SlideShare a Scribd company logo
WIMAX
WIMAX ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object]
Introduction A WIMAX tower An example of WIMAX receiver  : PCMCIA card
PLAN ,[object Object],[object Object],[object Object]
PLAN ,[object Object],[object Object],[object Object]
I  Transmission  of  the  data   ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1   Mac  and physical  layer s
1  Mac  and physical  layer s ,[object Object],[object Object],[object Object],[object Object]
1  Mac  and physical  layer s ,[object Object],[object Object]
1  Mac  and physical  layer s
1  Mac  and physical  layer s
I  Transmission  of  the  data   ,[object Object],[object Object],[object Object],[object Object]
2 structur e  of a SDU ,[object Object],[object Object]
I  Transmission  of  the  data   ,[object Object],[object Object],[object Object],[object Object]
3 S tructure of  a M PDU ,[object Object],Generic MAC header Payload (optional) CRC (optional) ,[object Object],6 bytes  Variable  4  bytes ,[object Object],[object Object]
3 S tructure of  a M PDU ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3 S tructure of  a M PDU ,[object Object],[object Object],[object Object]
I  Transmission  of  the  data   ,[object Object],[object Object],[object Object],[object Object]
4 Fragmentation and packing ,[object Object],[object Object],[object Object],[object Object],[object Object]
4 Fragmentation and packing ,[object Object],[object Object],[object Object]
4 Fragmentation and packing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4 Fragmentation and packing ,[object Object],[object Object]
4 Fragmentation and packing ,[object Object],[object Object]
4 Fragmentation and packing ,[object Object]
4 Fragmentation and packing ,[object Object]
Summarize PDU which has started in the previous TC packet First PDU which starts in this TC packet Second PDU which starts in this TC packet SDU 1 SDU 2 SDU 3 SDU 4 PDU 1 PDU 2 PDU 3 NO fragmentation & NO packing Packing Fragmentation MAC SDUs MAC PDUs P FEC 1 FEC 2 FEC 3 Preamble TC PDUs BURST FEC encoding
II ARQ   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II ARQ ,[object Object],[object Object],[object Object],[object Object]
II ARQ   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II ARQ ,[object Object],[object Object],[object Object],[object Object],[object Object]
II ARQ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stop and Wait ,[object Object],[object Object],[object Object]
Stop and Wait retransmission Transmitting Data 1 3 2 3 Time Received Data 1 2 3 Time ACK ACK NAK Output Data 1 2 3 Time Error ACK:  Acknowledge NAK:  Negative ACK
Stop and Wait ,[object Object],[object Object],[object Object],[object Object],[object Object]
II ARQ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],The sliding window technique:
II ARQ ,[object Object],[object Object],[object Object],Transmitter Receptor Transmitter Receptor
II ARQ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feedback ( go back-N) ,[object Object],[object Object],[object Object],[object Object]
Feedback ( go back-N) 1 Time NAK Time Error Go-back 3 2 3 4 5 3 4 4 5 6 7 5 1 2 3 4 4 5 Error NAK Go-back 5 1 2 3 4 4 5
II ARQ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Selective repeat ,[object Object],[object Object]
Selective repeat 1 Time NAK Error Retransmission 2 3 4 5 3 6 7 8 9 7 1 Time 2 4  3 6 8  7 Error NAK Retransmission 5 9 1 Time 2 4  3 6 8  7 5 9 1 Time 2 4  3 6 8  7 5 9
II ARQ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FEC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FEC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FEC
[object Object],[object Object],[object Object],[object Object],[object Object],FEC
