WiMAX: Technology for Broadband Wireless Access
Chapter 1: Introduction to Broadband Wireless Access
- Figure 1.1: Illustration of network types. For each category, the most well known technologies are given. To this figure, some people add a smaller ‘egg’ in the WPAN (Wireless Personal Area Network), representing the WBAN (Wireless Body Area Network), with a coverage of the magnitude of a few metres, i.e. the proximity of a given person
- Figure 1.2: Local loop of a classical (voice) phone system
- Figure 1.3: Coverage of a given zone by a BS
- Figure 1.4: Broadband Wireless Access (BWA) applications with a fixed access. The two main applications of a fixed BWA are wireless last-mile for high data rate and (more specifically) WiFi backhauling
- Figure 1.5: Nomadic or portable BWA
- Figure 1.6: Mobile Broadband Wireless Access (BWA). A mobile WiMAX device can move over all the cells in a seamless session
Chapter 3: Protocol Layers and Topologies
- Figure 3.1: The seven-layer OSI model for networks. In WiMAX/802.16, only the two first layers are defined
- Figure 3.2: Protocol layers of the 802.16 BWA standard. (From IEEE Std. 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 3.3: IEEE 802.16 common MAC Layer can be used with two possible PHYsical layers in WiMAX
- Figure 3.4: Network management reference model as defined in 802.16f. (From IEEE Std 802.16f-2005 . Copyright IEEE 2005, IEEE. All rights reserved.)
- Figure 3.5: PMP topology
- Figure 3.6: Mesh topology. The BS is no longer the centre of the topology, as in the classical PMP mode
Chapter 4: Frequency Utilisation and System Profiles
- Figure 4.1: Illustration of a Public Land Mobile Network (PLMN) offering a cellular service
- Figure 4.2: The cellular concept. simple and so powerful!
- Figure 4.3: Omnidirectional antennas and trisectorisation
- Figure 4.4: Illustration of a useful signal and interference signal as used for SNR calculations
- Figure 4.5: Example of a (theoretical) regular hexagonal network. Cluster size = 3. In each cluster all the operator frequencies are used once and only once
- Figure 4.6: Possible frequency reuse schemes in WiMAX
- Figure 4.7: Example of operating frequencies for each geographical zone in a fractional frequency reuse scheme. The users close to the base station operate with all subchannels available. (Based on Reference )
- Figure 4.8: Illustration of handover in a cellular network
- Figure 4.9: Transmit spectral mask (see also Table 4.2). (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Chapter 5: Digital Modulation, OFDM and OFDMA
- Figure 5.1: Digital modulation principle
- Figure 5.2: The BPSK constellation
- Figure 5.3: Example of a QPSK constellation
- Figure 5.4: A 64-QAM constellation
- Figure 5.5: Illustration of link adaptation. A good radio channel corresponds to a high-efficiency Modulation and Coding Scheme (MCS)
- Figure 5.6: Time and frequency representation of the SC and OFDM. In OFDM, N data symbols are transmitted simultaneously on N orthogonal subcarriers
- Figure 5.7: Generation of an OFDM signal (simplified)
- Figure 5.8: Presentation of the OFDM subcarrier frequency
- Figure 5.9: Cyclic Prefix insertion in an OFDM symbol
- Figure 5.10: WiMAX OFDM subcarriers types. (Based on Reference .)
- Figure 5.11: Illustration of the OFDMA principle. (Based on Reference .)
- Figure 5.12: Illustration of OFDMA multiple access
- Figure 5.13: Example of the data region that defines the OFDMA burst allocation
- Figure 5.14: Example of different permutation zones in uplink and downlink frames
- Figure 5.15: Illustration of the downlink PUSC Cluster and subcarrier allocation
- Figure 5.16: Cluster allocation
- Figure 5.17: Cluster structure. (Based on Reference .)
- Figure 5.18: Uplink PUSC Tile is made of 12 subcarriers. (Based on Reference .)
