Wimax basics 2

Page 1

Prepared by: Eng. Ahmed Zaaza


• Wimax is a IEEE 802.16 standard. • So, What is the 802?


• IEEE is a committee formed for developing networking standards . • It was formed in February 1980, that why it is called 802 (2: month, 80: year). • It is a non profit committee. • It works on a group based hierarchy. Example: IEEE 802.3 IEEE 802.15 IEEE 802.11 IEEE 802.5 IEEE 802.16

Ethernet Zigbee WiFi Token Ring WIMAX

LAN PAN WLAN LAN WMAN


WAN 3GPP, EDGE (GSM)

IEEE 802.20 (proposed) IEEE 802.16 WirelessMAN IEEE 802.11 WirelessLAN

IEEE 802.15 Bluetooth

MAN

LAN

PAN

ETSI HiperMAN & HIPERACCESS ETSI HiperLAN

ETSI HiperPAN


Properties of the OSI Model 7

Application

6

Presentation

5

Session

4

Transport

3

Network

2

Data Link

1

Physical

Seven layers for the description of communication processes Logical combination of sub-functions within one layer Defined interfaces between layers: offer services


nu mmo Cl aci tr eV

Computer 1

Computer 2

7

Application

7

Application

6

Presentation

6

Presentation

5

Session

5

Session

4

Transport

4

Transport

3

Network

3

Network

2

Data Link

2

Data Link

1

Physical

1

Physical

Horizontal Communication


Sending and Receiving Data in the Layer Model Receive

Send

Data

Data

5-7 Data 4 5-7 Data

5-7 Data 4 5-7 Data

3 4 5-7 Data

3 4 5-7 Data

2 3 4 5-7 Data

2

2 3 4 5-7 Data

2

1 2 3 4 5-7 Data

2

1 2 3 4 5-7 Data

2


E-mail Data

Data

Segment Data Header

Segment

Network Segment Data Header Header Frame Network Segment Data Header Header Header

Packet Frame Trailer

Frame (Hardware-dependent)

0111111010101100010101101010110001

Bits


Network

Data Link

e

Physical


Personal Area Networks (PANs)

Metropolitan Local Area Area Networks Networks (MANs) (LANs)

Blue-tooth Blue-tooth

WMAN (802.16d)

WLAN WLAN 802.1 802.1 11

50 feet

500 feet

Wide Area Networks (WANs)

WMAN (802.16e)

10’s miles

Cellular Cellular 2.5 2.5 G, G, 3G 3G

Range



802.16

802.11b/g(WI -FI)

Technical difference

Range

Up to 50 Km typical cell size (5-8Km)

Sub -500m add access points for greater) (coverage

tolerates greater multipath delay spread via 256 FFT vs 64 802.16 FFT

Coverage

Outdoor NLOS performance standard support for advanced antenna techniques

Optimized for indoor performance ,short range

systems has an overall higher system gain dellvering 802.16 greater penetration through obstacles at longer distances

Designed to support hundreds of CPES with unlimited subscribers behind each CPE

Intended for LAN applications ,users scale from one to tens with one subscriber for each CPE device

can use all available BW ,multiple channel support cellular 802.16 deployment,802.11 is limited to license exempt spectrum

Bit Rate

Up to 75 MB/S in 20 MHZ channel

Up to 54MB/S in 20MHZ channel

Higher modulation coupled with flexible error correction

QoS

Built in to MAC voice/video service levels

No QOS support

is contention based MAC )CSMA/CA( ,802.16 dynamic 802.11 TDMA-based MAC with on-demand BW allocation

MAC

Polling –based MAC layer

Contention based MAC

Scalability



• In 1998, the Institute of Electrical and Electronics Engineers (IEEE) formed a group called 802.16 to develop a standard for what was called a wireless metropolitan area network, or wireless MAN. Originally, this group focused on developing solutions in the 10GHz to 66GHz band. • IEEE 802.16 The IEEE 802.16 group produced a standard that was approved in December 2001. This standard, Wireless MAN-SC, specified a physical layer that used single-carrier modulation techniques and a media access control (MAC) layer with a burst time division multiplexing (TDM) structure that supported both frequency division duplexing (FDD) and time division duplexing (TDD). • IEEE 802.16a (OFDM) After completing this standard, the group started work on extending and modifying it to work in both licensed and license-exempt frequencies in the 2GHz to 11GHz range, which would enable NLOS deployments. This amendment, IEEE 802.16a, was completed in 2003.


