Transcript Wireless Communications and Networks
WiMAX and IEEE 802.16
(parts of) Chapter 11
Wireless Local Loop (WLL)
Wired technologies are responding to demand for reliable, high-speed access from residential, business, and government subscribers ISDN, xDSL, cable modems… Increasing interest shown in competing wireless technologies for subscriber access Wireless local loop (WLL) Narrowband – offers a replacement for existing telephony services Broadband – provides high-speed two-way voice and data service
(>2 Mbps, up to 100s of Mbps)
WLL Configuration
11.8
Advantages of WLL over Wired Approach
Cost – wireless systems are less expensive due to avoided cost of cable installation Installation time – WLL systems can be installed in a small fraction of the time required for a new wired system Selective installation – radio units installed for subscribers who want service at a given time With a wired system, cable is typically laid out in anticipation of serving every subscriber in a given area
Alternatives to WLL?
Wired approach, using existing installed cable
Many users do not have cable TV Many cable providers do not offer data services WLL is now cost-competitive
Mobile cellular technology
Too expensive 3G less functional than broadband WLL WLL subscriber units are
fixed
, so directional antennas can be pointed at the base station
Propagation Considerations for WLL
Most high-speed WLL schemes use
millimeter wave
frequencies (10 GHz to about 300 GHz, i.e. wavelengths of 30mm to about 1mm) There are wide unused frequency bands available above 25 GHz At these high frequencies, wide channel bandwidths can be used, giving high data rates Small size transceivers and adaptive antenna arrays can be used
Propagation Considerations for WLL
Millimeter wave systems have some undesirable propagation characteristics Free space loss increases with the square of the frequency; losses are much higher in millimeter wave range than in microwave systems Above 10 GHz, attenuation effects due to rainfall & atmospheric or gaseous absorption are significant Multipath losses can be quite high Therefore WLL cells have limited radius (few km), and there should be an
unobstructed LOS
between transmitter and receiver
Fresnel Zone
How much space around the direct path between transmitter and receiver should be clear of obstacles?
Objects within a series of concentric circles around the line of sight between transceivers have constructive/destructive effects on communication For a point along the direct path, radius of first Fresnel zone:
R
S
SD
D
S
= distance from transmitter
D
= distance from receiver
If no obstruction within 0.6R along path, then attenuation due to obstructions is negligible
Atmospheric Absorption
Radio waves at frequencies above 10 GHz are subject to
molecular absorption
Peak of water vapor absorption at 22 GHz Peak of oxygen absorption near 60 GHz
Favourable windows for communication:
From 28 GHz to 42 GHz From 75 GHz to 95 GHz
Effect of Rain
Attenuation due to rain Presence of raindrops can severely degrade the reliability and performance of communication links The effect of rain depends on drop shape, drop size, rain rate, and frequency Estimated attenuation due to rain:
A
aR b
A
= attenuation (dB/km)
R
= rain rate (mm/hr) Table 11.7: statistics on R for various climate zones
a
and
b
depend on drop sizes and frequency Table 11.6: typical values for
a
and
b
as a function of frequency
Effects of Vegetation
Trees near subscriber sites can lead to multipath fading Multipath effects from the tree canopy are diffraction and scattering Measurements in orchards found considerable attenuation values when the foliage is within 60% of the first Fresnel zone Multipath effects highly variable due to wind
IEEE 802.16 Standards
Use wireless links with microwave or millimeter wave radios Use licensed spectrum Other modes also envisaged (license-exempt, lightly licensed) Are metropolitan in scale Provide public network service to fee-paying customers Use point-to-multipoint architecture with stationary rooftop or tower-mounted antennas Provide efficient transport of heterogeneous traffic supporting Quality of Service (QoS) Are capable of broadband transmissions (>2 Mbps)
IEEE 802.16 Standards
IEEE 802.16 group formed in 1998 802.16 standard Air-interface for wireless broadband.
LOS Operated in 10-66GHz range 802.16a amendment Included NLOS application in 2-11GHz PHY layer used orthogonal frequency division multiplexing (OFDM) MAC layer supported Orthogonal Frequency Division Multiple Access (OFDMA) 802.16-2004 (also called 802.16d) Further amended standard Formed basis for first WiMAX solutions Above standards supported
fixed
wireless applications No mobility support
IEEE 802.16 Standards
802.16e-2005 (also called 802.16e) Added to 802.16-2004 to support mobility and improve performance soft and hard handover between Base Stations Introduces Scalable OFDMA higher spectrum efficiency in wide channels cost reduction in narrow channels Improves coverage using: Antenna diversity schemes Hybrid ARQ (hARQ) Improving capacity and coverage using: Adaptive Antenna Systems (AAS) Multiple Input Multiple Output (MIMO) technology
IEEE 802.16 Standards
802.16e continued
Introduces high-performance coding techniques to enhance security and NLOS performance Turbo coding Low density parity check Introduces downlink sub-channelization, allowing administrators to trade-off coverage with capacity Increases resistance to multipath interference using Enhanced Fast Fourier Transform algorithm, which can tolerate larger delay spreads Adds an extra QoS class
(enhanced real-time Polling Service)
more appropriate for Voice over IP (VoIP) applications.
