Professional Documents
Culture Documents
Constants
Section1 Introduction to WiMAX..................................................................................................................5 1.1 Wireless Introduction ...........................................................................................................................5 1.1.1 Wireless Network Topologies......................................................................................................5 1.1.2 Wireless Technologies..................................................................................................................6 1.1.3 Kinds of Wireless Networks.........................................................................................................6 1.1.4 Wireless Broadband Access (WBA) ...........................................................................................7 1.2 Related Organization..............................................................................................................................7 1.2.1 IEEE..............................................................................................................................................7 1.2.2 WiMAX Forum............................................................................................................................7 1.3 What is WiMAX.....................................................................................................................................8 1.3.1 What is WiMAX ..........................................................................................................................8 1.3.2 What is 802.16d............................................................................................................................9 1.3.3 What is 802.16e ...........................................................................................................................9 1.3.4 WiMax Speed and Range...........................................................................................................10 1.3.5 Why WiMAX.............................................................................................................................10 1.3.6 WiMAX Goals............................................................................................................................11 1.4 Salient Features of WiMAX.................................................................................................................11 1.4.1 OFDM-based physical layer.......................................................................................................12 1.4.2 Very High Peak Date Rate..........................................................................................................12 1.4.3 Scalable bandwidth and rate support .........................................................................................12 1.4.4 Adaptive modulation and coding (AMC) ..................................................................................12 1.4.5 Link-layer retransmissions .......................................................................................................13 1.4.6 Support for TDD and FDD .......................................................................................................13 1.4.7 Orthogonal frequency division multiple access (OFDMA).......................................................13 1.4.8 Flexible and dynamic per user resource allocation....................................................................13 1.4.9 Support for advanced antenna techniques .................................................................................13 1.4.10 Qulity of service support .........................................................................................................14 1.4.11 Robust security .......................................................................................................................14 1.4.12 Support for mobility ...............................................................................................................14 1.4.13 IP-based architecture ..............................................................................................................14 -ii-
Section2 OFDM .............................................................................................................................................16 2.1 OFDM System Description..................................................................................................................16 2.2 OFDM Orthogonality ..........................................................................................................................18 2.3 How to Overcome Inter Symbol Interference (ISI).............................................................................18 2.4 How to Overcome Inter Carrier Interference (ICI)..............................................................................19 Section3 OFDMA ..........................................................................................................................................20 3.1 OFDMA Basics ...................................................................................................................................20 3.2 OFDMA Symbol Structure and Sub-Channelization ..........................................................................21 3.3 Scalable OFDMA.................................................................................................................................23 3.4 TDD Frame Structure...........................................................................................................................24 3.5 Other Advanced PHY Layer Features..................................................................................................25 3.6 Difference between OFDMA and OFDM............................................................................................27 Section4 WiMAX MAC.................................................................................................................................29 4.1 Common MAC Concepts.....................................................................................................................29 4.1.1 CS Sublayer................................................................................................................................29 4.1.2 MAC CPS Sublayer....................................................................................................................30 4.2 Quality of Service (QoS) Support........................................................................................................35 4.3 MAC Scheduling Service.....................................................................................................................37 4.4 Mobility Management..........................................................................................................................39 4.4.1 Power Management....................................................................................................................39 4.4.2 Handoff.......................................................................................................................................39 4.5 Security.................................................................................................................................................41 Section5 WiMAX Advanced Features..........................................................................................................42 5.1 Smart Antenna Technologies................................................................................................................42 5.2 Fractional Frequency Reuse.................................................................................................................44 5.3 Multicast and Broadcast Service (MBS)..............................................................................................46 Section6 WiMAX Network Architecture ....................................................................................................48 6.1 WiMAX Network Architecture...........................................................................................................48 Section7 WiMAX Channel Estimation .......................................................................................................51 7.1 Introduction .........................................................................................................................................51 -iii-
7.2 Channel Estimation .............................................................................................................................52 7.2.1 Transmitter..................................................................................................................................52 7.2.2 Channel ......................................................................................................................................53 7.2.3 Reciever......................................................................................................................................56 Section8 WiMAX Major Benefits.................................................................................................................59 8.1 WiMAX Major Benefits.......................................................................................................................59 8.1.1 Benefits to Component Makers..................................................................................................59 8.1.2 Benefits to Equipment Makers...................................................................................................59 8.1.3 Benefits to Operators..................................................................................................................59 8.1.4 Benefits to Consumers................................................................................................................59
-iv-
Point-to-point bridge: As you know a bridge is used to connect two networks. A point-topoint bridge interconnects two buildings having different networks. For example, a wireless LAN bridge can interface with an Ethernet network directly to a particular access point. Point-to-multipoint bridge: This topology is used to connect three or more LANs that may be located on different floors in a building or across buildings. Mesh or ad hoc network: This network is an independent local area network that is not connected to a wired infrastructure and in which all stations are connected directly to one another.