•IEEE 802.16-2004 (Fixed & Portable) Further revisions to 802.16a were made and completed in 2004. This revised standard, IEEE 802.16-2004, replaces 802.16, 802.16a with a single standard, which has also been adopted as the basis for HIPERMAN (high-performance metropolitan area network) by ETSI (European Telecommunications Standards Institute). •IEEE 802.16e (Mobile) In 2003, the 802.16 group began work on enhancements to the specifications to allow vehicular mobility applications.The 802.16e, was completed in December 2005 and was published formally as IEEE 802.16e-2005.It specifies scalable OFDM for the physical layer and makes further modifications to the MAC layer to accommodate high-speed mobility.


•

As it turns out, the IEEE 802.16 specifications are a collection of standards with a very broad scope. In order to accommodate the diverse needs of the industry, the standard incorporated a wide variety of options. In order to develop interoperable solutions using the 802.16 family of standards, the scope of the standard had to be reduced by establishing consensus on what options of the standard to implement and test for interoperability. The IEEE developed the specifications but left to the industry the task of converting them into an interoperable standard that can be certified. The WiMAX Forum was formed to solve this problem and to promote solutions based on the IEEE 802.16 standards.


Fixed Licensed and Unlicensed E1/ T1 & DSL level service

Portable

Mobile

Licensed and Unlicensed Licensed Consumer DSL level serviceWideband Data Rates

Enterprise / Backhaul

Residential access

Portable

802.16 HiperMAN

802.16 HiperMAN

802.16d

Nomadic

Cellular Wideband

802.16d, 2.5G, 3G, 802.16e 802.11 Hot Spots


Carrier Band -----------------------------------------------------------------------------------3.5 GHz 3.5, 7 MHz -----------------------------------------------------------------------------------5.8 GHz 10 MHz -----------------------------------------------------------------------------------2.3 GHz - 2.4 GHz 5, 10, 8.75 MHz ------------------------------------------------------------------------------------2.305 GHz - 2.320 GHz 3.5, 5, 10 MHz 2.345 GHz - 2.360 GHz ------------------------------------------------------------------------------------2.496 GHz - 2.69 GHz 5, 10 MHz ------------------------------------------------------------------------------------3.3 GHz – 3.4 GHz 5, 7, 10 MHz ------------------------------------------------------------------------------------3.4 GHz – 3.8 GHz 5, 7, 10 MHz 3.4 GHz – 3.6 GHz 3.6 GHz – 3.8 GHz


802.16

802.16d

802.16e

Completed

December 2001

January 2004

Dec. 2005

Spectrum

10 - 66 GHz

2 -11 GHz

< 6 GHz

Channel Conditions

Line of Sight Only

Non Line of Sight

Non Line of Sight

Bit Rate

32 – 134 Mbps in 28MHz channel bandwidth

Up to 75 Mbps in 20MHz channel bandwidth

Up to 15 Mbps in 5MHz channel bandwidth

Modulation

single-carrier modulation technique

OFDM 256 sub-carriers QPSK, 16QAM, 64QAM

OFDM 256, 512, 1024, 2048 sub-carriers QPSK, 16QAM, 64QAM

Multiplexing

TDMA

TDMA

TDMA/OFDMA

Mobility

Fixed

Fixed, Portable

Nomadic Mobility (limited to 120 KM/h)

Channel Bandwidths

20, 25 and 28 MHz

Scalable 1.5 to 20 MHz

Same as 802.16d

Typical Cell Radius

2-5 km

7 to 10 km (Max range 50 km for backhauling)

2-5 km


Non Line of Sight Point to Multipoint

Point to Point BACKHAUL

802.1 1

E1/T1+ LEVEL SERVICE ENTERPRISE

FRACTIONAL E1/T1 for SMALL BUSINESS

Telco Core Network or Private (Fiber) Network INTERNET BACKBONE


OUTDOOR CPE 802.1 1

INDOOR CPE

Non Line of Sight Point to Multipoint

802.1 1 & 802.1 6

Point to Point BACKHAUL

Telco Core Network or Private (Fiber) Network INTERNET BACKBONE



ASN BS MS

BS BS BS

NSP

ASN-GW CSN ASN-GW

MS: Mobile station BS: Base-station ASN-GW: Accessing service Network-Gateway CSN: Connectivity service Network NSP: Network Service Provider

another

CSN

Internet Or IP-network


MS

• • • • •

Consist of receiver & antenna systems. Allow User to connect to the network. MS Integrated or external antenna. Self and easy to install. Access voice, video & high speed data services .

