SlideShare a Scribd company logo
1 of 18
WI-MAX
IEEE 802.16 - Wireless
MANs
WIRELESS NETWORKS
 Wireless PANs (Bluetooth – IEEE
802.15)
 very low range
 wireless connection to printers etc
 Wireless LANs (WiFi – IEEE 802.11)
 infrastructure as well as ad-hoc
networks possible
 home/office networking
 Multihop Ad hoc Networks
 useful when infrastructure not
available, impractical, or
expensive
 military applications,
emergencies
2
 Wireless MANs (WiMAX-802.16)
– Similar to cellular networks
– traditional base station
infrastructure systems
Sridhar IyerIIT Bombay
3
WIMAX
 Goal: Provide high-speed Internet access to home
and business subscribers, without wires.
 Base stations (BS) and subscriber stations (SS)
 Centralized access control to prevents collisions
 Supports applications with different QoS
requirements
 WiMAX is a subset of IEEE 802.16 standard
4
IEEE 802.16 STANDARDS
 802.16.1 (10-66 GHz, line-of-sight, up to 134Mbit/s)
 802.16.2 (minimizing interference between
coexisting WMANs)
 802.16a (2-11 Ghz, Mesh, non-line-of-sight)
 802.16b (5-6 Ghz)
 802.16c (detailed system profiles)
 P802.16e (Mobile Wireless MAN)
5
Sridhar IyerIIT Bombay
6
PHYSICAL LAYER
 Allows use of directional antennas
 Allows use of two different duplexing schemes:
 Frequency Division Duplexing (FDD)
 Time Division Duplexing (TDD)
 Support for both full and half duplex stations
 Adaptive Data Burst profiles
 Transmission parameters (e.g. Modulation, FEC) can be modified
on a frame-by-frame basis for each SS
 Profiles are identified by ”Interval Usage Code”
7
TIME DIVISION DUPLEXING (TDD)
8
MEDIA ACCES CONTROL (MAC)
 Connection oriented
 Connection ID (CID), Service Flows
 Channel access: decided by BS
 UL-MAP
 Defines uplink channel access
 Defines uplink data burst profiles
 DL-MAP
 Defines downlink data burst profiles
 UL-MAP and DL-MAP are both transmitted in the beginning of
each downlink subframe
9
TDD DOWNLINK SUBFRAME
Sridhar IyerIIT Bombay
10
UPLINK SUBFRAME
11
UPLINK PERIODS
 Initial Maintenance opportunities
 Ranging - to determine network delay and to request
power or profile changes
 Collisions may occur in this interval
 Request opportunities
 SSs request bandwith in response to polling from BS
 Collisions may occur in this interval
 Data grants period
 SSs transmit data bursts in the intervals granted by the BS
 Transition gaps between data intervals for
synchronization
12
BANDWIDTH REQUEST
 SSs may request bandwidth in 3 ways:
 Use the ”contention request opportunities” interval upon being
polled by the BS
 Send a standalone MAC message called ”BW request” in an
allready granted slot
 Piggyback a BW request message on a data packet
13
BANDWIDTH ALLOCATION 14
 BS grants/allocates bandwidth in one of two modes:
 Grant Per Subscriber Station (GPSS)
 Grant Per Connection (GPC)
 Decision based on requested bandwidth and QoS
requirements vs available resources
 Grants are notified through the UL-MAP
BANDWIDTH REQUEST-GRANT
PROTOCOL 15
BS
SS1
SS2
1
2.1
2.2
1. BS allocates bandwidth to SSs
for transmitting bandwidth
request.
2.1 SS1 transmits bandwidth
requests.
2.2 SS2 transmits bandwidth
requests.
3. BS allocates bandwidth to SSs
for transmitting data based on
their bandwidth requests.
Bandwidth is also allocated for
requesting more bandwidth.
4.1 SS1 transmits data and
bandwidth requests.
4.2 SS2 transmits data and
bandwidth requests.
4
4.1
4.2
SCHEDULING SERVICES
 Unsolicited Grant Service (UGS)
 Real-time, periodic fixed size packets (e.g. VoIP)
 No periodic bandwith requests required
 Real-Time Polling Service (rtPS)
 Real-time, periodic variable sizes packets (e.g MPEG)
 BS issues periodic unicast polls
 Non-Real-Time Polling Service (nrtPS)
 Variable sized packets with loose delay requirements (FTP)
 BS issues unicast polls regularly (not necessarily periodic)
 Can also use contention requests and piggybacking
 Best Effort Service
 Never polled individually
 Can use contention requests and piggybacking
16
EXAMPLE 17
Total Uplink Bytes =
100
2 SS and 1 BS
SS1
Demands:
UGS = 20
rtPS = 12
nrtPS = 15
BE = 30
SS2
Demands:
UGS = 10
rtPS = 10
nrtPS = 15
BE = 20
Total Demand Per
Flow:
UGS = 30
rtPS = 22
nrtPS = 30
BE = 50
Flows: UGS rtPS nrtPS BE
1st Round 40 30 20 10
30 22 20 10
Excess Bytes = 18
2nd Round 30 22 20+12
10+6
30 22 32 16
Excess Bytes = 2
3rd Round 30 22 30
16+2
30 22 30 18
SS1 Allocation = 20 +12 + 15 + 9 = 56
SS2 Allocation = 10 +10 + 15 + 9 = 44
FINAL SLIDE
Sridhar IyerIIT Bombay
18

