Contents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure

Similar documents
Chapter 5: WMAN - IEEE / WiMax. 5.1 Introduction and Overview 5.2 Deployment 5.3 PHY layer 5.4 MAC layer 5.5 Network Entry 5.

Politecnico di Milano Facoltà di Ingegneria dell Informazione

Università degli Studi di Catania Dipartimento di Ingegneria Informatica e delle Telecomunicazioni WiMAX

Wireless Comm. Dept. of CCL/ITRI 電通所無線通訊技術組 Overview. 工研院電通所 M100 林咨銘 2005/1/13

PHY Layer NCHU CSE WMAN - 1

802.16s SOFTWARE PLATFORM

Wireless Broadband Networks

IEEE C802.16a-02/94r1. IEEE Broadband Wireless Access Working Group <

IEEE ax / OFDMA

Introduction to WiMAX Dr. Piraporn Limpaphayom

Wireless Networks. Wireless MANs. David Tipper. Wireless Wide Area Networks (WWANs) Wireless Metro Area Networks (WMANs)

Department of Computer Science Institute for System Architecture, Chair for Computer Networks

Guide to Wireless Communications, Third Edition Cengage Learning Objectives

Effective Bandwidth Utilization in WiMAX Network

A two Layer Guaranteed and Sustained Rate based Scheduler for IEEE based WiMAX Networks

IEEE C802.16d-03/23

Scheduling in WiMAX Networks

AEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved.

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Initial rangin clarifications for OFDMA PHY

IEEE C802.16maint-07/033

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS

Overview of IEEE Broadband Wireless Access Standards. Timo Smura Contents. Network topologies, frequency bands

Overview of Mobile WiMAX Technology

Module 4: Wireless Metropolitan and Wide Area Networks

Chapter 3 Introduction to OFDM-Based Systems

A Polling Based Approach For Delay Analysis of WiMAX/IEEE Systems

Performance Analysis of WiMAX Physical Layer Model using Various Techniques

4G WiMAX Networks (IEEE Standards)

IEEE C802.16a-02/46. IEEE Broadband Wireless Access Working Group <

IEEE C802.16d-03/24r0. IEEE Broadband Wireless Access Working Group <

A Cross-Layer Radio Resource Management in WiMAX Systems

IEEE c-00/40. IEEE Broadband Wireless Access Working Group <

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /WCNC.2009.

IEEE Broadband Wireless Access Working Group < Initial PHY Layer System Proposal for Sub 11 GHz BWA

Technical Aspects of LTE Part I: OFDM

Planning of LTE Radio Networks in WinProp

PHY Link Channel for EPoC TDD mode. Nicola Varanese, Qualcomm

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX

C802.16a-02/68. IEEE Broadband Wireless Access Working Group <

2 nd Generation OFDM for , Session #11

Technical White Paper. WiMAX Modelling in Atoll 2.7.0

Improving the Data Rate of OFDM System in Rayleigh Fading Channel Using Spatial Multiplexing with Different Modulation Techniques

Dynamic admission control and bandwidth reservation for IEEE e mobile WiMAX networks

Cordless Systems and Wireless Local Loop. Chapter 11

IEEE d -04/35r1. IEEE Broadband Wireless Access Working Group <

3G long-term evolution

A Worldwide Broadband Mobile Internet Standard

Mobile Communication Systems. Part 7- Multiplexing

LTE Aida Botonjić. Aida Botonjić Tieto 1

Background: Cellular network technology

A physical layer simulator for WiMAX Marius Oltean 1, Maria Kovaci 1, Jamal Mountassir 2, Alexandru Isar 1, Petru Lazăr 2

PROPOSAL FOR PHY SIGNALING PRESENTED BY AVI KLIGER, BROADCOM

LTE systems: overview

References. What is UMTS? UMTS Architecture

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

IEEE C802.16d-04/26

IEEE Broadband Wireless Access Working Group <

Page 1. Overview : Wireless Networks Lecture 9: OFDM, WiMAX, LTE

Practical issue: Group definition. TSTE17 System Design, CDIO. Quadrature Amplitude Modulation (QAM) Components of a digital communication system