- Figure 5.19: Illustration of a FUSC subchannel
- Figure 5.20: Bin structure
- Figure 5.21: Illustration of the global principle of AMC subcarrier allocation (the number of guard subcarriers is for 1024-FFT)
Chapter 6: The Physical Layer of WiMAX
- Figure 6.1: OFDM PHY transmission chain
- Figure 6.2: OFDMA PHY transmission chain
- Figure 6.3: PRBS generator used for data randomisation in OFDM and OFDMA PHY. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 6.4: OFDM randomiser downlink initialisation vector for burst 2,…,N. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 6.5: Illustration of the RS-CC encoder of OFDM PHY
- Figure 6.6: Convolutional encoder of rate 1/2. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 6.7: Turbo coded sequence generation
- Figure 6.8: OFDMA PHY Convolutional Turbo Code (CTC) encoder. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 6.9: Block diagram of subpacket generation. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 6.10: BTC and shortened BTC structure. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 6.11: Format of the downlink Transmission Convergence sublayer PDU. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Chapter 7: Convergence Sublayer (CS)
- Figure 7.1: Protocol layers of the 802.16 BWA standard. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 7.2: Correspondence between the CID and SFID
- Figure 7.3: Illustration of service flows and connections
- Figure 7.4: Possible transitions between service flows
- Figure 7.5: Model structure of the service flow types. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 7.6: Classification and CID mapping. The principle is the same for both ways: BS to SS and SS to BS. (From IEEE Std 802. 16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 7.7: Header suppression at the sending entity. Suppression of parts of the header leads to a compressed header. This allows the economy of a precious radio resource that would have been used for redundant information
- Figure 7.8: Header suppression mechanism at the receiving entity. The receiver has to restore the header before properly using the received packet
- Figure 7.9: Illustration of PHS operation. In the Packet CS mode and for each MAC SDU, the PHSI (Payload Header Suppression Index) references the suppressed PHSF (Payload Header Suppression Field)
- Figure 7.10: DSC MAC management message used for the signalling of a PHS rule. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Chapter 8: MAC Functions and MAC Frames
- Figure 8.1: General format of a MAC frame or MAC PDU. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 8.2: Header format of the Generic MAC frame . The number in parentheses is the number of bits in the indicated field
- Figure 8.3: Generic MAC frame may have one or many subheaders
- Figure 8.4: Header format without payload Type I. (Based on Reference .)
- Figure 8.5: Illustration of the fragmentation of an MAC SDU giving three MAC PDUs (or MAC frames)
- Figure 8.6: Illustration of the packing of MAC SDUs in one MAC PDU
- Figure 8.7: Illustration of the concatenation for an uplink burst transmission. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 8.8: General format of a MAC management message (payload of a MAC PDU)
- Figure 8.9: Illustration of the cumulative ARQ process
- Figure 8.10: Incremental Redundancy (IR) HARQ
- Figure 8.11: Scheduling mechanisms in a station (BS or SS). (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Chapter 9: Multiple Access and Burst Profile Description
- Figure 9.1: Illustration of different FDD mode operations: broadcast, full duplex and half duplex. Half duplex SSs as SS 1 and 2 in this figure can listen to the channel or (exclusively) send information. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 9.2: TDD frame: uplink and downlink transmissions share the same frequency but have different transmission times. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 9.3: General format of a TDD frame (OFDM PHY). (Based on Reference .) In the FDD mode, the downlink subframe and uplink subframes are transmitted on two separate frequencies as the uplink frame and downlink frame. The contents are the same for FDD and TDD.
- Figure 9.4: Details of the OFDM PHY downlink subframe. Each downlink burst may be sent to one (unicast) or more SSs (multicast or broadcast).
- Figure 9.5: Details of the OFDM PHY uplink subframe.
- Figure 9.6: Example of an OFDMA frame in the TDD mode. (Based on References and .)
- Figure 9.7: Illustration of the OFDMA frame with multiple zones. (Based on Reference .
- Figure 9.8: DL-MAP and UL-MAP indicate the use of downlink and uplink subframes (the FDD mode). (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 9.9: DL-MAP MAC management message general from for OFDM PHY. Each DL-MAP IE indicates the start time of a downlink burst and the burst profile (channel details including physical attributes) of this burst.
- Figure 9.10: DL-MAP IE fields for the OFDM (WiMAX) PHY Layer.