More Related Content

What's hot

Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
 
Ss7 Introduction Li In
Ss7 Introduction Li InSs7 Introduction Li In
Ss7 Introduction Li Inmhaviv
 
Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Networkyusufd
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingMeenakshi Paul
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTbabuece
 
Circuit switching packet switching
Circuit switching  packet  switchingCircuit switching  packet  switching
Circuit switching packet switchingSneha Dalvi
 
Gprs chap12
Gprs chap12 Gprs chap12
Gprs chap12 akif2003
 

What's hot (20)

Switching
SwitchingSwitching
Switching
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Networks 1-intro
Networks 1-introNetworks 1-intro
Networks 1-intro
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
Ss7 Introduction Li In
Ss7 Introduction Li InSs7 Introduction Li In
Ss7 Introduction Li In
 
Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Network
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Lecture 7n
Lecture 7nLecture 7n
Lecture 7n
 
X.25 NETWORK PPROTOCOL
X.25 NETWORK PPROTOCOLX.25 NETWORK PPROTOCOL
X.25 NETWORK PPROTOCOL
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
SS7
SS7SS7
SS7
 
Routing
RoutingRouting
Routing
 
Circuit switching packet switching
Circuit switching  packet  switchingCircuit switching  packet  switching
Circuit switching packet switching
 
Umts 18 19
Umts 18 19Umts 18 19
Umts 18 19
 
Gprs chap12
Gprs chap12 Gprs chap12
Gprs chap12
 
Pdhsdh
PdhsdhPdhsdh
Pdhsdh
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 

Similar to Guide to WiMAX Technology and IEEE 802.16 Standard

9 16 05 Karim Hassib Wi Max
9 16 05 Karim Hassib   Wi Max9 16 05 Karim Hassib   Wi Max
9 16 05 Karim Hassib Wi Maxsai srikar
 
seminor presentation on wimax
seminor presentation on wimaxseminor presentation on wimax
seminor presentation on wimaxANIL KUMAR
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.pptSiva Cool
 
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXPERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXIJCSEA Journal
 
Performance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay StationPerformance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay Stationidescitation
 
1 bss-overview
1 bss-overview1 bss-overview
1 bss-overviewTelesom
 
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Editor IJCATR
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless NetworksNapier University
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSKathirvel Ayyaswamy
 

Similar to Guide to WiMAX Technology and IEEE 802.16 Standard (20)

Wi max
Wi maxWi max
Wi max
 
Wi max
Wi maxWi max
Wi max
 
Wi max
Wi maxWi max
Wi max
 
Wi Max
Wi MaxWi Max
Wi Max
 
9 16 05 Karim Hassib Wi Max
9 16 05 Karim Hassib   Wi Max9 16 05 Karim Hassib   Wi Max
9 16 05 Karim Hassib Wi Max
 
seminor presentation on wimax
seminor presentation on wimaxseminor presentation on wimax
seminor presentation on wimax
 
IEEE 806.16
IEEE 806.16IEEE 806.16
IEEE 806.16
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
 
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXPERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Performance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay StationPerformance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay Station
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
1 bss-overview
1 bss-overview1 bss-overview
1 bss-overview
 
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
Telecommunications: Wireless Networks
Telecommunications: Wireless NetworksTelecommunications: Wireless Networks
Telecommunications: Wireless Networks
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
 
wi-fi definition
wi-fi definition wi-fi definition
wi-fi definition
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Guide to WiMAX Technology and IEEE 802.16 Standard

