From IEEE Communications Magazine, June 2002 Presented by Hermes Liu

Slides:



Advertisements
Similar presentations
New NS-2 model developed for the IEEE specifications is now publicly available. This model was developed as part of the Seamless and Secure Mobility.
Advertisements

1 IEEE Wireless MAN (Wireless Metropolitan Network) A Technical Overview of the WirelessMAN TM Air Interface for Broadband Wireless Access, Carl.
WMAN, part 2 S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents IEEE family of standards Protocol layering TDD frame.
A serve flow management strategy for IEEE BWA system in TDD mode Hsin-Hsien Liu
Wimax – Wireless Broadband
The uplink subframe may also contain contention-based allocations for - initial system access and - broadcast or multicast bandwidth requests. The access.
IEEE Std Technique Overview nmgmt.cs.nchu.edu.tw 系統暨網路管理實驗室 Systems & Network Management Lab Reporter :黃文帥 2007/09/18.
1 A new QoS Architecture for IEEE and Spec. Instruction Speaker: Ming-Chia Hsieh Date:2005/05/03.
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
WMAN, part 1 S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents IEEE family of standards Protocol layering TDD frame.
WiMAX 簡介 Ming-Tsung Huang Fu Jen Catholic University Computer Science.
IEEE & Priyanka Vanjani CST 554: Short Presentation ASU Id #
1 IEEE Wireless MAN "Air Interface for Fixed Broadband Wireless Access Systems"
Doc.: IEEE /096 Submission May 2000 Gunnar Rydnell, Ericsson Slide 1 HIPERLAN type 2 – Data transport Date:May 8, 2000 Author:Gunnar Rydnell Ericsson.
An Efficient QoS Scheduling Architecture for IEEE Wireless MANs Supriya Maheshwari Under the guidance of Prof. Sridhar Iyer and Prof. Krishna Paul.
A Study of the Bandwidth Management Architecture over IEEE WiMAX Student :Sih-Han Chen Advisor : Ho-Ting Wu Date :
Asynchronous Transfer Mode: ATM r 1980s/1990’s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture.
IEEE WirelessMAN For Broadband Wireless Metropolitan Area Networks.
WiMAX Fixed Vs. Mobile Mustafa Saad Mustafa Networks Eng. Dept. College of Information Engineering Al-Nahrain University Mustafa Saad Mustafa Networks.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
WiMAX: IEEE Wireless MANs. Sridhar IyerIIT Bombay2 Wireless networks  Wireless PANs (Bluetooth – IEEE ) –very low range –wireless connection.
Performance Analysis of an innovative scheduling algorithm for OFDMA based IEEE a systems E. Baccarelli, M.Biagi, C.Pelizzoni, N.Cordeschi This work.
Wireless LAN Overview Sunggeun Jin Outline  IEEE MAC  IEEE MAC.
WiMAX: IEEE Wireless MANs Sridhar Iyer K R School of Information Technology IIT Bombay
IEEE &
Information Technology Laboratory, Advance Network Technologies Division Overview of NIST IEEE implementation in NS-2 High Speed Network Technology.
NS-2 NIST add-on IEEE model (MAC+PHY) Miray Kas 28 Jan 2008.
WiMAX Protocol CSCE 4520/5520 Fall 2006 Shori Fukatsu.
IEEE (Wire less MAN) Name: Ehsan Rohani
Wireless Metropolitan Area Networks (WMANs) using WiMAX.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Overview of IEEE Broadband Wireless Access Standards
IEEE Wireless LAN Standard
1 Wireless Networks Lecture 42 IEEE Dr. Ghalib A. Shah.
Shambhu J Upadhyaya 1 Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York WIMAX & IEEE BROADBAND WIRELESS ACCESS.
Data and Computer Communications Digital Data Communications Techniques + Error Control+ Digital Data Communications Techniques + Error Control+Multiplexing.
IEEE MAC Ikjun Yeom. Computer Network Physical Layer: network card, wire/wireless Datalink Layer: data delivery in a link Network Layer: addressing,
Broadband Access Networks and Services Chapter 7 IEEE Standard Byeong Gi Lee Seoul National University EE Spring 2004.
Wireless Networks Spring 2007 WiMAX: Broadband Wireless Access.
Introduction to SkyPilot Networks November 2005
WIMAX AND LTE.
IEEE Network Simulation
Specific Systems Wi-Max IEEE #11 Victor S. Frost
WiMAX 1EEE Protocol Stack
The Medium Access Control Sublayer
WiMAX for Broadband Wireless Access
October, 2001 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [QoS Policy Proposal] Date Submitted: [9.
A Wireless LAN technologies IEEE
The Medium Access Control Sublayer
4G and 5G: Present and Future of Mobile Network
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless ATM PRESENTED BY : NIPURBA KONAR.
EECS 228a, Spring 2006 Shyam Parekh
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Lecture 1: Introduction to WAN
Wireless Ad Hoc Network
Chapter 3: Open Systems Interconnection (OSI) Model
Overview and Coexistence Aspects
Analysis and Evaluation of a New MAC Protocol
Chapter 6 Medium Access Control Protocols and Local Area Networks
WiMAX: IEEE Wireless MANs
Qingwen Liu, Student Member, IEEE Xin Wang, Member, IEEE,
WiMAX: Broadband Wireless Access
Wireless Mesh Networks
802.16a Draft D4 Unlincensed Band Coexistence
Subject Name: Adhoc Networks Subject Code: 10CS841
Optical communications & networking - an Overview
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Presentation transcript:

From IEEE Communications Magazine, June 2002 Presented by Hermes Liu IEEE Standard 802.16: A Technical Overview of the WirelessMAN Air Interface for Broadband Wireless Access From IEEE Communications Magazine, June 2002 Presented by Hermes Liu

Authors Carl Eklund, Nokia Research Center Roger B. Marks, National Institute of Standards and Technology Kenneth L. Stanwood and Stanley Wang, Ensemble Communications Inc. 2018/11/8

Agenda -Introduction -Technology Design -Physical Layer Details -Medium Access Control Details -Conclusion 2018/11/8

Agenda -Introduction -Technology Design -Physical Layer Details -Medium Access Control Details -Conclusion 2018/11/8

Introduction IEEE 802.16: Wireless MAN -Provides network access to buildings through exterior antennas and substitute the cabled access network (fiber optic, cable modem, DSL etc.) -Wireless systems have the capacity to address broad geographic areas without the costly cable links. -User inside the building connect to it with Ethernet( 802.3) or Wireless LANs (802.11). -May eventually allow the Wireless MAN networking protocols directly to the individual user by exchange medium access control (MAC) protocol data with each other. 2018/11/8

2018/11/8

Introduction 802.16: 10~66 GHz -Short wavelengths introduce deployment problems. (line-of-sight) -A set of air interfaces based on a common MAC protocol but with PHY spec. dependent on the spectrum 802.16a: 2~11 GHz (licensed and license-exempt) -Reach more customers less expensively but lower data rates. 802.16 Working Group: -Development of IEEE 802.16 -Included WirelessMAN air interface -Associates standards and amendments 2018/11/8

Introduction 2018/11/8

Agenda -Introduction -Technology Design -Physical Layer Details -Medium Access Control Details -Conclusion 2018/11/8

Technology Design Medium Access Control -Point-to-multipoint broadband wireless access -Very high bit rates both uplink and downlink -Hundreds of terminals per channel -Terminals be shared by multiple end users Services: -Legacy time-division multiplex (TDM) data -Internet Protocol (IP) connectivity -Packetized voice over IP (VoIP) -Accommodate both continuous and bursty traffic -Also provide QoS analogous to asynchronous transfer mode (ATM) as well as guaranteed frame rate (GFR) 2018/11/8