ASN BS BS BS BS

NSP

ASN-GW CSN ASN-GW

• Subscriber terminal (CPE) may support one type of services or may support more than one type such as (Voice, Video & Data).

another CSN

Internet Or IP-network


BS

1. Air interface handling. • •

Power control. Network entry (SS initialization).

2. 3. 4. 5. 6. 7. 8.

QoS providing Via air interface through Service flow management. ASN Traffic classification. BS MS activity status update. ASN-GW BS Radio resource management update (agent). MS BS Paging agent. ASN-GW BS Deliver TEK & KEK from ASN-GW to MS. Deliver authentication messages from ASN-GW to MS.

NSP

CSN

another CSN

Internet Or IP-network


Omni Antenna

Plane Antenna Sectorial Antenna

Desk-top Antenna


Tower with antenna

Transmission line (Coaxial cable)

shelter

Network operator will update the site database in the equipment remotely


ASN-GW 1. 2. 3. 4. 5. 6.

Radio Resources Controller (RRC), act as BSC in GSM network. Paging controller. Temporary caching of subscriber profiles & Encryption keys. Perform routing to selected CSN. Act as server to perform mobility sessions. Provides mobility tunnel establishment & management with BS for handover. 7. DHCP server. 8. Authenticator & perform Key management, act as AAA client ASN to the AAA server in the CSN. BS

MS

BS BS BS

NSP

ASN-GW CSN ASN-GW

another CSN

Internet Or IP-network


1. 2. 3. 4. 5. 6. 7.

IP Address allocation for users. Subscriber billing. AAA proxy server ( Authentication, Authorization & Accounting). QoS management based on SLA (contract with user). Connection with other CSN. Connect several ASN. Connectd to internet or any IP-network.

ASN BS MS

BS BS BS

CSN

NSP

ASN-GW CSN ASN-GW

another CSN

Internet Or IP-network



Simultaneously support hundreds of businesses with E1/T1 speed connectivity and thousands of homes with DSL speed connectivity. Promise of potential low cost and flexibility in building broadband networks. Scalability, as extra channels and base stations can be added incrementally as bandwidth demand grows. Support for both voice and video as well as Internet data. Semiconductor vendors envisage WiMax-enabled chips appearing in PCs in 2006 and in notebook computers and PDAs by 2007


ATM Overview Asynchronous transfer mode


ATM Overview • Developed to carry multimedia real-time application (video - speech) and non real-time application (data)


Overhead and Payload :

Payload

Overhead

2

2

3

4

5-7

Data

Packet (Max 1500 byte)

Frame

Variable

2

2


What is the problem?


TDMA Frame 1

Frame 2

125 usec. Synchronies

•No delay. •Best for real time application (QOS >>>) •Limited number of bits. •Not suitable for data (data traffic is burst)

Frame 3


Packet switching A

A

packet length

A

Spacing interval

•PKT is variable length and asynchronous •Suitable for data •Bad QOS for real-time application


ATM Solution: Based on packet switching but packet are at fixed length (cell)

A

B

A

C

B

A

C

A

B

Cell Less time variation with packet switches but not as TDM to be able to integrate real and non- real application


ATM Solution: Cell size is a compromise Small size selected to minimize packet delay for voice transmission Cell size is a compromise Larger cell size would be

ďƒ˜more efficient for data Per packet processing ďƒ˜Header overhead

Header Header

Data Data

Bytes 5

Bytes 48


ATM Solution: ATM is a (Vir tual Circuit ) network Switched vir tual circuit (SVC)--connection and paths through the network are established on an as-needed basis i.e each connection you must make virtual circuit setup so, QoS is not guaranteed. Permanent vir tual (PVC) -- connection and paths through the network are established when network is established as a leased line for a period of time so, QoS is guaranteed and no virtual circuit setup is needed.


Packing Ethernet frame into ATM cell.