- Figure 9.11: UL-MAP MAC management message general form. For the sake of simplicity, not all the fields are shown in this figure. Each UL-MAP IE indicates the start time of an uplink burst and the burst profile (channel details including physical attributes) of this burst.
- Figure 9.12: Use of thresholds for a given burst profile.
- Figure 9.13: Illustration of burst profile threshold values for three neighbouring profiles. Burst profile X is the most robust. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 9.14: General format of the DCD (Downlink Channel Descriptor) message
- Figure 9.15: Illustration of the DCD message transmission period and DIUC use. The value of 1000 frames between two DCD messages is an order of magnitude.
- Figure 9.16: Mesh frame global structure. According to the standard, Mesh networks can only use the TDD mode
- Figure 9.17: The two parts of the Network Control subframe of the Mesh subframe. The network configuration contains the Network Descriptor
- Figure 9.18: The three parts of the Schedule Control subframe of the Mesh subframe
Chapter 10: Uplink Bandwidth Allocation and Request Mechanisms
- Figure 10.1: Grant management subheader for the QoS class = UGS (Unsolicited Grant Services)
- Figure 10.2: Grant management subheader for the QoS class = UGS (Unsolicited Grant Services). The piggyback request field is the number of bytes of the uplink bandwidth requested by the SS
- Figure 10.3: Unsolicited bandwidth grants in the uplink
- Figure 10.4: Illustration of the unicast polling mechanism. If the SS has no needs, the allocated slots are padded
- Figure 10.5: Illustration of contention-based group polling. The three SSs shown are group (multicast or broadcast) polled. They all have a bandwidth request. SS 2 wins the contention and then receives a bandwidth allocation
- Figure 10.6: Example of a backoff mechanism. The SS has to wait 11 transmission opportunities (a randomly selected number between 0 and the internal backoff window). In this figure, only the Request IE (contention slot) is represented and not the rest of the uplink (sub-) frame
- Figure 10.7: Illustration of the bandwidth stealing principle
- Figure 10.8: Example of Bandwidth Request IE (bandwidth request contention slots). The BS must allocate a bandwidth for Bandwidth Request IE in integer multiples of individual transmission opportunity values (indicated in the UCD message)
- Figure 10.9: Uplink bursts in the uplink subframe described in Table 10.1
- Figure 10.10: Example of the subcarriers of a focused contention transmission opportunity (contention channel index = 20). The SS transmits zero amplitude on all other subcarriers
Chapter 11: Network Entry and Quality of Service (QoS) Management
- Figure 11.1: DBPC-REQ MAC management message format. The required burst profile for downlink traffic is indicated by its corresponding DIUC (as defined in the DCD message)
- Figure 11.2: DBPC-RSP MAC management message format. If the DIUC parameter is the same as requested in the DBPC-REQ message, the request was accepted
- Figure 11.3: Illustration of DBPC Request and Response messages operation
- Figure 11.4: Illustration of the initial ranging process
- Figure 11.5: Transition to a more robust burst profile. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.
- Figure 11.6: Transition to a less robust burst profile. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 11.7: UGS scheduling service uplink grants allocation mechanism
- Figure 11.8: rtPS scheduling service uplink grants allocation and request mechanism
- Figure 11.9: Illustration of the nrtPS scheduling service uplink grants allocation and request mechanism. The SS may use contention request opportunities as well as unicast request opportunities
- Figure 11.10: Illustration of the BE scheduling service uplink grants allocation and request mechanism. The BS does not have any unicast uplink request polling obligation for a BE SS
- Figure 11.11: The BS decides for bandwidth and burst profile allocations according to many entry parameters
- Figure 11.12: BS scheduler operation for the uplink
- Figure 11.13: BS scheduler operation for the downlink
- Figure 11.14: Possible transitions between service flows. A BS may choose to activate a provisioned service flow directly or may choose to take the path to active service flows passing by the admitted service flows
- Figure 11.15: Dynamic service flow operations. (Based on Reference .)
- Figure 11.16: Successful service flow creation procedure messages and attributes. Some of the parameters in this figure are not included in some DSx messages depending on whether the service creation is BS or SS initiated. (Figure from Reference modified by G. Assaf.)
