SlideShare a Scribd company logo
4G Integrated WiMAXA Detailed Introduction By BRIAN RITCHIE Twitter : brianritchie Facebook : facebook.com/brianritchie
Who Am I ? Co worked on the Enterprise Architecture for some of the largest regional as well as international companies Rolled out the first official OSS Centre of Excellence strategy and implementation for a local Financial Institution Experience with large scale Project Management for core systems Designed and Implemented Research and Incubation Services for large scale corporations
Agenda Introduction to WiMAX Introduction to Network Access Control Layers
Before We Go Further !!! Case Study : How would you cope with the increased need for bandwidth delivered at lower costs to more subscribers ? Assume the technologies available to you are the following : Ethernet Wi-Fi Cell Towers, Base Stations, Data Centers, Traditional CDNs
What is WiMAX ? A quick standards introduction
What is WiMAX ? WiMAX =  Worldwide Interoperability for Microwave Access Aim : To provide long distance wireless broadband for applications similar to the coverage and quality of service (QOS) of cellular networks Promotes the IEEE 802.16 standards
What is 802.16 ? Wireless Standards in IEEE Project 802
What is 802.16 ? IEEE 802.16 originally aimed to define fixed broadband wireless (FBW) May possibly replace the past wireless local loop (WLL) in telecommunications Able to deliver performance comparable to traditional cable, T1, xDSL, etc.
What is 802.16 ? Advantages of 802.16 include : Quick and easy deployment especially for areas that are difficult to be wired. No physical limitations compared to wired infrastructure Cost effective for $/MB of data Increased security through multi-level encryption Highly scalable with significantly higher throughout
Wireless Architectures What are the architectures behind WiMAX deployment
Wireless Architectures There are two types of wireless deployment Point to Point (P2P) Point to Multipoint (PMP) How does Line of Sight (LOS) affect these architectures ?
Wireless Architectures Point to Point (P2P) Architecture P2P is used where there are two points of interest Usually used for backend communication/data transfer (e.g: data center, co-lo, base stations) or as a point for distribution for PMP Higher throughput than PMP Transmitter Receiver
Wireless Architectures Point to Multipoint (PMP) PMP is used primarily for distribution Able to serve hundreds of dissimilar subscribers simultaneously
How does it affect WiMAX ? Previous wireless technologies could not server NLOS WiMAX functions best in LOS but is also able to serve NLOS with acceptable throughput which led to lower cost per subscriber because more subscribers could be served from one base station Line of Sight (LOS) Line of Sight (LOS) Non Line of Sight (NLOS)
What is WiMAX ? Types of WiMAXdeployments and what its not
Terminology Fixed WiMAX (IEEE 802.16d / 802.16-2004) Mobile WiMAX(IEEE 802.16e / 802.16e-2005) WiMAXvsWi-Fi
Fixed WiMAX ( IEEE 802.16d ) The capability of Fixed WiMAX One of the major limitations was that this architecture was not mobile. Users were not able to transition data between base towers  P2P : LOS = 30 Miles/48km , 72Mbps PMP : NLOS = 6 Miles/9.6km , 40Mbps
Mobile WiMAX ( IEEE 802.16e ) The capability of Mobile WiMAX Enabled cell-phone like infrastructure on a large scale. This enabled users to move between base towers without loss of connection which allows for more mobile 0n-demand applications to be deployed
WiMAXvsWi-Fi
Hardware Architecture End to End View on WiMAX hardware and the considerations
WiMAX Architecture Antenna/Base Station to Radio Relationship Located outdoors Located outdoors ,[object Object]
Radio = Core, contains a transmitter (send) and receiver (receive), can be likened to a router/bridge
Antenna = Broadcaster, connects to the WMAN networkLocated indoors Located indoors
Advantages Advantage of Radio architecture – Radio is protected from weather extremes, this reduces interruptions/signal loss Advantage of Antenna architecture – optimizes the performance of the WMAN connection between transmitter and receiver
Hardware Architecture Heliax (Pigtail) ,[object Object]
The rule for deploying Heliax cables = shorter the better
Heliax cables loses 1 dB for every 10 feet of cableWiMAX Radio Heliax Cables
Hardware Architecture ,[object Object]
Sector – more focused, used more widely than Omni due to better performance
Panel – sometimes has the radio within the same enclosure, PoE power source, used for relays,[object Object]
Deployment Considerations Aspects to plan when deploying WiMAX technology
Link Budget Link Budget – Performance of the WMAN connection Link Budget – Power received at each detector Prx = Ptx + Gtx – Apl + Grx – Am Where Prx= received power at detector (dBm) Ptx = transmitter output power (dBm) Gtx = transmitter antenna gain (dBi) Grx = receiver antenna gain (dBi) Apl = path loss (dB) Am = miscellaneous attenuation (link margin, diffraction loss, connector loss, physical object interference (eg : wall, glass, trees, etc) Transmitter Receiver
Frequency Plan Logic Exercise Assuming you had a limit of three different frequencies for deployment to 9 base stations, how would you do it ? NOTE : Same frequencies in close proximity will cause interruption to your subscribers. Assume frequencies are deployed by their base station using Omni directional antennas with equal range radius
Answer : This is also how cellular/wireless operators function with limited frequencies to cover the most surface area without interference to the user  Frequency Plan
Network Architecture How does WiMAX work from a networks perspective
IEEE 802.16 Reference Model Scope of Standard CS SAP Management Entity Service Specific Convergence Sublayer MAC SAP Management Entity MAC Common Parte Sublayer MAC Network Management System Privacy Sublayer PHY SAP Management Entity PHY Layer PHY Management Plane Date/Control Plane
IEEE 802.16 MAC MAC = Medium Access Control Has a PMP network topology with support for mesh network topology Backhaul can either be ATM = Asynchronous Transfer Mode or packet based (eg : IP Networks)
IEEE 802.16 MAC Has three sub-layers in the Reference Model Service Specific Convergence Sublayer (CS) – Provides any transformation/mapping of external network data through the CS Service Access Point (CS SAP) MAC Common Part Sublayer (MAC CPS) – Classifies external network service data units (SDU) and associates these SDUs to propoer MAC Service flow and Connection Identifier (CID) Privacy (or Security) Sublayer – Supports authentication, secure key exchange and encryption