Interference management Within 3GPP LTE advanced

Major Leaps in Evolution of IEEE WLAN Technologies

DESPITE the challenges faced when transmitting data

Department of Computer Science Institute for System Architecture, Chair for Computer Networks

An Analysis of the Design and Implementation of

(12) Patent Application Publication (10) Pub. No.: US 2007/ A1

Interference Mitigation in License-Exempt Systems: Distributed Approach

IEEE C802.16d-04/40. IEEE Broadband Wireless Access Working Group <

IEEE C802.16d-03/66r1

Baseline Proposal for EPoC PHY Layer IEEE 802.3bn EPoC September 2012 AVI KLIGER, BROADCOM LEO MONTREUIL, BROADCOM ED BOYD, BROADCOM

Baseline Proposal for EPoC PHY Layer

Medium Access Cooperations for Improving VoIP Capacity over Hybrid / Cognitive Radio Networks

Justin Thiel

PXI WiMAX Measurement Suite Data Sheet

Fading & OFDM Implementation Details EECS 562

BASIC CONCEPTS OF HSPA

CHAPTER 14 4 TH GENERATION SYSTEMS AND LONG TERM EVOLUTION

Cordless Systems and Wireless Local Loop. Cordless System Operating Environments. Design Considerations for Cordless Standards

Research Article Capacity Evaluation for IEEE e Mobile WiMAX

Contents. 1. HSPA & HSPA+ Overview. 2. HSDPA Introduction. 3. HSUPA Introduction. 4. HSPA+ Introduction

This document is based on: W-OFDM Submission to IEEE PHY

IEEE Broadband Wireless Access Working Group <

Multiple Access Schemes

ECS455: Chapter 4 Multiple Access

WASHINGTON UNIVERSITY SEVER INSTITUTE SCHOOL OF ENGINEERING AND APPLIED SCIENCE DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

JD7105A Base Station Analyzer

Mobile WiMAX Part I: A Technical Overview and Performance Evaluation

IEEE Broadband Wireless Access Working Group <

Long Term Evolution (LTE)

Solution Paper: Contention Slots in PMP 450

DOCSIS 1.0 Micro CMTS

IEEE Broadband Wireless Access Working Group < Extended IE format for concurrent transmission of bursts

Improvement of System Capacity using Different Frequency Reuse and HARQ and AMC in IEEE OFDMA Networks

Dynamic 20/40/60/80 MHz Channel Access for 80 MHz ac

Chapter 4 Investigation of OFDM Synchronization Techniques

[Insert Document Title Here]

Road to High Speed WLAN. Xiaowen Wang

THE IEEE standards (e.g., [1], e

RADIO LINK ASPECT OF GSM

One Cell Reuse OFDM/TDMA using. broadband wireless access systems

Transcription:

Contents Part 1: Part 2: IEEE 802.16 family of standards Protocol layering TDD frame structure MAC PDU structure Dynamic QoS management OFDM PHY layer S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Four service classes The IEEE 802.16 MAC layer defines four service classes: Unsolicited Grant Service (UGS) Real-time Polling Service (rtps) Non-real-time Polling Service (nrtps) Best Effort (BE) service QoS QoS increases The scheduling algorithms needed for implementing the three first types of services are implemented in the BS (while allocating uplink bandwidth to each SS) and are not defined in the 802.16 standard. Each SS negotiates its service policies with the BS at the connection setup time. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 2

Unsolicited grant service (UGS) UGS UGS rtps rtps nrtps nrtps BE BE UGS offers fixed size grants on a real-time periodic basis, which eliminates the overhead and latency of SS requests and assures that grants are available to meet the flow s real-time needs. The BS provides fixed size bursts in the uplink at periodic intervals for the service flow. The burst size and other parameters are negotiated at connection setup. Typical UGS applications: E1/T1 links (containing e.g. delay-sensitive speech signals), VoIP (without silence suppression). S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 3