II ARQ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
H-ARQ ,[object Object],[object Object],[object Object]
II ARQ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methods used by  WIMAX ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Methods used by  WIMAX
Transmitter state 1 ARQ :
Receiver state 1 ARQ :
[object Object],Methods used by  WIMAX ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Methods used by  WIMAX
Methods used by  WIMAX ,[object Object],[object Object],[object Object],[object Object]
III Downlink/Uplink Scheduling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
III Downlink/Uplink Scheduling ,[object Object],[object Object],[object Object]
III Downlink/Uplink Scheduling ,[object Object],[object Object],[object Object]
A Downlink Scheduling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Downlink Scheduling
RR 1 1 1 VCC 1 (Source 1) 2 2 VCC 2 (Source 2) 3 3 3 VCC 3 (Source 3) 3 3 1 2 3 1 1 2 WRR scheduler Counter Reset Cycle 1 3 2 2 3 3 … . ,[object Object]
RR ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Downlink  Scheduling
WRR ,[object Object],[object Object],Counter Reset Cycle Coefficients of performance … . 1 1 1 VCC 1 (Source 1) 2 2 VCC 2 (Source 2) 3 3 3 VCC 3 (Source 3) 3 3 2 1 3 1 2 3 1 1 1 2 3 3 3 3 3 WRR scheduler
[object Object],[object Object],WRR VCC 2 (Source 2) VCC 3 (Source 3) …… . 1 1 1 VCC 1 (Source 1) 2 2 3 3 3 3 3 2 1 3 1 2 3 1 1 1 2 3 3 3 3 3 WRR scheduler Counter Reset Cycle Sequence of scheduling
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Downlink  Scheduling
VT
VT ,[object Object],[object Object],[object Object],Connection 1   Average inter-arrival : 2 units Connection 2   Average inter-arrival : 5 units Connection 3   Average inter-arrival : 5 units First-Come-First-Served  service order Virtual times Virtual Clock service order
A Downlink  Scheduling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],WFQ
[object Object],[object Object],[object Object],WFQ
WFQ WFQ Scheduler flow 1 flow 2 flow n Classifier Buffer management
WFQ
[object Object],[object Object],[object Object],[object Object],WFQ WRR algorithm w 1 w 2 w n R Packet queues
WFQ w 1 water pipes w 2 w 3 t 1 t 2 w 2 w 3 water buckets w 1
WFQ ,[object Object],[object Object],[object Object]
WFQ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Downlink  Scheduling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],WFFQ
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],WFFQ  and WFQ
Connection 1 Connection 2 Connection 11 WFQ and WFFQ WFQ Service Order WFFQ Service Order …… … … … … ,[object Object],WFFQ  and  WFQ
VT and WFQ ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Downlink  Scheduling
D R R ,[object Object],[object Object],[object Object],[object Object]
D R R Q i DC i 3500 3500 2800 7800 2000 1500 5000 700 1400 2800 7800 2000 2800 7800 2000 2800 7800 2000 2800 7800 2000 initializing ( 1 st  round) Serviced  Not serviced Serviced Serviced (3 rd  round) (4 th  round) +3500 +3500 ( 2nd round) +3500 -2000 -7800 -2800 Li
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Downlink  Scheduling
D D R R ,[object Object],[object Object],[object Object],[object Object]
D D R R Q i DC i 3500 3500 2800 7800 2000 1500 -6300 -2800 700 -2100 2800 7800 2000 2800 7800 2000 2800 7800 2000 2800 7800 2000 2800 7800 2000 initializing (1 st  round) Serviced Serviced Not serviced (2 nd  round) Not serviced (3 rd  round) Serviced -2000 -7800 -2800 +3500 +3500 +3500 +3500
III Downlink/Uplink Scheduling ,[object Object],[object Object],[object Object]
B Uplink Scheduling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bibliography ,[object Object],[object Object],[object Object]