-6-
Wireless Metropolitan Area Network (WMAN): This network enables you to access the Internet and multimedia streaming services via a wireless region area network (WRAN). These networks provide a very fast data speed compared with the data rates of mobile telecommunication technology as well as other wireless network, and their range is also extensive.
broad radio access system with an efficient, applicable, and interoperable access means. Its protocol is focused on the contents on the MAC layer and physical layer. IEEE 802.16e defines the physical layer and MAC layer of the air interface for the radio broadband access system that supports mobility, and at the same time, includes the definition of PKMv2 encryption.
With increasing concern for the WiMAX technologies in this industry, WiMAX Forum has more and more members, and has set up in succession Certification Work Group (CWG), Technology Work Group (TWG), Regulatory Work Group (RWG), Market Work Group (MWG), Service Provider Work Group (SPWG), Network Work Group (NWG), and Application Work Group (AWG). Accordingly, this organization is extending its objectives gradually. Apart from certification, it is devoted to requirement analysis, application scenario exploration, and WiMAX network architecture research with regard to the operable broadband radio access system, thus promoting powerfully the development of the broadband radio access technologies and market. WiMAX has become an alias of compliance with the 802.16 specification system.
-8-
area. A scaleable wireless platform for constructing alternative and complementary broadband networks. A certification that denotes interoperability of equipment built to the IEEE 802.16 or compatible standard. The IEEE 802.16 Working Group develops standards that address two types of usage models:
A fixed usage model (IEEE 802.16-2004). A portable usage model (IEEE 802.16e).
-9-
Put together, the 802.16 technology would enable the SS to get broadband wireless access (BWA) at all times in all locations, either when stationary, or at pedestrian speed or when traveling at 125 KMPH. Few of the difference between 802.16d and 802.16e are presented here. In OFDM, SS uses all the available subcarriers for the allocated time, but in OFDMA, user is allocated region having definition in both time and frequency. The subcarrier mapping is different in both the standards, resulting in channel estimation done in 802.16d being complex, but done less number of times. In 802.16e the channel estimation is simple, but more frequently done (because data considered, per iteration is less Channel is flat only over limited subcarriers). Another difference is use of CDMA codes for ranging in 802.16e, the receiver performs correlation to detect the user, and hence more processing is involved.
in cable, DSL and T1 services, Wi-Fi and cellular backhaul, providing last-100 meter access from fibre to the curb and giving service providers another costeffective option for supporting broadband services. WiMAX can support very high bandwidth solutions where large spectrum deployments (i.e. >10 MHz) are desired using existing infrastructure keeping costs down while delivering the bandwidth needed to support a full range of highvalue, multimedia services. WiMAX can help service providers meet many of the challenges they face due to increasing customer demands without discarding their existing infrastructure investments because it has the ability to seamlessly interoperate across various network types. WiMAX can provide wide area coverage and quality of service capabilities for applications ranging from real-time delay-sensitive voice-over-IP (VoIP) to realtime streaming video and non-real-time downloads, ensuring that subscribers obtain the performance they expect for all types of communications. WiMAX, which is an IP-based wireless broadband technology, can be integrated into both wide-area third-generation (3G) mobile and wireless and wireline networks, allowing it to become part of a seamless anytime, anywhere broadband access solution. Ultimately, WiMAX is intended to serve as the next step in the evolution of 3G mobile phones, via a potential combination of WiMAX and CDMA standards called 4G.
-12-
and spectral efficiency by deploying mulitiple anttenas at the transmitter and/or receiver side.
-14-
-15-
Section2 OFDM
Knowledge OFDM System Basics-------------------------------------------------------------Level 1 2 OFDM Orthogonality -------------------------------------------------------------Level 1 2 Overcome ISI-----------------------------------------------------------------------Level 1 2 Overcome ICI----------------------------------------------------------------------Level 1 2
OFDM = Orthogonal Frequency Division Multiplexing (Figure 3.1). OFDM converts a high rate broadband signal into many parallel low rate narrowband signals. Low rate narrowband signals have large symbol periods, which make OFDM signal resistant to multipath delay spread. OFDM uses a Fast Fourier Transform (FFT) to allow overlap in frequency of individual narrowband signals. More efficient than conventional multi-carrier.
Figure 3.1 OFDM description in both time and frequency division OFDM is a multi carrier transmission scheme where the information is transmitted on multiple subcarriers, with a lower data rate, instead of one high
-16-
data rate carrier (Figure 3.2) and moreover, the subcarriers are orthogonal to each other, leading to saving of bandwidth (Figure 3.3).