Real-time Polling Service (rtps) UGS UGS rtps rtps nrtps nrtps BE BE The Real-time Polling Service (rtps) is designed to support real-time service flows that generate variable size data packets on a periodic basis, such as VoIP (with silence suppression) or streaming video. This service offers real-time, periodic, unicast request opportunities, which meet the flow s real-time needs and allow the SS to specify the size of the desired uplink transmission burst. This service requires more request overhead than UGS, but supports variable grant sizes for optimum data transport efficiency. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 4

Non-real-time Polling Service (nrtps) UGS UGS rtps rtps nrtps nrtps BE BE The Non-real-time Polling Service (nrtps) is designed to support non-real-time service flows that require variable size bursts in the uplink on a regular (but not strictly periodic) basis. Subscriber stations contend for bandwidth (for uplink transmission) during contention request opportunities. The availability of such opportunities is guaranteed at regular intervals (on the order of one second or less) irrespective of network load. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 5

Best Effort (BE) service UGS UGS rtps rtps nrtps nrtps BE BE The Best Effort service is intended to be used for best effort traffic where no throughput or delay guarantees are provided. Subscriber stations contend for bandwidth (for uplink transmission) during contention request opportunities. The availability of such opportunities depends on network load and is not guaranteed (in contrast to nrtps). S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 6

Radio Link Control in IEEE 802.16 The main task of Radio Link Control (RLC) in IEEE 802.16 systems is to provide dynamic changing of UL and DL burst profiles on a per-connection and per-frame basis, depending on radio channel characteristics and QoS requirements. As an example, RLC provides signaling for initial access (ranging) and bandwidth allocation in the downlink direction: Ranging request (RNG-REQ) from SS to BS Ranging response (RNG-RSP) from BS to SS Bandwidth requests (DBPC-REQ) from SS to BS Bandwidth confirmation (DBPC-RSP) from BS to SS S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 7

Initial access (initial ranging) RNG-REQ RNG-RSP DBPC-REQ DBPC-RSP During initial access, the SS sends a ranging request message in the contention slot reserved for this purpose, among others indicating which kind of DL burst profile should be used. Note: There is the possibility of collision since other subscriber stations also send ranging request messages in this contention slot. Contention slot A Contention slot B UL PHY burst 1 UL PHY burst 2 UL traffic S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 8

Initial access (initial ranging) RNG-REQ RNG-RSP DBPC-REQ DBPC-RSP DL PHY burst In response to the RNG-REQ message, the BS returns a ranging response message in a DL burst with a sufficiently robust burst profile. This message includes the timing advance value for correct alignment of bursts in UL, as well as UL power control information. Preamble FCS DL burst 1 DL burst k DL burst n S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 9

DL burst profile change RNG-REQ RNG-RSP DBPC-REQ DBPC-RSP The SS continuously measures the radio channel quality. If there is a need for change in DL burst profile, the SS sends a DL burst profile change request message in the contention slot reserved for this purpose, indicating the desired new DL burst profile. Contention slot A Contention slot B UL PHY burst 1 UL PHY burst 2 UL traffic S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 10

DL burst profile change RNG-REQ RNG-RSP DBPC-REQ DBPC-RSP DL PHY burst In response to the DBPC-REQ message, the BS returns a DL burst profile change response message confirming the new burst profile. This is done in a DL burst with the old burst profile (when changing to a less robust DL burst profile) or using the new burst profile (when changing to a more robust DL burst profile). Preamble FCS DL burst 1 DL burst k DL burst n S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 11

Transition to a new DL burst profile BS SS Channel measurement indicates that different DL burst profile should be used DL DL burst burst profile profile n is is used used DBPC-REQ DBPC-REQ DBPC-RSP DBPC-RSP DL data is sent using new burst profile k DL DL burst burst profile profile k is is used used S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 12