More Related Content

What's hot

LTE Reviews - PCI Analysis
LTE Reviews - PCI AnalysisLTE Reviews - PCI Analysis
LTE Reviews - PCI Analysispaulo_campolina
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Joe Christensen
 
BICC protocol and application
BICC protocol and applicationBICC protocol and application
BICC protocol and applicationIsybel Harto
 
It802 d mobilecommunicationspart4
It802 d mobilecommunicationspart4It802 d mobilecommunicationspart4
It802 d mobilecommunicationspart4
Debasis Das
 
Lte rach configuration and capacity
Lte rach configuration and capacityLte rach configuration and capacity
Lte rach configuration and capacity
Young Hwan Kim
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
JaironLanda
 
Cs8601 4
Cs8601 4Cs8601 4
Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01
Abiy Almaw
 
Rach procedure in lte
Rach procedure in lteRach procedure in lte
Rach procedure in lte
Saurav Banerjee
 
lte channel types
lte channel typeslte channel types
lte channel typesavneesh7
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
Mridula Sharma
 
RACH procedure in LTE
RACH procedure in LTERACH procedure in LTE
RACH procedure in LTE
debamoha
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)hinalala
 

What's hot (17)

LTE Reviews - PCI Analysis
LTE Reviews - PCI AnalysisLTE Reviews - PCI Analysis
LTE Reviews - PCI Analysis
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
BICC protocol and application
BICC protocol and applicationBICC protocol and application
BICC protocol and application
 
Mac
MacMac
Mac
 
It802 d mobilecommunicationspart4
It802 d mobilecommunicationspart4It802 d mobilecommunicationspart4
It802 d mobilecommunicationspart4
 
Lte rach configuration and capacity
Lte rach configuration and capacityLte rach configuration and capacity
Lte rach configuration and capacity
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Cs8601 4
Cs8601 4Cs8601 4
Cs8601 4
 
Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01
 
Rach procedure in lte
Rach procedure in lteRach procedure in lte
Rach procedure in lte
 
lte channel types
lte channel typeslte channel types
lte channel types
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
 
Harq
HarqHarq
Harq
 
RACH procedure in LTE
RACH procedure in LTERACH procedure in LTE
RACH procedure in LTE
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 

Viewers also liked

Linkdinwimax
LinkdinwimaxLinkdinwimax
Linkdinwimax
rhamietron
 
160712 canonlifesci
160712 canonlifesci160712 canonlifesci
160712 canonlifesci
sennoma
 
Wimax 802.16d
Wimax 802.16dWimax 802.16d
Wimax 802.16dmehulmite
 
Wimax security
Wimax securityWimax security
Wimax security
Behroz Zarrinfar
 
Master peluqueria estetica
Master peluqueria esteticaMaster peluqueria estetica
Master peluqueria estetica
Euroinnova Formación
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)Sajid Marwat
 
Wimax
WimaxWimax
Wimax
Falak Shah
 
WiMAX Network Security
WiMAX Network SecurityWiMAX Network Security
WiMAX Network Security
sashar86
 
Wi max
Wi maxWi max
Wi max
Ali Kamil
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
Vinay Krishna
 

Viewers also liked (11)

Linkdinwimax
LinkdinwimaxLinkdinwimax
Linkdinwimax
 
160712 canonlifesci
160712 canonlifesci160712 canonlifesci
160712 canonlifesci
 
Wimax 802.16d
Wimax 802.16dWimax 802.16d
Wimax 802.16d
 
Wimax security
Wimax securityWimax security
Wimax security
 
Master peluqueria estetica
Master peluqueria esteticaMaster peluqueria estetica
Master peluqueria estetica
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 
Wimax
WimaxWimax
Wimax
 
WiMAX Network Security
WiMAX Network SecurityWiMAX Network Security
WiMAX Network Security
 
Wi max
Wi maxWi max
Wi max
 
Wimax / ieee 802.16
Wimax / ieee 802.16Wimax / ieee 802.16
Wimax / ieee 802.16
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
 

Similar to Wimax 4

WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
Salah Amean
 
Lte imp
Lte impLte imp
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol concepts
Raji Lakshmi
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
SHUBHAM MORGAONKAR
 
Performance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdfPerformance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdf
YAAKOVSOLOMON1
 
14 wcdma
14 wcdma14 wcdma
14 wcdma
Rakesh Tripathi
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07
Ali Habeeb
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Huawei_HCNA_Routing_and_Switching.pdf
Huawei_HCNA_Routing_and_Switching.pdfHuawei_HCNA_Routing_and_Switching.pdf
Huawei_HCNA_Routing_and_Switching.pdf
PauloDiniz60
 
MK-PPT Chapter 5.ppt advanced computer networks
MK-PPT Chapter 5.ppt advanced computer networksMK-PPT Chapter 5.ppt advanced computer networks
MK-PPT Chapter 5.ppt advanced computer networks
1JT19IS042SandhyaH
 
04 MK-PPT End-to-End Protocols.ppt
04 MK-PPT End-to-End Protocols.ppt04 MK-PPT End-to-End Protocols.ppt
04 MK-PPT End-to-End Protocols.ppt
dhivyak49
 
Wi max
Wi maxWi max
Wi max
jagadesh k
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
nooralleema
 
List channel in wcdma
List channel in wcdmaList channel in wcdma
List channel in wcdma
Tan Chap
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
Wendy Hager
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
ijwmn
 