Ethernet frame

Packet (Max 1500 byte)

2

H

Data

ATM Cell

H

Data

H

2

Data



ATM transport

IP transport

Layer 3

LLC Convergence Sub-layer Layer 2

Common part Sub-layer Privacy Sub-layer Physical Sub-layer

Layer 1


ATM transport

IP transport

Convergence Sub-layer Common part Sub-layer

• CS adapts higher layer protocols to MAC SDU it maps ATM cells or IPpackets to certain Unidirectional connection identified by CID Associated with certain QoS. • Packet Header Suppression.

Privacy Sub-layer Physical Sub-layer IP packet or ATM cell

Convergence Sub-layer

MAC service data unit (MAC SDU)


ATM transport

IP transport

Connection Identifier CID

Convergence Sub-layer Common part Sub-layer Privacy Sub-layer Physical Sub-layer

• Wimax MAC layer is a connection oriented so, it defines a logical connection between the MS & BS by A CID. • CID can be considered as layer 2 addressing. • The MS informed by its CID from the BS depending on: 1.Application and also QoS. 2.SFID (Service Flow ID). 3.Destination address.


ATM transport

IP transport

Convergence Sub-layer Common part Sub-layer Privacy Sub-layer Physical Sub-layer

PHS (Packet Header Suppression) • Convergence sub-layer do PHS to decreas the data overhead on the packet and its repeating according to the PHS rule.

Packet

Header

PHSM come from the PHS rule

Packet

PHSI

MAC

SDU


ATM transport

IP transport

• Fragment and reassembly of large MAC SDUs into smaller MAC PDU (Protocol Data Unit).

Convergence Sub-layer

• Automatic repeat request (ARQ).

Common part Sub-layer

• Bandwidth request.

Privacy Sub-layer Physical Sub-layer

• QoS control & scheduling. • Mobility management. • Power-saving operation.


ATM transport

IP transport

MAC PDU (Protocol Data Unit) & (ARQ)

MAC

Convergence Sub-layer 1 2 12

Common part Sub-layer

3

4

5

6

fragment

Privacy Sub-layer

SDU 7

8

9

10 11

ARQ block

fragment

Physical Sub-layer

GMH

fragment MAC PDU

CRC

GMH

fragment MAC PDU

•Each ARQ block has a BSN (Block Sequence Number). •GMH contain the BSN of the first block. •Tx must receive an acknowledgment on each MAC PDU which has two types: •Selective ARQ: receive acknowledgment on each ARQ block. •Cumulative ARQ: receive acknowledgment that all block less than BSN are received without errors. •If no acknowledgment is received, then the CP sub-layer will transmit the ARQ block again.

CRC


ATM transport

IP transport

MAC PDU (Protocol Data Unit) & (ARQ)

Convergence Sub-layer Common part Sub-layer

GMH

Privacy Sub-layer

MAC PDU fragment

CRC Payload field

Physical Sub-layer

Header for Data payload & signaling messages. Header for Bandwidth request.

6 Bytes GMH

4 Bytes fragment

CRC


ATM transport

MAC PDU Header for Data

IP transport

Convergence Sub-layer Common part Sub-layer

HT EC

Type (6)

EKS (2)

LEN (3)

Privacy Sub-layer Physical Sub-layer

LEN (8) CID CID(8)(8)

CID (8) HCS (8)

HT 1 Header type (set to 0 for such header) EC 1 Encryption control (0 = payload not encrypted; 1 = payload encrypted) Type 6 Type of the internal Sub-header ESF 1 Extended sub-header field (1 = ES present; 0 = ES not present) CI 1 CRC indicator (1 = CRC included; 0 = CRC not included) EKS 2 Encryption key sequence (index of the traffic encryption key and the initialization vector used to encrypt the payload) Rsv 1 Reserved LEN 11 Length of MAC PDU in bytes, including the header CID 16 Connection identifier on which the payload is to be sent HCS 8 Header check sequence; generating polynomial D8 + D2 + D + 1


ATM transport

MAC PDU Header for BW request

IP transport

Convergence Sub-layer Common part Sub-layer

HT EC

Type (3)

BR (11)

Privacy Sub-layer Physical Sub-layer

BR (8) CID CID(8)(8)

CID (8) HCS (8)

