



  

˜X    -      


    ,c
   
˜      !   ! 
c  !       
         
, 

˜   ! !2


  2        
 
   
2  
 ,c
2    


!    
 ! ! 
!, 

˜     


^ontd..

˜Figure conceptually depicts end£to£end Authentication,


Authorization, and Accounting (AAA) on 802.16 networks
supporting portability and fully mobile operations.

˜Encryption (security association) is established using the


PKM£EAP protocol.

Extensible Authentication Protocol (EAP) is carried over


˜

RADIUS or DIAMETER to the AAA back end.


^

˜ I     

  
           
       

˜ I   
         
     


       !      
!      
cenefits of 3iMAX
‰ 
[ Faster than broadband service

‰ 3 
[ Not having to lay cables reduces cost
[ Easier to extend to suburban and rural areas

‰ c    
[ Much wider coverage than WiFi hotspots
c! ! #, 

 


˜, 
 
 
    
   
 / .-   
/

˜0 

˜    0  ! , 


 

˜ 
 
 !  

˜, 
 
 
 " 
 
 
cenefits for consuers

‰ Range of technology and service level choices from both


fixed and wireless broadband operators

‰ DSL£like services at DSL prices but with portability

‰ Rapidly declining fixed broadband prices

‰ No more DSL ³installation´ fees from incumbent


3/ 3

˜ 
˜ 
 ! 
˜   !

˜ 
˜ ^
 
˜  
clbility

½  ½ 

˜ 3    ‘ ˜ ^     


   ‘   
    
˜   
 ^   
   ‘   
   
˜ ^    
 
˜ ^   
  
ueltive ?erfornce

Channel Maximum Maximum


Bandwidth Data Rate bps/Hz

½  20 MHz 54 Mbps 2.7 bps/Hz

½  1.5 ± 20 MHz 100 Mbps 5.0 bps/Hz


rulity f ervice (ro)

½  ½ 
˜ ^    ^ ˜ ë   ^
^%^&'   $

˜        ‘ ˜      


   ‘  (       

˜      ˜       


         !"  
      #  
   

˜ ½  $  ˜ ^  ‘  $


      ‘
unge

½  ½ 
˜   -    ˜    )

˜ §.   /     ˜      ‘ 


   *   

˜         ˜      


‘  ½
    ‘   
    
  
˜         +,
 ^‘      ˜ +, ^     
    
^overge

½  ½ 

˜      ˜    §


       

˜       *


˜ § ‘    ‘
    
˜      
    
ecurity

½  ½ 

˜ ¦     3+0 ˜ ¦     +) ¦+


3¦+

˜ ½       


  ‘
Applictions
‰ Fixed last£mile broadband access as a replacement or
substitute for wired DSL, cable, or T1 connections

‰ Inexpensive backhaul for cell sites and WiFi hotspots

‰ High speed enterprise connectivity for businesses

‰ Voice Over Internet Protocol (VOIP)


Future of 3iMAX
˜ WiMAX will be deployed in three phases

˜ In the first phase WiMAX technology (based on IEEE


802.16£2004) provides fixed wireless connections

˜ In the second phase WiMAX will be available as a cheap


and self£installing Subscriber Terminal (ST), linked to
PC and to antenna

˜ The third phase enables portability, thus WiMAX (based


on IEEE 802.16e) will be integrated into commercial
laptops.
3iMAX Tec nology
3iMAX Foru
‰ Worldwide Interoperability for Microwave Access

‰ WiMAX was Founded in April 01¶

‰ No Profit organization comprised of wireless access system


manufacturers, component suppliers, software developers and carriers

‰ A wireless industry consortium that supports and promotes WiMAX¶s


commercial usage

‰ Members include Intel, AT&T, Siemens Mobile, British


Telecommunications, etc..

‰ Comply with the WiMAX standard and focus on the interoperability


^onclusion

‰ WiMAX is poised to be the next Big Thing

‰ WiMAX will connect you to the internet at faster speeds and


from much longer ranges

‰ WiMAX can handle last£mile access in remote areas

‰ Mobility can be achieved with design into computer chips


ueferences
‰ http://www.ceenet.org/workshops/lectures2004/Richard_Perlman/additi
onal_materials_(wimax)/

‰ www.ewh.ieee.org/r4/chicago/Yu£WiMAX.pdf

‰ www.WIMAXFORUM.org

‰ http://computer.howstuffworks.com/wimax.htm

‰ http://standards.ieee.org/catalog/olis/lanman.html

‰ http://netgroup.polito.it/Corsi/ISRG/Lucidi/Nicoletti_WiMAX.pdf

‰ http://www.gartner.com/teleconferences/attributes/attr_133634_115.pdf
ruestions
‰ What are different kinds of service WIMAX offers and what
is difference between
them?

‰ How is interoperability achieved in


WIMAX?
‰ How is QOS implemented in
WIMAX?
‰ What is difference between P2MP and Mesh architectures?
‰ List out three differences between WIMAX and WIFI?
3 "#:
6#X7"3;

Вам также может понравиться