Technology Design Medium Access Control -Support backhaul requirements both ATM and packet-based protocol (like TCP) -”Convergence sublayers” are used to map the transport-layer-specific traffic to a MAC, which make the traffic more efficient and flexible -Transport efficiency are addressed at the interface between MAC and PHY, ex: the Modulation and coding schemes (MCS) adjustment -The “request-grant” mechanism is designed to be scalable, efficient, and self-correcting (self-correcting protocol) 2018/11/8

Technology Design Medium Access Control -802.16 MAC just provide Bandwidth Allocation and QoS Mechanisms, left the scheduling and reservation management unstandardized so that the vendors can differentiate their equipment -Has sublayer which provides authentication, key exchange and encryption -802.16a upgrades the MAC to provide automatic repeat request (ARQ) and support for mesh network architecture ※Note: Transport efficiency, Request-grant, Bandwidth allocate, QoS, Authentication, Key exchange, Encryption, Error correct all in MAC 2018/11/8

Technology Design The Physical Layer (10-66 GHz) -Line-of-sight propagation (short wavelength) -Single-carrier modulation (Wireless MAN SC) -Multiplexing: time-division multiplexing (TDM) -Access: time-division multiple access (TDMA) Duplexing: both TDD and FDD -TDD: UL & DL share a channel but not transmit simultaneously -FDD: UL & DL on separate channels, sometimes simultaneously -Both TDD & FDD support adaptive burst profiles in which MCS can be assigned burst-by-burst 2018/11/8

Technology Design The Physical Layer (2-11 GHz) in 2002 -Non-line-of-sight, multi-path propagation Three air interface specification in draft: -WirelessMAN-SC2: single-carrier modulation -WirelessMAN-OFDM: Orthogonal Frequency Division Multiplexing with 256-point transform, access by TDMA, only for license-exempt bands -WirelessMAN-OFDMA: 2048-point transform, multiple access is provided by addressing a subset of the multiple carriers to individual receivers ※WirelessMAN-OFDM becomes the standard of 802.16a 2018/11/8

Agenda -Introduction -Technology Design -Physical Layer Details -Medium Access Control Details -Conclusion 2018/11/8

Physical Layer Details -The transmission parameters (modulation and coding schemes MCS) from a Base Station (BS) may be adjusted individually to each Subscriber Station (SS) on a frame-by-frame basis -Forward Error Correction (FEC): Reed-Solomon GF (256) with variable block size and error correction capabilities Modulation Technique: -Quadrature Phase Shift Key (QPSK) -16-state Quadrature Amplitude Modulation (16-QAM) -64-state QAM (64-QAM) 2018/11/8

Physical Layer Details -The frame (0.5, 1, or 2 ms) is divided into physical slots for bandwidth allocation and identification of PHY transitions -TDD: UL subframe follows DL subframe on the same carrier frequency -FDD: UL & DL subframes are in time but on separate frequency. 2018/11/8

Physical Layer Details the downlink subframe starts with a frame control sectoin that contains the DL-MAP and UL-MAP DL-MAP: for the current downlink frame UL-MAP: for a specified time in the future DL-MAP specifies when physical layer transitions occur within the downlink subframe The recipient SS is indicated in the MAC headers rather than in the DL-MAP So SSs listen to all portions of the downlink subframe they can receive. frame control section Figure 1. The downlink subframe structure DIUC: Downlink Interval Usage Code 2018/11/8

Physical Layer Details Figure 2. The uplink subframe structure UIUC: specified burst profile 2018/11/8

Physical Layer Details Figure 3. TC PDU format. Transmission Convergence (TC) Sublayer: -performs the transformation of variable length MAC protocol data unit (PDUs) into fixed length FEC blocks (padding) -Allows resynchronization in case the previous FEC block had irrecoverable errors 把不同長度的PDC 放在固定長度的FEC block裡 2018/11/8

Agenda -Introduction -Technology Design -Physical Layer Details -Medium Access Control Details -Conclusion 2018/11/8