UL burst profile change RNG-REQ RNG-RSP DBPC-REQ DBPC-RSP DCD DL PHY burst The BS measures the UL signal quality and may request a change in UL burst profile as indicated in the downlink channel descriptor (DCD) within the first DL burst of the DL PHY burst. SS: SS: Read Read DCD DCD and and change UL UL burst burst profile profile accordingly Preamble FCS DL burst 1 DL burst k DL burst n S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 13

Dynamic QoS management in practice The request-response mechanism described on the previous slides is designed to be scalable, efficient, and self-correcting. While extensive bandwidth allocation and QoS mechanisms are specified in the IEEE 802.16 standard, the details of scheduling and reservation management have not been standardized and thus provide an important mechanism for vendors to differentiate their equipment. (There is a similar situation regarding standardization of a transmission system in general: the transmitted signal is standardized in detail, whereas receivers can process the received signal as they like, using innovative technology.) S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 14

Three types of management connections When a subscriber station acesses the network, three types of management connections are established between the SS and the BS (before transport connections can be established): Basic management connection for exchange of short, delay-critical MAC management messages Primary management connection for exchange of longer, more delay tolerant MAC management messages Secondary management connection for exchange of delay tolerant IP-based messages, such as used during DHCP transactions. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 15

Connection establishment (1) Channel acquisition: The MAC protocol includes an initialization procedure designed to eliminate the need for manual configuration. Upon installation, the SS scans for a suitable BS downlink signal. The SS synchronizes to this signal and reads the downlink channel descriptor (DCD) and uplink channel descriptor (UCD) information in the first DL burst of the DL PHY PDU, in order to learn the modulation and coding schemes used on the carrier. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 16

Connection establishment (2) Initial ranging and negotiation of SS capabilities (1): Upon learning what parameters to use for its initial ranging signal in UL, the SS looks for initial ranging opportunities by scanning the UL-MAP information present in every frame. After a random backoff time, the SS sends the ranging request message (RNG-REQ) to the BS. The BS calculates the timing advance value that the SS must use in UL from now on, and sends this information to the SS in the RNG-RSP message. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 17

Connection establishment (3) Initial ranging and negotiation of SS capabilities (2): The BS also sends power control information, as well as the CID for the basic management connection and the primary management connection to the SS. Using the primary management connection, the SS reports its PHY capabilities, including the modulation and coding schemes it supports and whether, in an FDD system, it is half-duplex or full-duplex. The BS, in its response, can deny the use of any capability reported by the SS. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 18

Connection establishment (4) SS authentication (using privacy sublayer): Each SS contains both a manufacturer-issued factoryinstalled X.509 digital certificate and the certificate of the manufacturer. After sending these certificates (and the public key of the SS) to the BS, the BS can authenticate the SS. If authentication is successful, the BS sends the Authorization Key (AK), encrypted with the public key of the SS, to the SS. The AK is used both by SS and BS for securing further information flow. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 19

Connection establishment (5) SS registration: Upon successful authentication, the SS registers with the network. The response from the BS contains the CID for a secondary management connection. Contrary to the basic and primary management connection, this secondary management connection is secured. At this point, the capabilities related to connection setup and MAC operation, as well as the IP version used, are determined. (Remember that the secondary management connection is IP-based.) S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 20

Connection establishment (6) IP connectivity: After registration, using the secondary management connection, the SS is allocated an IP address via DHCP and establishes the time of the day via the Internet Time Protocol. The DHCP server also provides the address of the TFTP server from which the SS can request a configuration file. This file provides a standard interface for providing vendor-specific configuration information. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 21

Connection establishment (7) Connection setup: Finally, the secondary management connection is also used for setting up one or more transport connections. These transport connections carry the actual user data (IP traffic, VoIP traffic, etc.) between BS and SS. IEEE 802.16 uses the concept of service flows to define unidirectional transport of packets on either downlink or uplink. Service flows are characterized by a certain set of QoS parameters, and are established using a three-way handshaking establishment procedure. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 22