More Related Content

What's hot

Cloud RAN-Deployment-CPRI-Fronthaul-Technology
Cloud RAN-Deployment-CPRI-Fronthaul-TechnologyCloud RAN-Deployment-CPRI-Fronthaul-Technology
Cloud RAN-Deployment-CPRI-Fronthaul-Technology
Harsha Nath Jha
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
balasubramani p
 
100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.
Pavithra Nagaraj
 
MOBISTEER
MOBISTEERMOBISTEER
MOBISTEER
Mittal Khuthiya
 
Cloud ran wp_tfs_nse_ae
Cloud ran wp_tfs_nse_aeCloud ran wp_tfs_nse_ae
Cloud ran wp_tfs_nse_ae
Petrona Frensel M
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communications
Nir Cohen
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
Pawan Parande - CSM®
 
152763323 lte-interview-question
152763323 lte-interview-question152763323 lte-interview-question
152763323 lte-interview-question
Hassan Daud
 
Ason gmpls
Ason gmplsAson gmpls
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Pranjal Das
 
Relay lte
Relay lteRelay lte
80211n look before_wp
80211n look before_wp80211n look before_wp
80211n look before_wp
Advantec Distribution
 
Lte advanced coverage enhancements
Lte advanced coverage enhancementsLte advanced coverage enhancements
Lte advanced coverage enhancements
S.c. Lu
 
5 wimax3424
5 wimax34245 wimax3424
5 wimax3424
sukanya thatamsetty
 
(part-2)Book
(part-2)Book(part-2)Book
Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...
Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...
Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...
Eiko Seidel
 
visible light communication
visible light communicationvisible light communication
visible light communication
Hossam Zein
 
LTE NETWORK OPTIMIZATION FOR URBAN AREA AT TAIZ CITY
LTE NETWORK OPTIMIZATION FOR  URBAN AREA AT TAIZ CITYLTE NETWORK OPTIMIZATION FOR  URBAN AREA AT TAIZ CITY
Cellular expert for lte planning 2
Cellular expert for lte planning   2Cellular expert for lte planning   2
Cellular expert for lte planning 2
Motti Markovitz
 

What's hot (19)

Cloud RAN-Deployment-CPRI-Fronthaul-Technology
Cloud RAN-Deployment-CPRI-Fronthaul-TechnologyCloud RAN-Deployment-CPRI-Fronthaul-Technology
Cloud RAN-Deployment-CPRI-Fronthaul-Technology
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.
 