Figure 3.2 Three orthogonal subcarriers shown separately (in practice a sum of 3 is transmitted)
Figure 3.3 Comparing of FDMA and OFDM The major disadvantage of an OFDM system is its requirement of perfect synchronization in time and frequency. But the advantages of using OFDM are far more and provide enough reasons for the popularity of the OFDM systems. A typical channel fade will degrade only a few of the subcarriers, which in most cases can be compensated by use of efficient interleaving and channel coding. OFDM systems can be implemented very efficiently by using the Inverse Fast Fourier transform (IFFT) at the transmitter and Fast Fourier transform (FFT) at
-17-
the receiver. The overall complexity and its increase with data rate in OFDM systems is far less than the single carrier systems, hence OFDM is becoming a widely accepted technology and more prominent to be used in future mobile wireless communication standards.
1 f
Ideally, to maintain orthogonality we need that the symbol duration be exactly inverse of the subcarrier spacing and the FFT be considered over symbol duration such that it covers integer number of cycles. Moreover, the consecutive subcarriers differ by 1 full cycle only (Figure 3.1). If the system is to operate in a multipath environment, then each subcarrier should experience a flat fading, hence the subcarrier spacing should be less than the coherence bandwidth and each symbol should experience a time-invariant channel, hence the symbol time should be less than the coherence time else the complexity of receiver increases when overcoming the fading effect.
Reduction of inter symbol interference, which would require bulky equalizer to be constructed at the receiver in a single carrier system, is overcome by the use of guard time in an OFDM system. A guard time is added in time domain between two OFDM symbols and the FFT is considered over duration such that there is no component from the previous or next symbol, (Figure 3.3) which nulls the ISI and thus avoiding the bulky equalizer. ISI is completely eliminated when the multipath signal delay is within the guard time. When designing an OFDM system proper values are selected depending
-18-
Figure 3.4 subcarriers and multipath component shown separately, in practice the signal is a sum of all subcarriers
-19-
Section3 OFDMA
Knowledge OFDMA Basics -----------------------------------------------------------------Level 1 2 OFDMA Symbol Stucture-----------------------------------------------------Level 1 2 Scalable OFDMA---------------------------------------------------------------Level 1 2 TDD Frame Structure----------------------------------------------------------Level 1 2 Advanced PHY Features------------------------------------------------------Level 1 2 Difference between OFDMA and OFDM-----------------------------------Level 1 2
In Scalable OFDMA, subcarrier spacing is independent of bandwidth FFT size is scaled with bandwidth Subchannel size is fixed and independent of bandwidth and other modes of operation The number of subchannels scales with FFT size rather than with the capacity of subchannels OFDM exploit the frequency diversity of the multipath channel by coding and interleaving the information across the sub-carriers prior to transmissions. OFDM modulation can be realized with efficient Inverse Fast Fourier Transform (IFFT), which enables a large number of sub-carriers (up to 2048) with low complexity. In an OFDM system, resources are available in the time domain by means of OFDM symbols and in the frequency domain by means of sub-carriers. The time and frequency resources can be organized into sub-channels for allocation to individual users. Orthogonal Frequency Division Multiple Access (OFDMA) is a multipleaccess/multiplexing scheme that provides multiplexing operation of data streams from multiple users onto the downlink sub-channels and uplink multiple access by means of uplink sub-channels
-20-
(Figure 4.1).
Data sub-carriers for data transmission Pilot sub-carriers for estimation and synchronization purposes Null sub-carriers for no transmission; used for guard bands and DC carriers
-21-
Active (data and pilot) sub-carriers are grouped into subsets of sub-carriers called subchannels.The WiMAX OFDMA PHY supports sub-channelization in both DL and UL. The minimum frequency-time resource unit of sub-channelization is one slot, which is equal to 48 data tones (sub-carriers). There are two types of sub-carrier permutations for sub-channelization; diversity and contiguous. The diversity permutation draws sub-carriers pseudorandomly to form a sub-channel. It provides frequency diversity and inter-cell interference averaging. The diversity permutations include DL FUSC (Fully Used Sub-Carrier), DL PUSC (Partially Used Sub-Carrier) and UL PUSC and additional optional permutations. With DL PUSC, for each pair of OFDM symbols, the available or usable sub-carriers are grouped into clusters containing 14 contiguous sub-carriers per symbol, with pilot and data allocations in each cluster in the even and odd symbols (Figure 4.3).
Figure 4.3 DL Frequency Diverse Sub-Channel A re-arranging scheme is used to form groups of clusters such that each group is made up of clusters that are distributed throughout the sub-carrier space. A sub-channel in a group contains two (2) clusters and is comprised of 48 data sub-carriers and eight (8) pilot subcarriers. Analogous to the cluster structure for DL, a tile structure is defined for the UL PUSC (Figure 4.4).