Medium Access Control Details Service-Specific Convergence Sublayers Interface to higher layers Common Part Sublayer: Carries out the key MAC functions Privacy Sublayer: Privacy protocol and security 2018/11/8

Medium Access Control Details Service-Specific Convergence Sublayers: -Classify service data units (SDUs) to the proper MAC connection ex. Legacy TDM, IP, VoIP, ATM with GFR -Preserve or enable QoS -Enable bandwidth allocation -Payload header suppression and reconstruction -ATM Con. Sublayer: for ATM services -Packet Con. Sublayer: packet services (IPv4, IPv6, Ethernet, VLAN) 2018/11/8

Medium Access Control Details Common Part Sublayer: General Architecture 802.16: point to multipoint -DL: TDM -UL:TDMA -Connection-oriented: all services are mapped to a connection -Requesting bandwidth -QOS -Traffic parameters -Transporting & routing data -Connections are referenced with 16-bit Connection identifiers (CID) 2018/11/8

Medium Access Control Details Common Part Sublayer: Three QoS levels to SS -Basic connection: short, time critical MAC and radio link control (RLC) message -Primary management connection: longer, delay-tolerant message (ex. authentication, connection setup) -Secondary message connection: standards-based management message (ex. DHCP, TFTP, SNMP) Transport connection (for contracted services) -Unidirectional, UL and DL QoS and traffic parameters, assigned to services in pairs. Reserved connections -Connection-based initial access, broadcast, multicast 2018/11/8

Medium Access Control Details MAC PDU Formats -Data unit exchanged between the MAC layers of the BS and its SS. Two format: -Generic Header, -Bandwidth Request Header (no payload) -Fixed length MAC header -Variable length payload -Cyclic redundancy check (CRC) , optional 2018/11/8

(Generic header) 2018/11/8

Medium Access Control Details MAC PDU Formats Three types of MAC subheader -Grant management subheader: SS use it to request bandwidth to BS -Fragmentation subheader Fragmentation is a MAC SDU is divided into one or more MAC SDU segment Indicates the presence and orientation in the payload of any fragments of SDUs -Packing subheader Packing is multiple MAC SDUs are packed into a single MAC PDU payload Indicate the packing of multiple SDUs into a single SDU 2018/11/8

Medium Access Control Details PHY support -The MAC builds the DL subframe starting with a frame control section containing the DL-MAP (PHY transitions) and UP-MAP (bandwidth allocations and burst profiles) messages. 2018/11/8

Medium Access Control Details Radio Link Control (RLC) -Burst profiles for the DL are tagged with Downlink Interval Usage Code (DIUC), for the UL are tagged with UIUC. -Ranging request (RNG-REQ): power leveling and ranging -Ranging response (RNG-RSP): power and ranging adjustment -RLC monitor and control the burst profiles. RLC can adapt the SS’s current UL and DL burst profiles to a balance between robustness and efficiency (ex. rain fades or good weather) RNG-REQ SS BS 2018/11/8 RNG-RSP

Medium Access Control Details DBPC: DL burst profile change 2018/11/8

Medium Access Control Details 2018/11/8

Medium Access Control Details Uplink scheduling services -Each connection in the uplink direction is mapped to a scheduling service. Unsolicited Polling Service (UGS): -Need constant bandwidth allocation Real-time polling service: -suited for VoIP, streaming video or audio Non-real-time polling service: -tolerate longer delays and are rather insensitive to delay jitter. Suited for Internet access with minimum guaranteed rate and for ATM GFR connections Best effort service: -Neither throughput nor delay guarantees are provided 2018/11/8

Medium Access Control Details Bandwidth Request and Grants Grant per connection (GPC): -bandwidth is granted explicitly to a connection, and SS uses the grant only for that connection. RLC and other management protocols use bandwidth allocated to the management connections. Grant per SS (GPSS): -SSs are granted bandwidth aggregated into a single grant to the SS itself. Is the only class of SS allowed with the 10-66 GHz PHY. Request by DBPC-REQ -The two class of SS allow a trade-off between simplicity (GPC) and efficiency (GPSS) 2018/11/8