MOBISTEER
MOBISTEERMOBISTEER
MOBISTEER
 
Cloud ran wp_tfs_nse_ae
Cloud ran wp_tfs_nse_aeCloud ran wp_tfs_nse_ae
Cloud ran wp_tfs_nse_ae
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communications
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
152763323 lte-interview-question
152763323 lte-interview-question152763323 lte-interview-question
152763323 lte-interview-question
 
Ason gmpls
Ason gmplsAson gmpls
Ason gmpls
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
 
Relay lte
Relay lteRelay lte
Relay lte
 
80211n look before_wp
80211n look before_wp80211n look before_wp
80211n look before_wp
 
Lte advanced coverage enhancements
Lte advanced coverage enhancementsLte advanced coverage enhancements
Lte advanced coverage enhancements
 
5 wimax3424
5 wimax34245 wimax3424
5 wimax3424
 
(part-2)Book
(part-2)Book(part-2)Book
(part-2)Book
 
Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...
Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...
Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...
 
visible light communication
visible light communicationvisible light communication
visible light communication
 
LTE NETWORK OPTIMIZATION FOR URBAN AREA AT TAIZ CITY
LTE NETWORK OPTIMIZATION FOR  URBAN AREA AT TAIZ CITYLTE NETWORK OPTIMIZATION FOR  URBAN AREA AT TAIZ CITY
LTE NETWORK OPTIMIZATION FOR URBAN AREA AT TAIZ CITY
 
Cellular expert for lte planning 2
Cellular expert for lte planning   2Cellular expert for lte planning   2
Cellular expert for lte planning 2
 

Similar to WiMAX_Intro

Thesis on Wimax
Thesis on WimaxThesis on Wimax
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
stephen972973
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
Rajesh Karumanchi
 
WiMax Technology
WiMax TechnologyWiMax Technology
WiMax Technology
Bassam Kanber
 
A secure and service oriented
A secure and service orientedA secure and service oriented
A secure and service oriented
Jayanta Khumanthem
 
Wireless Backhaul
Wireless BackhaulWireless Backhaul
Wireless Backhaul
Swarnashruti Jupudi
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
Deepak John
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
Rubab Fatima
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
Ankur Kumar
 
computer network
computer networkcomputer network
computer network
RedHeart11
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
ijistjournal
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
ijistjournal
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
IJERA Editor
 
Copy (4) of 5 wimax3424
Copy (4) of 5 wimax3424Copy (4) of 5 wimax3424
Copy (4) of 5 wimax3424
sukanya thatamsetty
 
5 wimax3424
5 wimax34245 wimax3424
5 wimax3424
sukanya thatamsetty
 
Wi max
Wi maxWi max
WIMAX THE ULTIMATE BROADBAND SOLUTION
WIMAX THE ULTIMATE BROADBAND SOLUTIONWIMAX THE ULTIMATE BROADBAND SOLUTION
WIMAX THE ULTIMATE BROADBAND SOLUTION
Aninda Bhowmik
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
nandhakumar421744
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16e
Simona Halunga
 
Survey on mobile wimax
Survey on mobile wimaxSurvey on mobile wimax
Survey on mobile wimax
ParthSaarthi Aggarwal
 

Similar to WiMAX_Intro (20)

Thesis on Wimax
Thesis on WimaxThesis on Wimax
Thesis on Wimax
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
WiMax Technology
WiMax TechnologyWiMax Technology
WiMax Technology
 
A secure and service oriented
A secure and service orientedA secure and service oriented
A secure and service oriented
 