The available sub-carrier space is split into tiles and six (6) tiles, chosen from across the entire spectrum by means of a re-arranging/permutation scheme, are grouped together to form a slot. The slot is comprised of 48 data sub-carriers and 24 pilot sub-carriers in 3 OFDM symbols. The contiguous permutation groups a block of contiguous sub-carriers to form a subchannel.The contiguous permutations include DL AMC and UL AMC, and have the same structure. A bin consists of 9 contiguous sub-carriers in a symbol, with 8 assigned for data and one assigned for a pilot. A slot in AMC is defined as a collection of bins of the type (N x M = 6), where N is the number of contiguous bins and M is the number of contiguous symbols. Thus the allowed combinations are [(6 bins, 1 symbol), (3 bins, 2 symbols), (2 bins, 3 symbols), (1 bin, 6 symbols)]. AMC permutation enables multi-user diversity by choosing the sub-channel with the best frequency response. In general, diversity sub-carrier permutations perform well in mobile applications while contiguous sub-carrier permutations are well suited for fixed, portable, or low mobility environments. These options enable the system designer to trade-off mobility for throughput.
-23-
TDD enables adjustment of the downlink/uplink ratio to efficiently support asymmetric downlink/uplink traffic, while with FDD, downlink and
uplink always have fixed and generally, equal DL and UL bandwidths.
TDD assures channel reciprocity for better support of link adaptation, MIMO and other closed loop advanced antenna technologies.
Unlike FDD, which requires a pair of channels, TDD only requires a single channel for both downlink and uplink providing greater flexibility for adaptation to varied global spectrum allocations.
Transceiver designs for TDD implementations are less complex and therefore less expensive.
Figure 4.5 illustrates the OFDM frame structure for a Time Division Duplex (TDD) implementation. Each frame is divided into DL and UL sub-frames separated by Transmit/Receive and Receive/Transmit Transition Gaps (TTG and RTG, respectively) to prevent DL and UL transmission collisions. In a frame, the following control information is used to ensure optimal system operation: -24-
Preamble: The preamble, used for synchronization, is the first Frame Control Head (FCH): The FCH follows the preamble. It
OFDM symbol of the frame. provides the frame configuration information such as MAP message length and coding scheme andusable sub-channels.
sub-channel allocation and other control information for the DL and UL sub-frames respectively.
stations (MS) to perform closed-loop time, frequency, and power adjustment as well as bandwidth requests.
WiMAX. In the UL, 64QAM is optional. Both Convolutional Code (CC) and Convolutional TurboCode (CTC) with variable code rate and repetition coding are supported. Block Turbo Code and Low Density Parity Check Code (LDPC) are supported as optional features Table 4.2 summarizes the coding and modulation schemes supported in the Mobile WiMAX profile the optional UL codes and modulation are shown in italics.
Table 4.2 Supported Code and Modulations The combinations of various modulations and code rates provide a fine resolution of data rates as shown in Table 3 which shows the data rates for 5 and 10 MHz channels with PUSC sub-channels. The frame duration is 5 milliseconds. Each frame has 48 OFDM symbols, with 44 OFDM symbols available for data transmission. The highlighted values indicate data rates for optional 64QAM in the UL.
Table 4.3Mobile WiMAX PHY Data Rates with PUSC Sub-Channel The base station scheduler determines the appropriate data rate (or burst profile) -26-
for each burst allocation based on the buffer size, channel propagation conditions at the receiver, etc. A Channel Quality Indicator (CQI) channel is utilized to provide channelstate information from the user terminals to the base station scheduler. Relevant channel-state information can be fed back by the CQICH including: Physical CINR, effective CINR, MIMO mode selection and frequency selective sub-channel selection. With TDD implementations, link adaptation can also take advantage of channel reciprocity to provide a more accurate measure of the channel condition (such as sounding). Hybrid Auto Repeat Request (HARQ) is supported by Mobile WiMAX. HARQ is enabled using N channel Stop and Wait protocol which provides fast response to packet errors and improves cell edge coverage. Chase Combining and optionally, Incremental Redundancy are supported to further improve the reliability of the retransmission. A dedicated ACK channel is also provided in the uplink for HARQ ACK/NACK signaling. Multi-channel HARQ operation is supported. Multi-channel stop-and-wait ARQ with a small number of channels is an efficient, simple protocol that minimizes the memory required for HARQ and stalling [8]. WiMAX provides signaling to allow fully asynchronous operation. The asynchronous operation allows variable delay between retransmissions which gives more flexibility to the scheduler at the cost of additional overhead for each retransmission allocation. HARQ combined together with CQICH and AMC provides robust link adaptation in mobile environments at vehicular speeds in excess of 120 km/hr.