HT 1 Header type (set to 0 for such header) EC 1 Encryption control (0 = payload not encrypted; 1 = payload encrypted) Type 3 Type BR 19 Bandwidth request (the number of bytes of uplink bandwidth requested by the SS for the given CID) CID 16 Connection identifier on which the payload is to be sent HCS 8 Header check sequence; generating polynomial D8 + D2 + D + 1


ATM transport

IP transport

MAC PDU (Protocol Data Unit) sub-header MAC PDU

Convergence Sub-layer Common part Sub-layer

GMH

SH

Payload

CRC

Privacy Sub-layer Physical Sub-layer

Fragmentation sub-header Packing sub-header

Grant-management subheader •Fragmentation sub-header: Follows the generic MAC header and indicates that the SDU is fragmented over multiple MAC PDUs. •Packing sub-header: Indicates that multiple SDUs or SDU fragments are packed into a single MAC PDU and are placed at the beginning of each SDU or SDU fragment. •Grant-management sub-header: Used by piggybacking BW request on generic MAC PDU


ATM transport

IP transport

Bandwidth request

Convergence Sub-layer Common part Sub-layer Privacy Sub-layer

GMH GMSH

BW request

CRC

Piggyback MAC PDU

Physical Sub-layer

GMH

Stand alone MAC PDU header.

• Messages sent by the MS to request an additional PHY resources to a specific application (CID). • The BS receives these messages from MS (carrying specific CID) and decide to give this MS additional BW depending on it’s QoS.


ATM transport

IP transport

Convergence Sub-layer Common part Sub-layer Privacy Sub-layer

Bandwidth request Bandwidth request may be: • Incremental • Aggregate.

Physical Sub-layer

• Incremental: the BW request message contains a number of steps which the MS needs to add to the currently available BW. • Aggregate: the BW request message contains a number of BW which the MS needs. Type (3)

BR (11)

BR (8)

CID (8)

CID (8)

HCS HCS (8)

• The type field indicates that whether the request is Incremental or Aggregate. • In piggyback on MAC PDU the request is Incremental only.


ATM transport

IP transport

Convergence Sub-layer Common part Sub-layer Privacy Sub-layer Physical Sub-layer

Bandwidth request mechanism • BW request must send from MS after the BS has send a polling message to it. • Polling may be Unicast Polling or Multicast Polling.

Unicast Polling: the BS sends a polling message to each connected MS individually. 3. Accept & allow additional BW 2. BW request message 1. Polling (contain specific CID) MS

BS


Multicast Polling: the BS sends a polling message to group of MS in stead of one by one. MS1

Random number 1

1. Polling (contain specific CID) MS1

Sends a MAX back off window size Random number 2

2. BW request message from MS2 3. BW request message from MS2

X

4. Accept & allow additional BW to MS2

BS


ATM transport

IP transport

Convergence Sub-layer Common part Sub-layer Privacy Sub-layer

QoS control & scheduling • One of the key functions of the WiMAX MAC layer is to ensure that QoS requirements for MAC PDUs belonging to different service flows are met as reliably as possible given the loading conditions of the system.

Physical Sub-layer

• This implies that various negotiated performance indicators that are tied to the overall QoS, such as jitter, data rate, packet error rate, and system availability, must be met for each connection.

WIMAX handles QoS through: • Scheduling Services. • Service Flow.


ATM transport

IP transport

QoS Scheduling Services.

Convergence Sub-layer

• WIMAX defines four Scheduling Services:

Common part Sub-layer

• • • •

Privacy Sub-layer Physical Sub-layer

Unsolicited grant service (UGS) Real-time polling services (rtPS) Non-real-time polling services (nrtPS) best-effort service (BE)

1.Unsolicited grant service (UGS): Is designed to support real-time service flows that generate fixed-size data packets on a periodic basis, such as T1/E1 and VoIP. UGS offers fixed-size grants on a real-time periodic basis and does not need the SS to explicitly request bandwidth, thus eliminating the overhead and latency associated with bandwidth request.


ATM transport

IP transport

QoS Scheduling Services.