IEEE 802.16 Standards
The standards offer a variety of different design options Therefore
interoperability is not guaranteed
A number of choices are offered at: PHY layer Single carrier WirelessMAN-Sca OFDM-based WirelessMAN_OFDM OFDMA-based WirelessMAN-OFDMA Also: MAC layer Duplexing Frequency band etc.
WiMAX Standards
WiMAX Forum
: industry-based consortium with task of taking basic standard and Ensuring interoperability Certifying compliance First certified product based on IEEE 802.16-2004 in January 2006 Interoperability is ensured by selecting a limited number of
system and certification profiles
from within the standard.
A system profile defines a subset of mandatory & optional PHY & MAC layer features selected from 802.16-2004 or 802.16e-2005 standard. A certification profile further defines operating frequency, channel bandwidth, and duplexing mode Equipment certified against specific certification profile 5 fixed and 14 mobile certification profiles have been defined Equipment tested against 2 fixed profiles
WF NWG
WiMAX Standards
Core Networks IP/internet 3G Core network Mobile Client functions Upper layer Functions CS MAC IEEE 802.16e
PHY Fixed client Mobility agent CS RAN network MAC PHY Base Station Upper layer IP Stack CS MAC PHY Mobile Station
CS = convergence sublayer
WiMAX Standards
Currently define PHY and MAC layers MAC subdivided into three functions Security sublayer: providing encryption and authentication MAC layer: providing access, ARQ, and QoS MAC convergence sublayer: providing interface to various networks ATM, Ethernet, IP…
CS SAP MAC convergence sublayer MAC SAP MAC common part sublayer MAC security sublayer PHY SAP PHY
WiMAX: Technical Challenges
Developing reliable transmission and reception schemes Achieving high spectral efficiency and coverage to deliver broadband services to a large number of users using limited available spectrum Supporting and efficiently multiplexing services with a variety of QoS requirements Achieving low power consumption to hand-held devices Providing robust security Adapting IP-based protocols and architecture for the wireless environment to achieve lower cost & convergence with wired network Supporting mobility through seamless handover and roaming
PHY layer: OFDM (1)
Orthogonal Frequency Division Multiplexing (OFDM) Multicarrier modulation technique Idea: divide a high bit rate stream into parallel low bit rate streams and modulate each stream on a separate carrier.
Reduces
intersymbol interference
by reducing the data rate by a factor of N i.e. symbol time is increased by a factor of N Therefore
equalisers
may not be necessary Also:
frequency selective fading
only affects some channels, not whole signal
PHY layer: OFDM (2)
OFDM eliminates the need for non-overlapping channels, by selecting subcarriers that are orthogonal to each other over the duration of a bit.
This orthogonality allows us to recover our original signal without distortion from other signals.
The OFDM subcarriers can be packed tightly together because there is little interference between adjacent subcarriers
PHY layer: OFDM (3)
PHY layer: OFDMA (1)
So far, we’ve presented OFDM as transmitting a single data stream Split into N reduced bit rate streams Transmit each of these N streams using a different tone Clearly, in terms of signal recovery, it does not matter if the N data streams come from the same or different sources Thus OFDM can be used to provide subchannels…called OFDMA OFDMA allows users to share both subcarriers
and
time slots.
This allows resources to be allocated according to both user and system requirements
power
PHY Layer: OFDMA (2)
time power time User 3 User 2 User 6 User 5 User 9 User 8 User 1 Block of subcarriers User 2 FDMA User 3 frequency User 1 User 4 User 7 frequency FDMA + TDMA
PHY layer: OFDMA (3)
In reality, the time slot & frequency allocation is more complex Slots are defined as one subchannel and a number of OFDM symbols Users are assigned data regions either as A contiguous series of slots… Good for fixed or low mobility applications …or using distributed subcarriers to enhance frequency diversity Called Adaptive Modulation and Coding Better for high mobility situations Allocations according to Demand, QoS requirements, Channel conditions In addition, Time Division Duplexing (TDD) means time slots are divided into Uplink and Downlink subframes.
Downlink to uplink ratio varies from 3:1 to 1:1 depending on traffic profiles.
Frequency Division Duplexing (FDD) is also supported.
