Professional Documents
Culture Documents
Version: 1
Date: May, 2008
Author: Sergio Cruzes
4 ARCHITECTURE ....................................................................................................... 15
4.1 W IMAX NETWORK REFERENCE MODEL ............................................................................... 16
5 RF PLANNING ................................................................................................................. 20
5.1 SPECTRUM AND GUARD-BANDS................................................................................................ 20
5.2 LINK BUDGET .......................................................................................................................... 21
5.2 PROPAGATION MODEL ............................................................................................................. 22
5.2.1 SUI Models ............................................................................................................... 22
5.2.2 SPM Models ............................................................................................................. 22
5.2.3 CW Measurements .................................................................................................. 23
5 RF OPTIMIZATION .................................................................................................... 25
7.1 RF SHAKEDOWN ..................................................................................................................... 25
6 REFERENCES ........................................................................................................... 27
So, WiMAX is a wireless communication technology that travels much farther than
today’s Wi-Fi. Theoretically, a WiMAX signal can travel up to 50 km [1].
The true promise of WiMAX is to provide faster wireless speeds over longer distances
at a lower cost to the carrier and ultimately to the customer.
Internet at home, Internet at office, Internet on the go. Internet everywhere, that’s the
promise of WiMAX.
2.1 Introduction
Mobile WiMAX is a broadband wireless access technology based on IEEE 802.16-2004
and IEEE 802.16e-2005 air-interface standards.
WiMAX was developed to address the challenges and high cost of deploying copper
wires and optical fibers. It is possible to mention some applications such as:
- Backhaul: uses point-to-point antennas to connect aggregate subscriber
sites to each other and to base stations across long distances.
- Last mile: uses point-to-multipoint antennas to connect residential or
business subscribers to the base station
- Large coverage access: uses base stations, subscriber stations, and Wi-Fi
solutions, such as mesh networks, to cover a large area.
At the end of year 2000, I received from Alfredo de Cardenas, a book called The
Innovator´s Dilemma from Clayton M. Christensen. This book is about the failure of
good companies to stay atop their industries when they confront certain types of
market and technological change. In this book, it is described how disruptive
technologies have precipitated the failure of leading products and their well-managed
companies. “Disruptive technologies bring to a market a very different value proposition
than had had been available previously. Product based on this technology are typically
cheaper, simpler, smaller, and, frequently, more convenient to use”. We can mention
some examples such as the personal computer and transistors (relative to vacuum
tubes).
WiMAX seems to fit the above criterias.
As mentioned by Frank Ohrtman, in his book WiMAX Handbook, WiMAX is a
- Disruption for Telephone Companies as WiMAX replaces the access portion
of the PSTN. With Voice over Internet Protocol (VoIP), the PSTN is
bypassed.
- Disruption for Cable TV and Satellite TV Companies: a technology called TV
over Internet Protocol (TvoIP) does for cable TV what VoIP does for
telephone companies.
- Disruption for Cell Phone Companies: VoIP technologies may be used for
mobile telephony to replace incumbent cell phone technologies.
- Disruption for the Backhaul Industry: The building of big and expensive fiber
optic networks marked the end of the1990s and the beginning of 2000s.
WiMAX is a mean of simply expanding these networks.
Also, consumers will only enjoy the benefits of competition in the local loop when and
where alternative technologies in switching and access offer a competitor lower barriers
to entry and exit in the telecommunications market.
To understand how OFDM works, it is useful to start with the FDM (Frequency Division
Multiplexing) technique as depicted in the Figure 2.1
Similar to FDM, OFDM also uses multiple sub-carriers but the sub-carriers are closely
spaced to each other without causing interference, removing guard bands between
adjacent sub-carriers. This is possible because the sub-carriers are orthogonal (the
peak of one sub-carrier coincides with the null of an adjacent sub-carrier. Figure 2.2
shows an OFDM signal.
In a OFDM system, a very high data rate stream is divided into multiple parallel low
data rate streams. Each smaller data stream is then mapped to individual data sub-
carrier and modulated using some Phase Shift Keying Quadrature Amplitude
Modulation (QPSK, 16-QAM, 64-QAM).
OFDM needs less bandwidth than FDM to carry the same amount of information which
means higher spectral efficiency. Also, OFDM is more robust to NLOS (non line-of-
sight) environments.
The effect of ISI (inter symbol interference) is eliminated as the signal is divided into
many N sub-carriers, the bit period is N times greater than the original signal. So, the
multipath delay needs to be N times greater than the multipath delay which would
cause ISI in the original signal. In addition each subcarrier period is divided into a cyclic
prefix period and a data payload period as depicted in the Figure 2.3.