Convergence Sub-layer

• WIMAX defines four Scheduling Services:

Common part Sub-layer

• • • •

Privacy Sub-layer Physical Sub-layer

Unsolicited grant service (UGS) Real-time polling services (rtPS) Non-real-time polling services (nrtPS) best-effort service (BE)

2.Real-time polling services (rtPS): is designed to support real-time services that generate variable-size data packets on a periodic basis, such as MPEG (Motion Pictures Experts Group) video. In this service class, the BS provides unicast polling opportunities for the MS to request bandwidth. The unicast polling opportunities are frequent enough to ensure that latency requirements of real-time services are met. This service requires more request overhead than UGS does but is more efficient for service that generates variable-size data packets.


ATM transport

IP transport

QoS Scheduling Services.

Convergence Sub-layer

• WIMAX defines four Scheduling Services:

Common part Sub-layer

• • • •

Privacy Sub-layer Physical Sub-layer

Unsolicited grant service (UGS) Real-time polling services (rtPS) Non-real-time polling services (nrtPS) best-effort service (BE)

3.non-real-time polling services (nrtPS): is very similar to rtPS except that the MS can also use contention-based polling in the uplink to request bandwidth. In nrtPS, it is allowable to have unicast polling opportunities, but the average duration between two such opportunities is in the order of few seconds, which is large compared to rtPS. All the MSs belonging to the group can also request resources during the contention-based polling opportunity, which can often result in collisions and additional attempts.


ATM transport

IP transport

QoS Scheduling Services.

Convergence Sub-layer

• WIMAX defines four Scheduling Services:

Common part Sub-layer

• • • •

Privacy Sub-layer Physical Sub-layer

Unsolicited grant service (UGS) Real-time polling services (rtPS) Non-real-time polling services (nrtPS) best-effort service (BE)

4.Best-effort service (BE): provides very little QoS support and is applicable only for services that do not have strict QoS requirements. Data is sent whenever resources are available and not required by any other scheduling-service classes. The MS uses only the contention-based polling opportunity to request bandwidth.


ATM transport

IP transport

Convergence Sub-layer Common part Sub-layer Privacy Sub-layer Physical Sub-layer

QoS Service Flow. • Each service flow is associated with a unique set of QoS parameters, such as latency, jitter throughput, and packet error rate, that the system strives to offer. • A service flow has the following components:

• Service flow ID: a 32-bit identifier for the service flow. • Connection ID: a 16-bit identifier of the logical connection to be used for carrying the service flow. The CID is the identity of an MS at the PHY layer. MS can have more that one CID at a time, that is, a primary CID and multiple secondary CIDs. The MAC management and signaling messages are carried over the primary CID. • Provisioned QoS parameter set: the recommended QoS parameters to be used for the service flow, usually provided by a higher-layer entity. • Admitted QoS parameter set: the QoS parameters actually allocated for the service flow and for which the BS and the MS reserve their PHY and MAC resources. The admitted QoS parameter set can be a subset of the provisioned QoS parameter set when the BS is not able, for a variety of reasons, to admit the service with the provisioned QoS parameter set.


GMH

MAC Management Message

CRC

MAC SDU fragment

CRC

GMH

FSH

GMH

PSH

MAC SDU fragment

PSH

MAC SDU fragment

CRC

GMH

GMSH

PSH ARQ feedback

PSH

MAC SDU fragment

CRC


ATM transport

IP transport

Convergence Sub-layer Common part Sub-layer Privacy Sub-layer Physical Sub-layer

• The privacy sub layer provides authentication, key management and encryption.


ATM transport

IP transport

Convergence Sub-layer Common part Sub-layer Privacy Sub-layer Physical Sub-layer

OFDM/OFDMA Modulation/Coding



OFDM Basic Concept OFDM is a multi-carrier modulation scheme that transmits data over a number of orthogonal sub-carriers A conventional transmission uses only a single carrier, which is modulated with all the data to be sent OFDM breaks the data to be sent in to small chunks, allocating each sub-data stream to a sub-carrier and the data is sent in parallel orthogonal sub-carriers.


OFDM Spectral Overlap

Conventional Frequency Division Multiplex (FDM) Multi-carrier Modulation Technique OFDM subcarriers have a sinc (sin(x)/x) frequency response resulting in overlap in the frequency domain. This overlap does however not cause any interference due to the orthogonality of the subcarriers.

Saving of the bandwidth

Orthogonal Frequency Division Multiplex (OFDM) Multi-carrier Modulation Technique The OFDM receiver uses a time and frequency synchronized FFT to convert the OFDM time waveform back into the frequency domain. In this process the FFT picks up discrete frequency samples, corresponding to just the peaks of the carriers. At these frequencies, all other carriers pass through zero amplitude eliminating any interference between the subcarriers.