-27-
OFDM allows only one user on the channel at any given time. To accommodate multiple users, a strictly OFDM system must employ Time Division Multiple Access (TDMA) (separate time frames) or Frequency Division Multiple Access (FDMA) (separate channels). Neither of these techniques is time or frequency efficient: TDMA is a time hog and FDMA is a bandwidth hog. OFDMA is a multi-user OFDM that allows multiple accesses on the same channel (a channel being a group of evenly spaced subcarriers, as discussed above). WiMAX uses OFDMA, extended OFDM, to accommodate many users in the same channel at the same time.
-28-
The 802.16 standard was developed from the outset for the delivery of broadband services including voice, data, and video. The MAC layer is based on the time-proven DOCSIS standard and can support bursty data traffic with high peak rate demand while simultaneously supporting streaming video and latency-sensitive voice traffic over the same channel. The resource allocated to one terminal by the MAC scheduler can vary from a single time slot to the entire frame, thus providing a very large dynamic range of throughput to a specific user terminal at any given time. Furthermore, since the resource allocation information is conveyed in the MAP messages at the beginning of each frame, the scheduler can effectively change the resource allocation on a frame-by-frame basis to adapt to the bursty nature of the traffic.
4.1.1 CS Sublayer
CS is a transition sublayer, on which the SAP is used to receive data from external networks, and then transfer or map the data. This operation involves classifying of external network SDUs, and assignment of an appropriate MAC-layer SFID and CID to each classification. It also includes the PSH function. The CS is used to process the objects of upper-layer data packets (core network PDU) and upper and lower-layer QoS features. The CS is used to implement the classifier and PHS functions.
-29-
Figure 5.1 MAC PDU format The MAC header takes the format as follows:
-30-
Figure 5.2 MAC header format 4.1.2.2 MAC-Layer Management Message A MAC-layer management message takes the format as follows:
Figure 5.3 MAC management message format MAC-layer management messages are listed in the table below. The applications of -31-
MAC messages are detailed in each optimization topic. Table 5-1 MAC management messages
-32-
-33-
-34-
4.1.2.3 Composition of Burst and MAC PDU The MAC-layer messages will be ultimately mapped to the Burst and transferred on the physical layer, as shown in the figure below.
Burst
Pad
MAC Header
CRC (optional)
QoS parameters. Before providing a certain type of data service, the base station and userterminal first establish a unidirectional logical link between the peer MACs called a connection. The outbound MAC then associates packets traversing the MAC interface into a service flow to be delivered over the connection. The QoS parameters associated with the service flow define the transmission ordering and scheduling on the air interface. The connection-oriented QoS therefore, can provide accurate control over the air interface. Since the air interface is usually the bottleneck, the connection-oriented QoS can effectively enable the end-to-end QoS control. The service flow parameters can be dynamically managed through MAC messages to accommodate the dynamic service demand. The service flow based QoS mechanism applies to both DL and UL to provide improved QoS in both directions. Mobile WiMAX supports a wide range of data services and applications with varied QoS requirements. These are summarized (Table 5.2).
-36-
Scheduling for both DL and UL: The scheduling service is provided for
-37-
both DL and UL traffic. In order for the MAC scheduler to make an efficient resource allocation and provide the desired QoS in the UL, the UL must feedback accurate and timely information as to the traffic conditions and QoS requirements. Multiple uplink bandwidth request mechanisms, such as bandwidth request through ranging channel, piggyback request and polling are designed to support UL bandwidth requests. The UL service flow defines the feedback mechanism for each uplink connection to ensure predictable UL scheduler behavior. Furthermore, with orthogonal UL sub-channels, there is no intra-cell interference. UL scheduling can allocate resource more efficiently and better enforce QoS.
QoS Oriented: The MAC scheduler handles data transport on a connectionbyconnection basis. Each connection is associated with a single data service with a set of QoS parameters that quantify the aspects of its behavior. With the ability to dynamically allocate resources in both DL and UL, the scheduler can provide superior QoS for both DL and UL traffic. Particularly with uplink scheduling the uplink resource is more efficiently allocated, performance is more predictable, and QoS is better enforced.
4.4.2 Handoff
There are three handoff methods supported within the 802.16e standard Hard
Handoff (HHO), Fast Base Station Switching (FBSS) and Macro Diversity Handover (MDHO). Of these, the HHO is mandatory while FBSS and MDHO are two optional modes. The WiMAX Forum has developed several techniques for optimizing hard handoff within the framework of the 802.16e standard. These improvements have been developed with the goal of keeping Layer 2 handoff delays to less than 50 milliseconds.