Total Symbol
Ts Period
Cyclic
Prefix
Data Payload
Tg Tu Useful Symbol
Period
Tg
The main purpose of adding CP to OFDM symbols is to also help to combat the effect
of multipath.
So, when mobile is located close to BTS there is high CINR per sub-channel, the
maximum possible number of sub-channels may be used to provide better rates. When
mobile is located far from BTS, it is necessary to reduce the number of sub-channels
used to improve the CINR per sub-carriers and concentrate the power in fewer sub-
carriers. Figure 2.4 shows how sub-channelization works.
(a) (b)
• Null sub-carriers for no transmission at all, used for guard bands (left and right)
and DC carrier (used at the center of the channel)
P ilot
D ata DC S ub-c a rriers
S ub -ca rrie rs S ub -c arrier
G u a rd
S u b-c arriers
Active (data and pilot) sub-carriers are grouped into subsets of sub-carriers called sub-
channels. The WiMAX OFDMA PHY supports channelization in both DL and UL. The
minimum frequency-time resource unit of sub-channelization is one slot, which is equal
to 48 data tones (sub-carriers).
The most commonly used channel bandwidth values in E system are multiple of 1.25
MHz. The N_FFT size scales with the channel bandwidth that means the wider the
channel bandwidth, the higher the N_FFT, so the bandwidth of each sub-carrier is
always the same regardless of channel bandwidth:
- 1.25 MHz, N_FFT = 128
- 5 MHz, N_FFT = 512
- 10 MHz, N_FFT = 1024
- 20 MHz, N_FFT = 2048
The sub-carriers forming one sub-channel may be, but not need to be, contiguous.
Different ways of grouping sub-carriers into channels in 802.16 are called permutations.
There are three main permutations:
• FUSC – Full Usage of Sub-channels (DL only): achieves frequency diversity by
spreading the sub-carriers over the entire band
• PUSC – Partial Usage of Sub-channels (UL and DL)
o Groups the sub-carriers into tiles to enable fractional frequency reuse
scheme (FFRS)
o Still has distribution of sub-carriers across band for each sub-channel
TDD is a technique in which the system transmits and receives within the same
frequency channel, assigning time slices for transmit and receive modes. FDD requires
two separates frequencies generally separated by 50 to 100 MHz within the operating
band. TDD provides an advantage where a regulator allocates the spectrum in an
adjacent block. With TDD, band separation is not needed, as is shown in Figure 3.1.
Thus, the entire spectrum allocation is used efficiently both upstream and downstream.
In FDD systems, the downlink and uplink frame structures are similar except that the
downlink and uplink are transmitted on separate channels
One of the great advantages of the TDD mode is the freedom to dynamically allocate
downlink and uplink resources (e.g.: a 10 MHz channel may divided as 3.3 MHz for
uplink and 6.7 MHz for downlink).
2.2.6 Security
The mobile WiMAX incorporates the most advanced security features that are currently
used in wireless access systems. These include Extensible Authentication Protocol
(EAP) based authentication, Advanced Encryption Standard (AES) based
authentication encryption, and Cypher-based Message Authentication Code (CMAC)
and Hashed Message Authentication Code (HMAC) based control message protection
schemes.
The use of multiple-input multiple-output (MIMO) antenna techniques along with flexible
sub-channelization schemes, adaptive modulation and coding enable the mobile
WiMAX technology to support both downlink and uplink high data rates
Matrix A MIMO
[2] Matrix A MIMO implements the rate 1 Space-Time Coding scheme (commonly
known as the Alamouti Code). This technique captures diversity gains by sending a
single data stream in two parts out of two antennas, interleaved with
transformed/conjugated versions of the same information, so that the receiver has
higher probability of successfully extracting the desired signal.
Matrix A MIMO delivers higher link robustness, reducing fade margin by 5 to 6 dB, with
little degradation as subscriber mobility increases. The impact on end-user data rate is
small.
The signal received by one of the antennas at the receiver is a mixture of the signals
transmitted from both of the transmit antennas.
On the left hand side the binary bits enter a modulator, which converts binary bits into
“symbols” according to the modulation to the modulation scheme. These complex
symbols are then fed into the Encoder, which maps the symbols onto the transmit
antennas according to the matrix above.