Overview and Basics of LTE
Overview and Basics of LTEOverview and Basics of LTE
Overview and Basics of LTE
Chaitanya Tata, PMP
 

Similar to Wimax 4 (20)

WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
 
Lte imp
Lte impLte imp
Lte imp
 
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol concepts
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
Performance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdfPerformance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdf
 
14 wcdma
14 wcdma14 wcdma
14 wcdma
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07
 
Ax31338342
Ax31338342Ax31338342
Ax31338342
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Huawei_HCNA_Routing_and_Switching.pdf
Huawei_HCNA_Routing_and_Switching.pdfHuawei_HCNA_Routing_and_Switching.pdf
Huawei_HCNA_Routing_and_Switching.pdf
 
MK-PPT Chapter 5.ppt advanced computer networks
MK-PPT Chapter 5.ppt advanced computer networksMK-PPT Chapter 5.ppt advanced computer networks
MK-PPT Chapter 5.ppt advanced computer networks
 
04 MK-PPT End-to-End Protocols.ppt
04 MK-PPT End-to-End Protocols.ppt04 MK-PPT End-to-End Protocols.ppt
04 MK-PPT End-to-End Protocols.ppt
 
Wi max
Wi maxWi max
Wi max
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
List channel in wcdma
List channel in wcdmaList channel in wcdma
List channel in wcdma
 
Hsdpa analysis
Hsdpa analysisHsdpa analysis
Hsdpa analysis
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
 
Overview and Basics of LTE
Overview and Basics of LTEOverview and Basics of LTE
Overview and Basics of LTE
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Wimax 4

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Introduction A WIMAX tower An example of WIMAX receiver : PCMCIA card
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. 1 Mac and physical layer s
  • 15. 1 Mac and physical layer s
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. Summarize PDU which has started in the previous TC packet First PDU which starts in this TC packet Second PDU which starts in this TC packet SDU 1 SDU 2 SDU 3 SDU 4 PDU 1 PDU 2 PDU 3 NO fragmentation & NO packing Packing Fragmentation MAC SDUs MAC PDUs P FEC 1 FEC 2 FEC 3 Preamble TC PDUs BURST FEC encoding
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. Stop and Wait retransmission Transmitting Data 1 3 2 3 Time Received Data 1 2 3 Time ACK ACK NAK Output Data 1 2 3 Time Error ACK: Acknowledge NAK: Negative ACK
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. Feedback ( go back-N) 1 Time NAK Time Error Go-back 3 2 3 4 5 3 4 4 5 6 7 5 1 2 3 4 4 5 Error NAK Go-back 5 1 2 3 4 4 5
  • 45.
  • 46.
  • 47. Selective repeat 1 Time NAK Error Retransmission 2 3 4 5 3 6 7 8 9 7 1 Time 2 4 3 6 8 7 Error NAK Retransmission 5 9 1 Time 2 4 3 6 8 7 5 9 1 Time 2 4 3 6 8 7 5 9
  • 48.
  • 49.
  • 50.
  • 51. FEC
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74. VT
  • 75.
  • 76.
  • 77.
  • 78.
  • 79. WFQ WFQ Scheduler flow 1 flow 2 flow n Classifier Buffer management
  • 80. WFQ
  • 81.
  • 82. WFQ w 1 water pipes w 2 w 3 t 1 t 2 w 2 w 3 water buckets w 1
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92. D R R Q i DC i 3500 3500 2800 7800 2000 1500 5000 700 1400 2800 7800 2000 2800 7800 2000 2800 7800 2000 2800 7800 2000 initializing ( 1 st round) Serviced Not serviced Serviced Serviced (3 rd round) (4 th round) +3500 +3500 ( 2nd round) +3500 -2000 -7800 -2800 Li
  • 93.
  • 94.
  • 95. D D R R Q i DC i 3500 3500 2800 7800 2000 1500 -6300 -2800 700 -2100 2800 7800 2000 2800 7800 2000 2800 7800 2000 2800 7800 2000 2800 7800 2000 initializing (1 st round) Serviced Serviced Not serviced (2 nd round) Not serviced (3 rd round) Serviced -2000 -7800 -2800 +3500 +3500 +3500 +3500
  • 96.
  • 97.
  • 98.