-39-
When FBSS is supported, the MS and BS maintain a list of BSs that are involved in FBSS with the MS. This set is called an Active Set. In FBSS, the MS continuously monitors the base stations in the Active Set. Among the BSs in the Active Set, an Anchor BS is defined. When operating in FBSS, the MS only communicates with the Anchor BS for uplink and downlink messages including management and traffic connections. Transition from one Anchor BS to another (i.e. BS switching) is performed without invocation of explicit HO signaling messages. Anchor update procedures are enabled by communicating signal strength of the serving BS via the CQI channel. A FBSS handover begins with a decision by an MS to receive or transmit data from the Anchor BS that may change within the active set. The MS scans the neighbor BSs and selects those that are suitable to be included in the active set. The MS reports the selected BSs and the active set update procedure is performed by the BS and MS. The MS continuously monitors the signal strength of the BSs that are in the active set and selects one BS from the set to be the Anchor BS. The MS reports the selected Anchor BS on CQICH or MS initiated HO request message. An important requirement of FBSS is that the data is simultaneously transmitted to all members of an active set of BSs that are able to serve the MS. For MSs and BSs that support MDHO, the MS and BS maintain an active set of BSs that are involved in MDHO with the MS. Among the BSs in the active set, an Anchor BS is defined. The regular mode of operation refers to a particular case of MDHO with the active set consisting of a single BS. When operating in MDHO, the MS communicates with all BSs in the active set of uplink and downlink unicast messages and traffic. A MDHO begins when a MS decides to transmit or receive unicast messages and traffic from multiple BSs in the same time interval. For downlink MDHO, two or more BSs provide synchronized transmission of MS downlink data such that diversity combining is performed at the MS. For uplink MDHO, the transmission from a MS is received by multiple BSs where selection diversity of the information received is performed.
-40-
4.5 Security
Mobile WiMAX supports best in class security features by adopting the best technologies available today. Support exists for mutual device/user authentication, flexible key management protocol, strong traffic encryption, control and management plane message protection and security protocol optimizations for fast handovers.The usage aspects of the security features are:
Traffic Encryption: AES-CCM is the cipher used for protecting all the user
data over the Mobile WiMAX MAC interface. The keys used for driving the cipher are generated from the EAP authentication. A Traffic Encryption State machine that has a periodic key (TEK) refresh mechanism enables sustained transition of keys to further improve protection.
-41-
The supported features in the Mobile WiMAX performance profile are listed in the following table 6.1.
-43-
Table 6.2 Data Rates for SIMO/MIMO Configurations (For 10 MHz channel, 5 ms frame, PUSC sub-channel, 44 data OFDM symbols)
-44-
In Mobile WiMAX, the flexible sub-channel reuse is facilitated by subchannel segmentation and permutation zone. A segment is a subdivision of the available OFDMA sub-channels (one segment may include all sub-channels). One segment is used for deploying a single instance of MAC. Permutation Zone is a number of contiguous OFDMA symbols in DL or UL that use the same permutation. The DL or UL sub-frame may contain more than one permutation zone as shown in the following figure 6.2.
Figure 6.2 Multi-Zone Frame Structure The sub-channel reuse pattern can be configured so that users close to the base station operate on the zone with all sub-channels available. While for the edge users, each cell or sector operates on the zone with a fraction of all subchannels available. In Figure 6.3, F1, F2, and F3 represent different sets of subchannels in the same frequency channel. With this configuration, the full load frequency reuse one is maintained for center users to maximize spectral efficiency and fractional frequency reuse is implemented for edge users to assure edge-user connection quality and throughput. The sub-channel reuse planning can be dynamically optimized across sectors or cells based on network load and interference conditions on a frame by frame basis. All the cells and sectors therefore, can operate on the same frequency channel without the need for frequency planning.
-45-
MBS MAP is lost. The MBS MAP IE specifies MBS zone PHY configuration and defines the location of each MBS zone via the OFDMA Symbol Offset parameter. The MBS MAP is located at the 1st sub-channel of the 1st OFDM symbol of the associated MBS zone. The multi-BS MBS does not require the MS be registered to any base station. MBS can be accessed when MS in Idle mode to allow low MS power consumption. The flexibility of Mobile WiMAX to support integrated MBS and uni-cast services enables a broader range of applications.
Figure 6.4 Embedded MBS Support with Mobile WiMAX MBS Zones
-47-
-48-
Base station (BS): The BS is responsible for providing the air interface to the MS. Additional functions that may be part of the BS are micromobility management functions, such as handoff triggering and tunnel establishment, radio resource management, QoS policy enforcement, traffic classification, DHCP (Dynamic Host Control Protocol) proxy, key management, session management, and multicast group management.