The code works with a pair of symbols at a time and it takes two periods to transmit the
two symbols. Therefore it has the same rate as the data stream that enters the encoder
but the error performance of the system is improved du to the coded information
transmitted by the system.
[2] For channels with a rich multipath environment it is possible to increase the data
rate by transmitting separate information streams on each antenna in the DL direction.
Using sophisticated receiver technology, the different streams can be separated and
decoded. For example, using 2 transmit and 2 receive Tx/Rx chains and the associate
antennas, up to twice the capacity of a single antenna system can be achieved. This is
particularly useful in urban deployments where long reach is less important than high
data rate at the end user device. In WiMAX, spatial multiplexing is possible using Matrix
B MIMO.
X is the output of the encoder and S1, S2 are the input into the encoder. The row of the
matrix represent the transmit antennas; there is no time element because Matrix B
operates over a single time interval. Each element of the matrix indicates which symbol
is to be transmitted from which antenna. In this system, two symbols are transmitted in
a 1-symbol time duration thus providing a two-fold capacity increase.
The main focus of the MAC layer is to manage the resources of the airlink in an
efficient manner. Upon entering the network, each Subscriber Station (SS) creates one
or more connections over which their data are transmitted to and from the Base Station
(BS). The MAC layer schedules the usage of the airlink resources and provides Quality
of Services (QoS) differentiation. It performs link adaptation and Automatic Repeat
Request (ARQ) functions to maintain target Bit Error Rates (BER) while maximizing the
data throughput. The MAC layer also handles network entry for SS’s that enter and
leave the network, and it performs standard Protocol Data Unit (PDU) creation tasks.
Finally, the MAC layer provides a convergence sub layer that supports Asynchronous
Transfer Mode (ATM) cell and packet based networks.
Functions are the responsibility for connection establishment between the SS and the
network, scheduling of bandwidth among different users based on QoS, initial system
acquisition and radio mobility handling procedures.
[10] The 802.16 MAC provides QoS differentiation for different types of applications
that might operate over 802.16 networks. The 802.16 standard defines the following
types of services:
• Best Effort (BE) Services: BE services are typically provided by the Internet
today for Web surfing.
The ASN consists of one or several ASN Gateways and BSs, supplying WiMAX radio
coverage to a geographical area. A ASN manages MAC access functionality such as
paging, locating, Radio Resource Management (RRM), mobility between BSs and acts
as a proxy for authentication and network mobility (Mobile IP) messages destined for
the CSN from the SS.
Figure 4.2 shows an illustration of the WiMAX network reference model and its
reference points.
Profiles
The WiMAX Forum’s Network Working Group (NWG) is tasked to create higher level
networking specifications for WiMAX systems, beyond what is defined in the scope of
802.16. The NWG has delivered three reference architecture models, from which
vendors and service providers can select their preferred solution.
These three “Profiles” are termed Profiles A, B and C. Profile A and C both use a
centralized controller network element, called the ASN/Gateway. Profile B embeds the
ASN functionality inside the base station, such that an external ASN/GWY is not
needed.
It should be noted that all three profiles include exactly the same functionality. The only
difference is which network elements host that function, and therefore what message
flows are needed. The result is a set of interfaces specifications, R1 through R8.
Reference Point R2
Reference Point R2 consists of protocols and procedures between the MS and the
CSN that is associated with authentication, services authorization and IP host
configuration management. This reference point is logical in that it does reflect a
direct protocol interface between the MS and the CSN.
Reference Point R3
Reference Point R3 consists of the set of control plane protocols between the ASN
and the CSN to support AAA, policy enforcement and mobility management
capabilities. It also encompasses the bearer plane methods (such as tunneling) to
transfer data between the ASN and the CSN .
Reference Point R4
Reference Point R4 consists of the protocols and procedures between two ASG.
Reference Point R5
Reference Point R5 consists of the protocols for interworking between the CSN
operated by the home NSP and CSN operated by the visited NSP.
Reference Point R6
During the implementation of the Reference Point R6, as it was not fully defined by
the WiMAX Forum Network Working Group (NWG), Some vendors implemented a
proprietary Reference Point R6.
Reference Point R6 consists of the set of control and bearer plane protocols for
communication between the BTS and ASG. The bearer plane is the data path
between the BTS and ASG. The control plane includes protocols for data path
establishment, modification and release in accordance with MS mobility events.
Reference Point R6 facilitates the following functions:
• Use of the ASG radio resource controller (RRC) to determine which target
BS have radio resource available and to notify the MS
• Establishment of an initial service flow between the MS, BS, and ASG .