Wireless Backhaul
Wireless BackhaulWireless Backhaul
Wireless Backhaul
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
computer network
computer networkcomputer network
computer network
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Copy (4) of 5 wimax3424
Copy (4) of 5 wimax3424Copy (4) of 5 wimax3424
Copy (4) of 5 wimax3424
 
5 wimax3424
5 wimax34245 wimax3424
5 wimax3424
 
Wi max
Wi maxWi max
Wi max
 
WIMAX THE ULTIMATE BROADBAND SOLUTION
WIMAX THE ULTIMATE BROADBAND SOLUTIONWIMAX THE ULTIMATE BROADBAND SOLUTION
WIMAX THE ULTIMATE BROADBAND SOLUTION
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16e
 
Survey on mobile wimax
Survey on mobile wimaxSurvey on mobile wimax
Survey on mobile wimax
 

More from Brian Ritchie

Make it Personal by Making it Local
Make it Personal by Making it LocalMake it Personal by Making it Local
Make it Personal by Making it Local
Brian Ritchie
 
Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...
Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...
Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...
Brian Ritchie
 
Advanced Growth Marketing 101 by Brian Ritchie
Advanced Growth Marketing 101 by Brian RitchieAdvanced Growth Marketing 101 by Brian Ritchie
Advanced Growth Marketing 101 by Brian Ritchie
Brian Ritchie
 
Growth by Segmentation - Part 1 by Brian Ritchie
Growth by Segmentation - Part 1 by Brian RitchieGrowth by Segmentation - Part 1 by Brian Ritchie
Growth by Segmentation - Part 1 by Brian Ritchie
Brian Ritchie
 
Tell Your Story - Brian Ritchie
Tell Your Story - Brian RitchieTell Your Story - Brian Ritchie
Tell Your Story - Brian Ritchie
Brian Ritchie
 
Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011
Brian Ritchie
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
Brian Ritchie
 

More from Brian Ritchie (7)

Make it Personal by Making it Local
Make it Personal by Making it LocalMake it Personal by Making it Local
Make it Personal by Making it Local
 
Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...
Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...
Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...
 
Advanced Growth Marketing 101 by Brian Ritchie
Advanced Growth Marketing 101 by Brian RitchieAdvanced Growth Marketing 101 by Brian Ritchie
Advanced Growth Marketing 101 by Brian Ritchie
 
Growth by Segmentation - Part 1 by Brian Ritchie
Growth by Segmentation - Part 1 by Brian RitchieGrowth by Segmentation - Part 1 by Brian Ritchie
Growth by Segmentation - Part 1 by Brian Ritchie
 
Tell Your Story - Brian Ritchie
Tell Your Story - Brian RitchieTell Your Story - Brian Ritchie
Tell Your Story - Brian Ritchie
 
Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 

WiMAX_Intro

  • 1. 4G Integrated WiMAXA Detailed Introduction By BRIAN RITCHIE Twitter : brianritchie Facebook : facebook.com/brianritchie
  • 2. Who Am I ? Co worked on the Enterprise Architecture for some of the largest regional as well as international companies Rolled out the first official OSS Centre of Excellence strategy and implementation for a local Financial Institution Experience with large scale Project Management for core systems Designed and Implemented Research and Incubation Services for large scale corporations
  • 3. Agenda Introduction to WiMAX Introduction to Network Access Control Layers
  • 4. Before We Go Further !!! Case Study : How would you cope with the increased need for bandwidth delivered at lower costs to more subscribers ? Assume the technologies available to you are the following : Ethernet Wi-Fi Cell Towers, Base Stations, Data Centers, Traditional CDNs
  • 5. What is WiMAX ? A quick standards introduction
  • 6. What is WiMAX ? WiMAX = Worldwide Interoperability for Microwave Access Aim : To provide long distance wireless broadband for applications similar to the coverage and quality of service (QOS) of cellular networks Promotes the IEEE 802.16 standards
  • 7. What is 802.16 ? Wireless Standards in IEEE Project 802
  • 8. What is 802.16 ? IEEE 802.16 originally aimed to define fixed broadband wireless (FBW) May possibly replace the past wireless local loop (WLL) in telecommunications Able to deliver performance comparable to traditional cable, T1, xDSL, etc.
  • 9. What is 802.16 ? Advantages of 802.16 include : Quick and easy deployment especially for areas that are difficult to be wired. No physical limitations compared to wired infrastructure Cost effective for $/MB of data Increased security through multi-level encryption Highly scalable with significantly higher throughout
  • 10. Wireless Architectures What are the architectures behind WiMAX deployment
  • 11. Wireless Architectures There are two types of wireless deployment Point to Point (P2P) Point to Multipoint (PMP) How does Line of Sight (LOS) affect these architectures ?
  • 12. Wireless Architectures Point to Point (P2P) Architecture P2P is used where there are two points of interest Usually used for backend communication/data transfer (e.g: data center, co-lo, base stations) or as a point for distribution for PMP Higher throughput than PMP Transmitter Receiver
  • 13. Wireless Architectures Point to Multipoint (PMP) PMP is used primarily for distribution Able to serve hundreds of dissimilar subscribers simultaneously
  • 14. How does it affect WiMAX ? Previous wireless technologies could not server NLOS WiMAX functions best in LOS but is also able to serve NLOS with acceptable throughput which led to lower cost per subscriber because more subscribers could be served from one base station Line of Sight (LOS) Line of Sight (LOS) Non Line of Sight (NLOS)
  • 15. What is WiMAX ? Types of WiMAXdeployments and what its not
  • 16. Terminology Fixed WiMAX (IEEE 802.16d / 802.16-2004) Mobile WiMAX(IEEE 802.16e / 802.16e-2005) WiMAXvsWi-Fi
  • 17. Fixed WiMAX ( IEEE 802.16d ) The capability of Fixed WiMAX One of the major limitations was that this architecture was not mobile. Users were not able to transition data between base towers P2P : LOS = 30 Miles/48km , 72Mbps PMP : NLOS = 6 Miles/9.6km , 40Mbps
  • 18. Mobile WiMAX ( IEEE 802.16e ) The capability of Mobile WiMAX Enabled cell-phone like infrastructure on a large scale. This enabled users to move between base towers without loss of connection which allows for more mobile 0n-demand applications to be deployed
  • 20. Hardware Architecture End to End View on WiMAX hardware and the considerations
  • 21.
  • 22. Radio = Core, contains a transmitter (send) and receiver (receive), can be likened to a router/bridge
  • 23. Antenna = Broadcaster, connects to the WMAN networkLocated indoors Located indoors
  • 24. Advantages Advantage of Radio architecture – Radio is protected from weather extremes, this reduces interruptions/signal loss Advantage of Antenna architecture – optimizes the performance of the WMAN connection between transmitter and receiver
  • 25.
  • 26. The rule for deploying Heliax cables = shorter the better
  • 27. Heliax cables loses 1 dB for every 10 feet of cableWiMAX Radio Heliax Cables
  • 28.
  • 29. Sector – more focused, used more widely than Omni due to better performance
  • 30.
  • 31. Deployment Considerations Aspects to plan when deploying WiMAX technology
  • 32. Link Budget Link Budget – Performance of the WMAN connection Link Budget – Power received at each detector Prx = Ptx + Gtx – Apl + Grx – Am Where Prx= received power at detector (dBm) Ptx = transmitter output power (dBm) Gtx = transmitter antenna gain (dBi) Grx = receiver antenna gain (dBi) Apl = path loss (dB) Am = miscellaneous attenuation (link margin, diffraction loss, connector loss, physical object interference (eg : wall, glass, trees, etc) Transmitter Receiver
  • 33. Frequency Plan Logic Exercise Assuming you had a limit of three different frequencies for deployment to 9 base stations, how would you do it ? NOTE : Same frequencies in close proximity will cause interruption to your subscribers. Assume frequencies are deployed by their base station using Omni directional antennas with equal range radius
  • 34. Answer : This is also how cellular/wireless operators function with limited frequencies to cover the most surface area without interference to the user Frequency Plan
  • 35. Network Architecture How does WiMAX work from a networks perspective
  • 36. IEEE 802.16 Reference Model Scope of Standard CS SAP Management Entity Service Specific Convergence Sublayer MAC SAP Management Entity MAC Common Parte Sublayer MAC Network Management System Privacy Sublayer PHY SAP Management Entity PHY Layer PHY Management Plane Date/Control Plane
  • 37. IEEE 802.16 MAC MAC = Medium Access Control Has a PMP network topology with support for mesh network topology Backhaul can either be ATM = Asynchronous Transfer Mode or packet based (eg : IP Networks)
  • 38. IEEE 802.16 MAC Has three sub-layers in the Reference Model Service Specific Convergence Sublayer (CS) – Provides any transformation/mapping of external network data through the CS Service Access Point (CS SAP) MAC Common Part Sublayer (MAC CPS) – Classifies external network service data units (SDU) and associates these SDUs to propoer MAC Service flow and Connection Identifier (CID) Privacy (or Security) Sublayer – Supports authentication, secure key exchange and encryption
  • 39. IEEE 802.16e Handover Arch. In order to deal with mobility for the IEEE 802.16e, the MAC Layer specifies a MAC Layer Handover procedure Handover happens in 2 possible situations: When the mobile station (MS) moves and needs (due to signal fading/interference, etc) to change the base station (BS) that it is currently connected to, in order to provide better signal quality When the mobile station can be served with higher QOS at another base station
  • 40. IEEE 802.16e Handover Arch. Prior to handover, the network topology acquisition must be achieved in 3 steps : Network topology advertisement – A BS broadcasts info regarding the network topology which must be obtained from the backbone MS Scanning the neighboring BSs – BS can allocate time intervals for the MS to perform scans and once the BS is identified, MS may attempt to synchronize with its downlink connection and estimate quality of physical channel. Association – Optional initial ranging procedure during scanning interval with respect to one of the neighboring BSs and functions to enable MS to acquire and record ranging parameters and service availability info.
  • 41. IEEE 802.16e Handover Arch. Handover Procedure: Cell re-selection – MS uses BS info or may request scanning interval to evaluate interest in handover Handover decision and initiation – Handover begins with a decision from MS to switch from serving BS to target BS Sync to Target BS Downlink – MS first syncs downlink transmissions from target Bs to obtain parameters. If target BS received previous handover notice from serving BS via backbone, the target BS allocates a non-contention initial range opportunity Ranging – Target BS gets info from serving BS through backbone. MS and target BS will either conduct initial ranging or handover ranging to setup correct comm parameters Termination of MS context – Terminate service at serving BS.
  • 43.
  • 45. Mobile WiMax by Kwang and De Marca