Multipath and OFDM Faded Path

[ ak ,τ k ]

LOS Path

[a0 ,τ 0 ]

[a1 ,τ 1 ] Reflected Path

K −1

h)t ( = ∑ ak δ )t − τ k ( k =0


Multipath and OFDM OFDM Offers Advantage in Frequency Selective Fading Environments Channel Response

Only a few subcarriers are lost due to fading. This can be overcome with proper channel coding.



F1

f2

f3

f4

f5

fn

F

T

10

10

11

01

11

01

I

Q

Site coverage

F1, f2, f3


5.2 KM 4.4 KM 3 KM 2 KM 64QAM 16QAM QPSK

15% 18%

BPSK

39% 28% rate = 3.8 Mbps


•Supported services VOIP Web Browsing Video call

Sector coverage •Supported services VOIP

64QAM 16QAM QPSK BPSK



• WIMAX supports TDD & FDD full duplex modes but the most used mode is TDD due to its capacity performance.

TDD: F1 Sub-Frame

Sub-Frame

Sub-Frame

Sub-Frame

Uplink

Downlink

Uplink

Downlink Variable

Variable

FDD: F1 F2

Frame

Frame

Frame

Frame

Uplink Downlink


• According to WIMAX TDD framing, each frame consist of Uplink sub-frame & Downlink sub-frame. • WIMAX support variety of frame length (10ms, 7ms, 5ms, 2ms). • The length of each sub-frame is variable according to the traffic.

……...

Frame

Frame

Sub-Frame

Sub-Frame

Downlink

Uplink Variable

Frame


……...

Frame

Frame

Frame

Uplink sub-frame

Downlink Sub-Frame

Contention Contention slot A slot B

Variable

UL PHY Burst 1

.…

UL PHY Burst n


……...

Frame

Frame

Frame

Uplink sub-frame

Downlink Sub-Frame

Contention Contention slot A slot B

UL PHY Burst 1

.…

UL PHY Burst n

Variable

• The first UL Burt for initial ranging that the MS use in the network attach process by sending Initial Attach Messages.


……...

Frame

Frame

Frame

Uplink sub-frame

Downlink Sub-Frame

Contention Contention slot A slot B

UL PHY Burst 1

.…

UL PHY Burst n

Variable

• The second UL Burt for Bandwidth request that the MS use to ask for additional BW (PHY resources) ex.: sub-carriers, modulation & coding schemes in UL or DL by sending BW request Messages.


……...

Frame

Frame

Frame

Uplink sub-frame

Downlink Sub-Frame

Contention Contention slot A slot B

UL PHY Burst 1

.…

UL PHY Burst n

Variable

• In the UL PHY Burst, the MS can send it’s data to the BS in different modulation & coding schemes. • UL PHY Burst also called UL PHY PDU.


……...

Frame

Frame

Frame

Uplink sub-frame

Downlink Sub-Frame

Contention Contention slot A slot B

UL PHY Burst 1

.…

UL PHY Burst n

Have the same modulation Variable Preamble GMH

fragment

CRC GMH

fragment

CRC

UL PHY PDU

• Each UL PHY Burst consist of several PDUs with a previous Preamble to ensure synchronization & equalization for this burst and followed by Pad indicating the end of this burst.

Pad


……...

Frame

Preamble FCH

Frame

MAPs

UL PHY Burst 1

.…

Frame

UL PHY Burst n

Uplink Sub-frame

• DL Sub-frame starts by a Preamble which necessary for frame synchronization and help in equalization.


……...

Frame

Preamble FCH

Frame

MAPs

DL PHY Burst 1

.…

Frame

DL PHY Burst n

Uplink Sub-frame

FCH (Frame Control Header) contain the location and provides frame configuration information, such as the MAP message length, the modulation and coding scheme, and the usable subcarriers of each burst in the DL Subframe. •FCH is one OFDM symbol long and transmitted using BPSK modulation.


……...

Frame

Preamble FCH

• • • • •

Frame

MAPs

DL PHY Burst 1

.…

Frame

DL PHY Burst n

The first burst of the DL Sub-frame contains: DL map. UL map. UCD (Uplink Channel Descriptor) Optional. DCD (Downlink Channel Descriptor) Optional.