Access service network gateway (ASN-GW): The ASN gateway typically acts as a layer 2 traffic aggregation point within an ASN. Additional functions that may be part of the ASN gateway include intra-ASN location management and paging, radio resource management and admission control, caching of subscriber profiles and encryption keys, AAA client functionality, establishment and management of mobility tunnel with base stations, QoS and policy enforcement, foreign agent functionality for mobile IP, and routing to the selected CSN.
Connectivity service network (CSN): The CSN provides connectivity to the Internet, ASP, other public networks, and corporate networks. The CSN is owned by the NSP and includes AAA servers that support authentication for the devices, users, and specific services. The CSN also provides per user policy management of QoS and security. The CSN is also responsible for IP address management, support for roaming between different NSPs, location management between ASNs, and mobility and roaming between ASNs. The WiMAX architecture framework allows for the flexible decomposition and/or
combination of functional entities when building the physical entities. For example, the ASN may be decomposed into base station transceivers (BST), base station controllers -49-
(BSC), and an ASNGW analogous to the GSM model of BTS, BSC, and Serving GPRS Support Node (SGSN).
-50-
7.1 Introduction
A general communication system consists of two blocks, a transmitter and receiver, connected by a channel. The information transmitted by the transmitter passes through the channel and then reaches the receiver. If the channel does not distort the transmitted signal, then the receiver can retrieve the transmitted information successfully, but in practice the channel alters the transmitted information making the task difficult for the receiver. The main aim of the designer is to reduce the number of errors made at the receiver. To achieve this, information is required at the receiver, as to how the channel alters the information, so that the channel impairments can be mitigated. When the user is mobile, the channel characteristics do not remain constant for a very long time. Hence the channel parameters need to be tracked, so that the effect can be mitigated and reconstruct the transmitted data. This part deals with the requirements of Channel estimation at the Base station (BS) for an 802.16e uplink. Symbol time has an effect on system performance depending on the channel conditions. Different symbol times are proposed in and each one has been simulated and compared for various channel condition. In addition a solution proposed by Intel coop. has also been analyzed. It is concluded that the performance of the system, for few proposed symbol times, is relatively good in all conditions.
-51-
7.2.1 Transmitter
Data Generation: The data is generated from a random source, consists of a series of ones and zeros. Since the transmission is done block wise, when forward error correction (FEC) is used, the size of the data generated depends on the block size used, modulation scheme used to map the bits to symbols (QPSK, 16QAM), and whether FEC is used or not [1]. The generated data is passed on to the next stage, either to the FEC block or directly to the symbol mapping if FEC is not used. Forward error correction: In case error correcting codes are used, the data generated is randomized so as to avoid long run of zeros or ones, the result is ease in carrier recovery at the receiver. The randomized data is encoded using tail biting convolutional codes (CC) with a coding rate of (puncturing of codes is provided in the standard, but not simulated here). Finally interleaving is done by two stage permutation, first to avoid mapping of adjacent coded bits on adjacent subcarriers and the second permutation insures that adjacent coded bits are mapped alternately onto less or more significant bits of the constellation, thus avoiding long runs of lowly reliable bits. Symbol mapping: The coded bits (uncoded, if FEC not used) are then mapped to form symbols. Modulation scheme used is QPSK or 16QAM (QPSK unless otherwise specified) with gray coding in the constellation map. In any case the symbol is normalized so that the average power is unity, irrespective of the modulation scheme used. Subcarrier allocation: The subcarrier allocation is mentioned in the section 1.2 (Uplink transmission). This separates data into set of 4 subcarriers for 3 time symbols, named as the tile structure. Symbols are allocated indices representing the subcarriers -52-
and OFDM time symbol, and then passed onto the next stage, the IFFT, to convert into time domain. IFFT and cyclic prefix: An N point inverse discrete fourier transform (IDFT) of X(k)is defined as
X(n) =
1 N
X ( k )e
n =0
N 1
2n N
From the equation we can infer that this is equivalent to generation of OFDM symbol. An efficient way of implementing IDFT is by inverse fast fourier transform (IFFT). Hence IFFT is used in generation of OFDM symbol. The addition of cyclic prefix is done on the time domain symbol obtained after IFFT. The IFFT size (N value) is considered as 2048 in simulations. This data is fed to the channel which represents Rayleigh fading channel model and also implements multipath as shown in block diagram.