• User session tear-down where the user either gracefully (or ungracefully)
shuts down the MS and the WiMAX network elements take appropriate
actions to clean-up the user and MS context within the network.
Reference Point R8
Reference Point R8 consists of the protocols and procedures between two BTS. .
Some WiMAX vendors do not currently include this reference point in its network
architecture.
Batteries
The RF planning processes are designed to provide outputs that allow service quality at
individual subscriber locations.
Before starting the RF planning, the engineer needs to collect a lot of information in
order to determine the threshold levels the design will use.
The following sections will describe the main parameters that are needed to be defined
in order to start the RF planning.
Based on the following sections, it is determined the RF threshold values that will be
used in the RF planning together with a validated propagation model.
In cellular systems which are FDD, Transmitter frequency blocks are separated from
Receiver frequency blocks by an amount of 20 to 50 MHz. So, the possibility of a BTS
transmitter frequency interfere into another BTS receiver frequency is very low.
Mobile WiMAX systems use TDD. So, since in TDD systems both DL and UL use the
same channel, some analysis should be done regarding the WiMAX neighbor systems.
The interference is explained by the fact that the spectral mask of a RF transmitter is
not ideal neither the transmitter cavity filter. So, out-of-band signals are transmitted
causing interference with neighbor systems. In most of the cases a FDD system is
neighbor of a TDD WiMAX system. In this scenario the following possible interference
conditions should be analyzed:
For this analysis, it is important to obtain filter characteristics (filter plot with rejection
values), transmitter spectral mask, receiver sensitivity for both systems (WiMAX and
neighbor)
2,500 2,506
2,5 2,536 2,566 2,578 2,694 2,700
The following parameters should be agreed with customer in order to do the link budget
calculation:
• Reuse factor
• TTLNA
Some vendors decided to use SUI propagation model for the initial design as the best
alternative to a time prohibitive model tuning option.
The real life has shown that SUI models are optimistic. So, careful use of this model is
very important. I suggest that sales proposals state that coverage radius are
based on SUI models for every proposal that predict cell radius with SUI models.
Real coverage radius will be determined during the project implementation.
The SUI models are divided into three types of terrains, namely A, B and C.
1. Environment A: the maximum path loss category, hilly terrain with moderate-to-
heavy tree densities or obstructed urban.
2. Environment B: intermediate path loss category, hilly with light tree density / flat
with moderate-to-heavy tree density or low-density suburban
3. Environment C: the minimum path loss category, mostly flat terrain with light tree
densities or rural environment.
The Standard Propagation Model is a model (deduced from the Hata formulae)
particularly suitable for predictions in the 150-3500 MHz band over long distances (1 <
d < 20 km). This model uses the terrain profile, diffraction mechanisms (calculated in
several ways) and takes into account clutter classes and effective antenna heights in
order to calculate path loss
This model may be fine tuned using data collected in CW (continuous wave)
measurements using the iplanner RF planning tool.
5.2.3 CW Measurements
CW measurements were done in a medium to big city. It was defined two models for
suburban areas (low and mid) and two models for urban areas (low and mid).
The following chart compares the path losses obtained with SPM (based on CW
measurements) and with generic SUI models.
Figure 6.1 – Path loss comparison between SPM and SUI models
SPM 2.5 DR
Link Budget SUI Radius
Environment radius (km) SUI Models (km)
Urban mid 0.41
Urban low 0.58 A 0.86
Suburban
mid 0.73 B 1.18
It is possible to note the great difference between cell radius based on SPM and SUI.
This implies a bigger difference when comparing the cell coverage areas.
7.1 RF Shakedown
Before the first BTS is turned on, the spectrum needs to be clear down to -111 dBm at
all locations within the network coverage area.
After a BTS has been installed and commissioned, the RF engineer needs to audit the
installation in order to verify that azimuths, tilts and installation in general are as
specified. After that, RF engineer needs to analyze the sweep tests. The sweep tests
consist of the following activities:
The RF engineer needs to calculate the pass/fail values for each site. Find below an
example of Return loss trigger values for an specific RF cabling:
If sweep tests results are within recommended values, the RF engineer can start the
verification of BTS call processing (network entry, network re-entry, initial and periodic
ranging, subscriber basic capabilities negotiation, registration, FTP tests on DL and UL)
[1] WiMAX Handbook – Building 802.16 Wireless Networks, Frank Ohrtman – McGraw-
Hill Communications
[3] IEEE 802.16 Medium Access Control and Service Provisioning – Intel