Uplink Sub-frame


……...

Frame

Preamble FCH

Frame

MAPs

DL PHY Burst 1

.…

Frame

DL PHY Burst n

Uplink Sub-frame

• DL map & UL map: Indicates the starting times of the UL & DL bursts and specify the data regions of the various users in the DL and UL sub-frames. • UCD & DCD: which contains additional control information to the description of channel structure and the various burst profiles that are allowed within the given BS. UDC & DCD are not transmitted every DL frame.


……...

Frame

Preamble FCH

Frame

MAPs

DL PHY Burst 1

.…

BPSK

Frame

DL PHY Burst n

Uplink Sub-frame

64QAM

Have the same modulation

GMH

fragment

CRC GMH

fragment

CRC

Pad

• Each DL PHY Burst consist of several MAC PDUs ended with pad to indicate the end of burst.


……...

Frame

Frame Uplink Sub-frame

Downlink Sub-frame Preamble FCH

MAPs

UL PHY Burst 1

.…

UL PHY Burst n

BPSK Contention slot A

Contention slot B

Preamble

GMH

Frame

PDU

fragment

64QAM

.…

UL PHY Burst 1

PDU

CRC

Pad

UL PHY Burst n


WiMax 802.16 MAC Convergence Sub layer When a SS is joining the network, three CIDs are assigned to it for management, each one with different QoS requirements: Basic, Primary Management and Secondary management connections .



The network operator defines a set of PROFILES for each base station. All these profiles are listed in table and will control the connections that will be created for each terminal station. Profile is defined as a set the following information: •Profile Name. •Class of service of radio connection (UGS, rtPS, nrtPS, BE). •List of QoS rules that the operator will handle services classes. •MSTR (Maximum Sustained Traffic Rate) •MRTR (Minimum Reserved Traffic Rate) •CRC (Cyclic Redundancy check) enabling.


Ex: Terminal station connection setup (1)


Ex: Terminal station connection setup (2)


Ex: Terminal station connection setup (3)


Ex: Terminal station connection setup (4)


Ex: Terminal station connection setup (Downlink)


Network Entry










OFDM

Physical Layer


OFDM Basic Concept OFDM is a multi-carrier modulation scheme that transmits data over a number of orthogonal sub-carriers A conventional transmission uses only a single carrier, which is modulated with all the data to be sent OFDM breaks the data to be sent in to small chunks, allocating each sub-data stream to a sub-carrier and the data is sent in parallel orthogonal sub-carriers.


OFDM Spectral Overlap

Conventional Frequency Division Multiplex (FDM) Multi-carrier Modulation Technique OFDM subcarriers have a sinc (sin(x)/x) frequency response resulting in overlap in the frequency domain. This overlap does however not cause any interference due to the orthogonality of the subcarriers.

Saving of the bandwidth

Orthogonal Frequency Division Multiplex (OFDM) Multi-carrier Modulation Technique The OFDM receiver uses a time and frequency synchronized FFT to convert the OFDM time waveform back into the frequency domain. In this process the FFT picks up discrete frequency samples, corresponding to just the peaks of the carriers. At these frequencies, all other carriers pass through zero amplitude eliminating any interference between the subcarriers.


Multipath and OFDM Faded Path

[ ak ,τ k ]

LOS Path

[a0 ,τ 0 ]

[a1 ,τ 1 ] Reflected Path

K −1

h)t ( = ∑ ak δ )t − τ k ( k =0


Multipath and OFDM OFDM Offers Advantage in Frequency Selective Fading Environments Channel Response

Only a few subcarriers are lost due to fading. This can be overcome with proper channel coding.


Generation of OFDM Symbol

Carrier frequency

• BPSK • QPSK • 16QAM • 64QAM

Ex: 5 GHz

……… …

High speed data

……… …

011011010 1

……… …

Cyclic Prefix

baseband signal in frequency domain.

d = (I + jQ) × KMOD (20)

OFDM Symbol

Analog baseband multicarrier signal

Cyclic Prefix


More Multipath Mitigation…Cyclic Prefix Delay spread exceeds symbol time

Add a gap to capture delay spread

Can’t have gaps in transmission…copy part of symbol and put it in the front


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.