  • 1. WI-MAX IEEE 802.16 - Wireless MANs
  • 2. WIRELESS NETWORKS  Wireless PANs (Bluetooth – IEEE 802.15)  very low range  wireless connection to printers etc  Wireless LANs (WiFi – IEEE 802.11)  infrastructure as well as ad-hoc networks possible  home/office networking  Multihop Ad hoc Networks  useful when infrastructure not available, impractical, or expensive  military applications, emergencies 2  Wireless MANs (WiMAX-802.16) – Similar to cellular networks – traditional base station infrastructure systems
  • 4. WIMAX  Goal: Provide high-speed Internet access to home and business subscribers, without wires.  Base stations (BS) and subscriber stations (SS)  Centralized access control to prevents collisions  Supports applications with different QoS requirements  WiMAX is a subset of IEEE 802.16 standard 4
  • 5. IEEE 802.16 STANDARDS  802.16.1 (10-66 GHz, line-of-sight, up to 134Mbit/s)  802.16.2 (minimizing interference between coexisting WMANs)  802.16a (2-11 Ghz, Mesh, non-line-of-sight)  802.16b (5-6 Ghz)  802.16c (detailed system profiles)  P802.16e (Mobile Wireless MAN) 5
  • 7. PHYSICAL LAYER  Allows use of directional antennas  Allows use of two different duplexing schemes:  Frequency Division Duplexing (FDD)  Time Division Duplexing (TDD)  Support for both full and half duplex stations  Adaptive Data Burst profiles  Transmission parameters (e.g. Modulation, FEC) can be modified on a frame-by-frame basis for each SS  Profiles are identified by ”Interval Usage Code” 7
  • 9. MEDIA ACCES CONTROL (MAC)  Connection oriented  Connection ID (CID), Service Flows  Channel access: decided by BS  UL-MAP  Defines uplink channel access  Defines uplink data burst profiles  DL-MAP  Defines downlink data burst profiles  UL-MAP and DL-MAP are both transmitted in the beginning of each downlink subframe 9
  • 10. TDD DOWNLINK SUBFRAME Sridhar IyerIIT Bombay 10
  • 12. UPLINK PERIODS  Initial Maintenance opportunities  Ranging - to determine network delay and to request power or profile changes  Collisions may occur in this interval  Request opportunities  SSs request bandwith in response to polling from BS  Collisions may occur in this interval  Data grants period  SSs transmit data bursts in the intervals granted by the BS  Transition gaps between data intervals for synchronization 12
  • 13. BANDWIDTH REQUEST  SSs may request bandwidth in 3 ways:  Use the ”contention request opportunities” interval upon being polled by the BS  Send a standalone MAC message called ”BW request” in an allready granted slot  Piggyback a BW request message on a data packet 13
  • 14. BANDWIDTH ALLOCATION 14  BS grants/allocates bandwidth in one of two modes:  Grant Per Subscriber Station (GPSS)  Grant Per Connection (GPC)  Decision based on requested bandwidth and QoS requirements vs available resources  Grants are notified through the UL-MAP
  • 15. BANDWIDTH REQUEST-GRANT PROTOCOL 15 BS SS1 SS2 1 2.1 2.2 1. BS allocates bandwidth to SSs for transmitting bandwidth request. 2.1 SS1 transmits bandwidth requests. 2.2 SS2 transmits bandwidth requests. 3. BS allocates bandwidth to SSs for transmitting data based on their bandwidth requests. Bandwidth is also allocated for requesting more bandwidth. 4.1 SS1 transmits data and bandwidth requests. 4.2 SS2 transmits data and bandwidth requests. 4 4.1 4.2
  • 16. SCHEDULING SERVICES  Unsolicited Grant Service (UGS)  Real-time, periodic fixed size packets (e.g. VoIP)  No periodic bandwith requests required  Real-Time Polling Service (rtPS)  Real-time, periodic variable sizes packets (e.g MPEG)  BS issues periodic unicast polls  Non-Real-Time Polling Service (nrtPS)  Variable sized packets with loose delay requirements (FTP)  BS issues unicast polls regularly (not necessarily periodic)  Can also use contention requests and piggybacking  Best Effort Service  Never polled individually  Can use contention requests and piggybacking 16
  • 17. EXAMPLE 17 Total Uplink Bytes = 100 2 SS and 1 BS SS1 Demands: UGS = 20 rtPS = 12 nrtPS = 15 BE = 30 SS2 Demands: UGS = 10 rtPS = 10 nrtPS = 15 BE = 20 Total Demand Per Flow: UGS = 30 rtPS = 22 nrtPS = 30 BE = 50 Flows: UGS rtPS nrtPS BE 1st Round 40 30 20 10 30 22 20 10 Excess Bytes = 18 2nd Round 30 22 20+12 10+6 30 22 32 16 Excess Bytes = 2 3rd Round 30 22 30 16+2 30 22 30 18 SS1 Allocation = 20 +12 + 15 + 9 = 56 SS2 Allocation = 10 +10 + 15 + 9 = 44