Medium Access Control Details Bandwidth Request and Grants Reasons for failure bandwidth request- -The BS/ SS did not see the request due to irrecoverable PHY errors or collision of a contention-based reservation -The BS did not have sufficient bandwidth available -The GPSS SS used the bandwidth for another purpose -In self-correcting protocol, these are treated the same. After a timeout appropriate for the QoS of the connection, the SS simply requests again. -Less bandwidth, less delay than acknowledge protocol 2018/11/8

Medium Access Control Details Bandwidth Request and Grants Ways to request bandwidth- -Use “Poll-me bit” in grant management subheader when have unsolicited grant service (UGS) -”Piggyback” a request for additional bandwidth in grant management subheader within a MAC PDU for the same connection (GPC) -Use Bandwidth Request Header in MAC PDU with no payload (GPSS) -In addition to polling individual SSs, the BS may issue a broadcast poll by allocating a request interval to the broadcast CID 2018/11/8

Medium Access Control Details Channel Acquisition -The MAC protocol includes initialization procedure, need no manual configuration. An SS begins scanning frequency to find an operating channel. -After decide which channel, the SS tries to synchronize to the downlink transmission by detecting the periodic frame preambles. -After the PHY is synchronized, the SS can learn the modulation and FEC (Forward Error Correction) schemes (MCS) used on the carrier. 2018/11/8

Medium Access Control Details Initial Ranging and Negotiation of SS Capabilities -The SS uses a “truncated exponential backoff algorithm” to determine which initial ranging slot it will use to send a ranging request message. -The SS will send the burst using the minimum power setting and will try again with higher power if it does not receive a ranging response. -The BS commands a timing advance and a power adjustment to the SS in the ranging response. -The response also provides the SS with the” basic” and “primary management” CIDs 2018/11/8

Medium Access Control Details SS Authentication and Registration -manufacturer-issued factory-installed X.509 digital certificate -Certificate of the manufacturer These two establish a link between the 48-bit MAC address of the SS and its public RSA key, are sent to the BS in the Authorization Request and Authentication Information message The BS will respond to its request with an Authorization Reply containing an Authorization Key (AK) encrypted with the SS’s public key After that, the SS will register with the network, and establish the “secondary management connection”, determine capabilities, and which version of IP will be used. 2018/11/8

Medium Access Control Details IP Connectivity Get an IP address via DHCP Connection Setup Use service flows with two-phase activation, setup by the BS, and can be dynamically established by SS. Privacy Sublayer The privacy protocol is based on the Privacy Key Management (PKM) protocol and provide stronger cryptographic methods such as Advanced Encryption Standard (AES) 2018/11/8

Medium Access Control Details Security Associations -SA is a set of cryptographic methods and the associated keying material, contains the information about which algorithms to apply, which key to use. Every SS establishes at least one SA during initialization. Each connection is mapped to an SA. Cryptographic Methods Authentication & Authorization for SS Traffic encryption Exchange of transmission encryption keys PKM protocol uses X.509 with RSA public key Data encryption Standard (DES) in the cipher block chaining (CBC) with 56-bit keys 3DES 2018/11/8

Agenda -Introduction -Technology Design -Physical Layer Details -Medium Access Control Details -Conclusion 2018/11/8

Conclusion -IEEE 802.16 provides a platform for the development and deployment of metropolitan area networks broadband wireless access. -Allow for multiple vendors to produce interoperable equipment, meanwhile differentiation as well. -The efficiency of a transition will be optimized by adaptive burst profile feature and scheduling algorithm, and schemes…etc. -Power consumption concern, may apply optimization of ranging mechanism -The IEEE 802.16 wirelessMAN becomes a major alternative for broadband access. 2018/11/8

The End Thanks for your patience!!