7.2.2 Channel
In NLOS wireless communication, the received signal is a combination of many multipath signals, which are result of reflections from surrounding objects. These multipaths have different amplitude and phase and may add either constructively or destructively leading to a complex envelope, i.e. fading. Fading characteristics depend on the channel parameters (rms delay spread and Doppler spread) and signal parameters (symbol period and bandwidth). Multipath delay spread leads to time dispersion and frequency selective fading and Doppler spread leads to frequency dispersion and time selective fading. Any mobile channel is one of the four mentioned below. Based on multipath time delay spread Flat fading Freq selective fading [Bs>>Bc] [Ts<< ]
BW of Signal < BW of channel [Bs<<Bc] Delay spread < symbol period [Ts>> ]
-53-
Based on Doppler spread Fast Fading [Channel changes within symbol period] High Doppler speed Slow fading
Coherence time < Symbol period [Tc < Ts] Where Bs = Bandwidth (BW) of signal
Bc = Bandwidth (BW) of channel over which the channel is flat or coherence BW Ts = Symbol period (including guard unless mentioned) = RMS delay spread (due to multipath) max = maximum delay spread Tc = coherence time A 3 path Rayleigh fading channel has been simulated for a given Doppler frequency (depending on vehicle speed and carrier frequency) and excess delay spread (depending on multipath). Each simulated multipath has a Rayleigh distributed amplitude and uniformly distributed phase. The fading channel has been modeled using Clarke model and simulated using Smiths method. The power spectral density is given by
S(f) = k
1 1 (f/f m ) 2
where k is a constant. Two independent Gaussian random sources (a & b) are used to generate the complex Gaussian random variable (G = a+jb). A filter generated by eq. 7.2 is used to shape it in the frequency domain. By using an IFFT (r (t) = IFFT (S (f).*G)), we get an accurate time domain waveform of Doppler fading.
-54-
Figure 7.1: Simulated Doppler spectrum Using Smiths method, the system generates time samples of the fading channel. The data is multiplied in time domain with the fading channel output.
Figure 7.2: A typical Rayleigh fading channel Figure 7.2 shows simulated Rayleigh fading channel for the speed of 125 KMPH, and frequency of 5.9GHz. Output = fading * input -55-
r(t) = a(t)e j (t ) s(t)------------------------------------ (eq. 7.3) s(t) is the transmitted signal a(t) is the amplitude of the fading channel (Rayleigh distributed) (t) is the phase of the fading channel (uniformly distributed) According to the standard the maximum supported speed of mobile is 125 KMPH and the operating frequency range is between 2 6 GHz. The system has been simulated for speeds 30, 80, 125 KMPH and frequency band of 3 GHz and 5.9GHz. Three multipaths were simulated with uniformly distributed phase. For multipath the amplitude and delay has been chosen as a random parameter, the first path does not have any excess delay and the amplitude is scaled by a uniformly distributed number in the range of 0 to 1. The other 2 paths have their amplitude scaled by uniformly distributed number between 0 to 0.9 and 0 to 0.7. The excess delay is selected as a uniformly distributed random parameter. Finally additive white Gaussian noise (AWGN) is added as a last component in the channel. Dopplerd_frequency(fd) =
7.2.3 Reciever
The first thing done at receiver (in simulation) is removal of cyclic prefix, thus eliminating the inter symbol interference (ISI). Data is then passed through the serial to parallel converter of size 2048 and then fed to the FFT for frequency domain transformation. The signal was distorted by the channel, to reconstruct the original signal we need information as to how the channel acted on the transmitted signal so that we can mitigate its effect. This is called equalization. In an OFDM system, this is done by channel estimation and interpolation. As we need at least one tile structure (3 OFDM symbols) to detect the data, storage of 3 OFDM symbols is provided followed by the subcarrier de mapping. The pilot subcarriers are used for channel estimation and synchronization at the receiver. In the simulation least squares (LS) estimate has been used for channel estimation at the pilot subcarriers. If D(t) is the transmitted data -56-
(known if pilot), Y(t) is the received data, and C(t) is the unknown channel response, then Y(t) = D(t) * C(t) + N(t)-------------------------------------------------------- (eq. 7.6) where N(t) represents the AWGN noise. The channel can be estimated for known data symbols, i.e. pilot subcarriers as,
C(t ) =
The estimate is simple but is highly affected by SNR or the noise power, as the assumption made is absence of noise from the receiver power. This information about channel at pilot subcarriers is interpolated over the whole tile structure, to recover the data on each data subcarrier (Figure 7.1). Separate one dimensional linear interpolation has been done for values between two subcarriers (the result: straight line), hence the performance is not effected much for various one dimensional interpolation algorithms. Since we do linear interpolation the channel is assumed to be changing linearly with in the tile, this assumption might not be true depending on the symbol time. This generates a noise floor at the receiver (Errors are generated due to addition of AWGN noise and due to this approximation of fading channel as a linearly varying channel. Beyond a certain value of SNR, the BER is nearly constant for any further increase in SNR.). For larger symbol time, as will be seen in simulations, this noise floor is reached at lower SNR, hence results in poor performance.
-57-
-58-
-59-