Summary: Dynamic QoS management In summary, IEEE 802.16 offers the following mechanisms for dynamically managing QoS and bandwidth: In the PHY layer by adjusting the DL and UL burst profiles (modulation and coding combination) on a per-frame basis. In the MAC layer through fragmentation and packing (both can be done at the same time). At higher protocol layers by using scheduling algorithms in the base station. These algorithms are not specified in the IEEE 802.16 standard. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 23

WirelessMAN-OFDM PHY WirelessMAN-OFDM is based on 256 subcarriers, of which 200 subcarriers are used: 192 data subcarriers + 8 pilot subcarriers. There are 56 nulls (center carrier, 28 lower frequency and 27 higher frequency guard carriers). S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 24

Modulation and coding affect user data rate The 192 data subcarriers carry 192 data symbols in parallel (= transmitted at the same time). Each symbol carries 1 bit (BPSK), 2 bits (QPSK), 4 bits (16-QAM), or 6 bits (64-QAM) of channel information (corresponding to the channel bit rate after channel coding, not to be confused with the user bit rate before channel coding). The inner convolutional coding reduces the usable number of bits to 1/2, 2/3, or 3/4 of the channel information. The outer Reed-Solomon block coding furthermore reduces the usable number of bits about 10 %. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 25

Subcarrier signal in time domain (1) Guard time for preventing intersymbol interference In the receiver, FFT is calculated only during this time T g T b Next symbol Time T s IEEE 802.16 offers four values for G = T g /T b : G = 1/4, 1/8, 1/16 or 1/32. (802.11a/g offers only one value: G = 1/4) S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 26

Subcarrier signal in time domain (2) T g T b Next symbol Time IEEE 802.16 offers various bandwidth choices. The bandwidth is typically an integer multiple of 1.25, 1.5 or 1.75 MHz. (802.11a/g offers only a fixed channel bandwidth: 16.25 MHz) Since the number of subcarriers is fixed, a certain bandwidth is translated into a certain subcarrier spacing f = 1/T b. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 27

Four primitive parameters WirelessMAN-OFDM defines four "primitive parameters" that characterize the OFDM symbol: The nominal channel bandwidth BW The number of used subcarriers N used = 200 The sampling factor n. This parameter depends on the bandwidth. For instance, when the bandwith is a multiple of 1.25, 1.5 or 1.75 MHz, n = 144/125, 86/75 or 8/7, respectively. The guard time to useful symbol time ratio G. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 28

Derived parameters Using the four primitive parameters shown on the previous slide, the following additional parameters can be derived: N FFT (the smallest power of two greater than N used ) = 256 Sampling frequency f s = floor(n. BW/8000)x8000 Subcarrier spacing f = f s /N FFT Useful symbol time T b = 1/ f Guard time T g = G. T b OFDM symbol time T s = T g + T b. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 29

Example For BW = 5 MHz, BPSK, G = 1/32, calculate peak bit rate: f s = floor(144/125 x 5 MHz / 8000) x 8000 = 5.76 MHz f = f s /N FFT = 5.76 MHz / 256 = 22.5 khz T b = 1/ f = 44.44 µs T g = G. T b = 1.39 µs T s = T g + T b = 45.83 µs 86.4 info bits / OFDM symbol Peak bit rate = (192 bits x 0.5 x 0.9) / 45.83 µs = 1.89 Mb/s S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 30

Modulation and coding combinations Modulation Coding rate Info bits / subcarrier Info bits / symbol Peak data rate (Mbit/s) BPSK QPSK QPSK 16-QAM 16-QAM 64-QAM 64-QAM 1/2 1/2 3/4 1/2 3/4 2/3 3/4 0.5 1 1.5 2 3 4 4.5 88 184 280 376 568 760 856 1.89 3.95 6.00 8.06 12.18 16.30 18.36 Depends on chosen bandwidth (here 5 MHz is assumed) S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 31

Example (cont.) The peak bit rate does not take into account the MAC layer overhead (MAC PDU header and trailer) and PHY layer overhead (contention slots and burst preamble in UL, DL PHY PDU preamble and header in DL). Consequently, the user data rate is substantially smaller (even if the SS is the only user of the WMAN). S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 32