Adaptive modulation and coding 1
Various modulation and coding allowed: BPSK, QPSK, 16 QAM, 64 QAM Modulation and coding can change on
burst-by-burst
basis Channel quality indicator used to inform BS about channel quality in downlink direction BS estimates channel quality in the uplink direction BS chooses modulation and coding to
maximize throughput for available signal-to-noise ratio
Total of 52 combinations of modulation and coding schemes are defined in WiMAX as burst profiles
Adaptive modulation and coding 2
WiMAX Features 1
OFDM-based PHY layer Allows operation in NLOS conditions Offers good resistance to multipath effects.
Very high peak data rates Modulation, error-correction coding, MIMO, multiplexing Typically peak PHY rates 25Mbps Scalable bandwidth and data rate support Data rates can be scaled to bandwidth availability Adaptive modulation and coding Modulation and forward error coding schemes can change on a per user and per frame basis based on channel conditions.
Allows highest possible data rates based on SNR and SIR
WiMAX Features 2
Link layer retransmissions When enhanced reliability required, ARQ provided Hybrid ARQ (hARQ) combines FEC and ARQ techniques Support for TDD and FDD uplink and downlink channels supported either by dividing time slots, or using frequency subchannels Orthogonal Frequency Division Multiple Access (OFDMA) Users are allocated different OFDM channels Support for advanced antenna techniques Beam-forming, space time coding, spatial multiplexing…
WiMAX Features 3
Quality of Service Support
Connection-oriented MAC
architecture allows support of QoS Constant bit rate, variable bit rate, real-time, non-real-time, best effort Terminal can have multiple connections with different QoS requirements Robust Security Strong encryption and authentication capabilities.
Support for Mobility Secure seamless handover for delay-tolerant applications Support for power-saving mechanisms PHY layer enhancements Channel estimation Uplink subchannelisation Power control IP-based architecture Convergence with other networks Use of available protocols
MAC layer Channel Access Mechanisms
WiMAX is a
connection-oriented
responsible for allocation of bandwidth to the user in both the uplink and downlink direction.
solution: the Base Station is
Downlink allocation
based on needs of incoming traffic
Uplink allocation
requested by Mobile Station If an MS has multiple connections with the BS, BS allocates bandwidth as a block which the MS can use as it sees fit.
BS uses
polling
to solicit requests Unicast: for each individual MS Multicast: a group of MSs must compete for slot.
Contention resolution scheme used If MS already has allocation, must use this allocation for additional requests Allocation decisions strongly tied to QoS considerations.
MAC layer QoS 1
The connection-oriented MAC architecture provides strong support for QoS Allows base station to control bandwidth allocated to individual sessions Connections are unidirectional (so MS will have multiple connections with BS) Separate connections established to send data and control information.
Also define Service Flow – unidirectional flow of packets with specific QoS parameters SFID—service flow id CID—connection id ProvisionedQosParamset—provisioned parameters AdmittedQosParaSet—QoS parameters for which MS and BS have reserved resources.
ActiveQoSParaSet—QoS parameters being provided at any given time Authorisation Module—check limits of QoS parameters
QoS Parameters include: traffic priority maximum sustained traffic rate maximum burst rate minimum tolerable rate scheduling type, ARQ type maximum delay tolerated jitter service data unit type and size bandwidth request mechanism transmission PDU formation rules
MAC layer QoS 2
(1) Unsolicited Grant Service
Support fixed-size data packets at a constant bit rate e.g. voice services such as VoIP
without
silence suppression Mandatory service flow parameters: Maximum sustained traffic rate Maximum latency Tolerated jitter Request/retransmission policy Fixed size grants offered on a periodic basis with no need to explicitly request bandwidth each time.
Eliminates request overhead and latency
MAC layer QoS 3
(2) Real-Time Polling Service
Support real-time service flows generating variable size packets periodically e.g. MPEG video Mandatory service flow parameters: Minimum reserved traffic rate Maximum sustained traffic rate Maximum latency Request/transmission policy BS provides unicast polling opportunity to MS to request bandwidth.
Polling frequent enough to ensure latency requirements met.
MAC layer QoS 4
(3) Non-real-Time Polling Service
Support delay tolerant data streams which require minimum guaranteed rate e.g. FTP Mandatory service flow parameters: Minimum reserved traffic rate Maximum sustained traffic rate Traffic priority Request/transmission policy Same polling opportunities as for RTPS, but less frequent Average duration between opportunities a few seconds.
MSs can also request resources during contention-based polling
MAC layer QoS 5
(4) Best Effort service
No guarantee of minimum level of service required e.g. Web Browsing Mandatory service flow parameters: Maximum sustained traffic rate Traffic priority Request/transmission policy MS must use contention-based polling to request resources
MAC layer QoS 6
(5) Extended real-time variable rate services
Support variable data rate real-time applications that require guarantees on data rate and delay.
e.g. VoIP
with
silence suppression Mandatory service flow parameters: Minimum reserved traffic rate Maximum sustained traffic rate Maximum latency Jitter tolerance Request/transmission policy Periodic UL allocations provided, but MS can also request additional resources during UL allocation
MAC layer: Power Saving
Power saving is achieved by allowing the MS to go into either
sleep
or
idle
mode.