Editor's Notes

  1. - Before we delve in any further into WIMAX we need to understand a little more about the 802.16 standard.
  2. Here we can see the IEEE Project 802’S evolvement from the 802.11 WLAN to 802.16 to cope with the growing needs and demands for better bandwidth with lower cost
  3. It is a standard
  4. Why did it actually take off, what made people decide on this technology
  5. Here, before we delve any further into defining and understanding WIMAX, we need to take a step back and understand the different types of Wireless architectures that are required to enable this technology
  6. Be careful not to confuse this terms with peer to peer and/ project management professional
  7. Can anyone tell me why P2P has a higher throughput than PMP even though PMP has more users ?
  8. Imagine a user/police car/ambulance moving between towers and are still able to communicate via VOIP or Video
  9. [End of slide] While this gives you a brief overview of WiMAX, we will be back to go more indepth into its network Architecture. Lets first look into its Hardware Architecure
  10. PoE – Power over Ethernet
  11. CPE – Customer Premise Equipment
  12. Antenna gain relates the intensity of an antenna in a given direction to the intensity that would be produced by a hypothetical ideal antenna that radiates equally in all directions (isotropically) and has no losses.Although the gain of an antenna is directly related to its directivity, the antenna gain is a measure that takes into account the efficiency of the antenna as well as its directional capabilities. In contrast, directivity is defined as a measure that takes into account only the directional properties of the antenna and therefore it is only influenced by the antenna pattern. However, if we assumed an ideal antenna without losses then Antenna Gain will equal directivity as the antenna efficiency factor equals 1 (100% efficiency). In practice, the gain of an antenna is always less than its directivity.