In sleep mode, MS becomes unavailable for predetermined periods negotiated with the BS Power Save Class 1: sleep window increases exponentially from minimum to maximum value
(e.g. best-effort non-real-time traffic)
Power Save Class 2: sleep window is fixed-length
(UGS service)
Power Save Class 3: sleep window is one time only
(e.g. multicast or management traffic – if MS knows when next traffic expected)
MS will still scan base stations for handoff-related information In idle mode, the MS turns off and does not need to register with a BS, but still receives downlink traffic.
MS assigned a paging group of BSs which will page it if it has data MS hands over between paging groups, but not BSs
Optional to support idle mode in WiMAX
MAC layer: Mobility Support 1
WiMAX envisages 4 mobility scenarios:
Nomadic:
user moves from a fixed point to another fixed point Requires reconnection
Portable:
nomadic access for portable device with best-effort handover
Simple mobility:
user can move at speeds of up to 60kmph with <1sec interruption for handover
Full mobility:
user can move at speeds of up to 120 kmph Handover with <50msec latency and <1% packet loss.
MAC layer: Mobility Support 2
IEEE 802.16e-2005 defines signalling mechanism for tracking MSs From coverage area to coverage area, when MS is active From paging group to paging group, when MS is idle Three handoff mechanisms supported in 802.16e:
Hard Handover
(mandatory for mobile WiMAX) Abrupt transfer from one BS to another Decision made according to signal quality data gathered by MS via RF scanning Decision can be made by BS, MS, or other entity Can have undelivered packets from previous BS Retained until a timer expires
MAC layer: Mobility Support 3
Two other handoff mechanisms are supported in 802.16e, but are
optional
for mobile WiMAX In both, MS maintains valid simultaneous connection to multiple BSs
Fast Base Station Switching (FBSS)
MS maintains a list of BS involved called the active set Connection is maintained with each BS MS communicates with the
anchor BS
only Can change anchor BS without explicit handover signalling
Macro Diversity Handover (MDHO)
Similar to FBSS, except data exchanged simultaneously with a number of BSs known as a diversity set .
Note that BSs in the active or diversity set must
synchronise
and communicate on the
same channels
.
IEEE 802.16 Protocol Architecture
Protocol Architecture 2
TL PHY { Physical and transmission layer functions: Encoding/decoding of signals Preamble generation/removal
(for synchronisation)
Bit transmission/reception Specification of transmission medium and frequency band Medium Access Control layer functions: On transmission, assemble data into a frame with address and error detection fields On reception, disassemble frame, and perform address recognition and error detection Govern access to the wireless transmission medium
Protocol Architecture 3
Convergence Sublayer functions: Encapsulate PDU framing of upper layers into native 802.16 MAC/PHY frames Map upper layer’s addresses into 802.16 addresses Translate upper layer QoS parameters into native 802.16 MAC format Adapt time dependencies of upper layer traffic into equivalent MAC service Some upper-layer services
(e.g. digital audio and video)
don’t need to use the CS – the stream of digital data is presented directly to the Transmission Layer
Physical Layer – Upstream Transmission
Multipoint-to-point channel
Uses a DAMA-TDMA technique
DAMA = demand assignment multiple-access Adapts to demand changes among the users
Error correction uses Reed-Solomon code
Modulation scheme based on QPSK
Physical Layer – Downstream Transmission
Continuous downstream mode
For continuous transmission stream (e.g. audio, video) Simple TDM scheme is used for channel access Duplexing technique is frequency division duplex (FDD) A different frequency band is used for transmission in each direction
Burst downstream mode
Targets burst transmission stream (e.g. IP-based traffic) DAMA-TDMA scheme is used for channel access 3 available duplexing techniques: FDD with adaptive modulation
(can adapt modn. & FEC schemes)
frequency shift division duplexing (FSDD) time division duplexing (TDD)
WiMAX security
WiMAX supports a variety of credentials: username/password, digital certificates, smart cards Each SS has a X.509 certificate, which is used to authenticate the SS to the BS (includes digital certificate and MAC address) If OK: BS will send Authorisation Key (AK) to SS, which allows SS to encrypt transmissions SS can then register with the network Privacy is based on Privacy Key Management (PKM) Accommodates Advanced Encryption Standard (AES) 128 or 256-bit key used for deriving the cipher is generated during the authentication phase - the key is refreshed periodically for additional protection