- Figure 11.17: The general format of DSA-REQ, DSA-RSP and DSA-ACK MAC management messages
- Figure 11.18: SS Network Entry procedures. (Figure by G. Assaf and L. Nuaymi.)
- Figure 11.19: Initial ranging until registration part of the SS Network Entry process. This figure shows the case of a managed SS, i.e. having a secondary management connection
- Figure 11.20: Transfer of the SS configuration file (operational procedure)
- Figure 11.21: General format of the REG-REQ message. Not all possible TLV encodings are represented in this figure
- Figure 11.22: General format of the REG-RSP message. Not all possible TLV encodings are represented in this figure
Chapter 12: Efficient Use of Radio Resources
- Figure 12.1: Example of a simplified process flowchart for a WiMAX system implementing DFS
- Figure 12.2: Example of a block diagram of a beamforming receiver with an N-element antenna array
- Figure 12.3: Example of a block diagram of a beamforming transmitter with an N-element antenna array
- Figure 12.4: Range extension with beamforming
- Figure 12.5: Interference reduction with beamforming
- Figure 12.6: Example of a frame with regions supporting AAS operation
- Figure 12.7: Generic MIMO block diagram for the downlink
- Figure 12.8: Downlink MIMO support in IEEE 802.16e (based on Reference ). STTD=Space Time Transmit Diversity, SM=Spatial Multiplexing (*SM mode requires at least two antennas at the MS side), FHDC = Frequency Hopped Diversity Coding, FRFD = Full Rate Full Diversity. SFTC = Space Frequency Time Code and H-SFTC = Hybrid SFTC
- Figure 12.9: Uplink MIMO support in IEEE 802.16e-2005. (Based on Reference .)
- Figure 12.10: Example of a frame with regions supporting the MIMO operation
- Figure 12.11: Example of MBS zone deployment and MBS_ZONE allocations. All the MS registered to an MBS_ZONE can receive MBS signals from any BS of the MBS_ZONE
- Figure 12.12: Example of the 802.16 frame with the MBS service zone. The presence of the MBS zone is indicated in the DL-MAP message (in a MBS_MAP_IE field). The exact details of the MBS zone are then described in the MBS_MAP message at the beginning of the MBS zone
Chapter 13: WiMAX Architecture
- Figure 13.1: WiMAX network reference model with components (MS/ASN/CSN), reference points (R 1 to R5) and actors (NAP/NSP/ASP)
- Figure 13.2: Generic ASN reference model. R3 is between the ASN and CSN while the external R4 is between ASNs
- Figure 13.3: The ASN profiles A, B and C
Chapter 14: Mobility, Handover and Power-Save Modes
- Figure 14.1: Illustration of handover process stages. (Figure by B. Souhaid and L. Nuaymi.)
- Figure 14.2: Summary of network re-entry steps
- Figure 14.3: Illustration of an anchor BS in a diversity set
- Figure 14.4: Illustration of an MDHO operation mode
- Figure 14.5: Example of paging groups. (Based on Reference .)
Chapter 15: Security
- Figure 15.1: Security sublayer components. (Based on Reference .)
- Figure 15.2: PKM-REQ MAC management message format
- Figure 15.3: PKM-RSP MAC management message format
- Figure 15.4: Authentication and Authorisation Key allocation by the BS. The BS is the server and the SS is the client
- Figure 15.5: MAC management messages as used for PKM protocol-based authentication and key exchange in the 802.16 standard. Some of the parameters are shown. (Figure by L. Rouillé. X. Lagrange and L. Nuaymi.)
- Figure 15.6: Authorisation keys management between the BS and an SS
- Figure 15.7: The SS asks the BS for encryption keys TEK0 and TEK1
- Figure 15.8: Traffic Encryption Keys (TEKs) management. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
- Figure 15.9: Traffic Encryption Keys (TEKs) management
- Figure 15.10: Illustration of the key generation process in PKMv1 and PKMv2. (Figure by M. Boutin, M. Jubin and L. Nuaymi.)
- Figure 15.11: DES algorithm in its CBC mode
- Figure 15.12: Encrypted payload format in the AES-CCM mode. (Based on Reference .)
- Figure 15.13: Illustration of HMAC or CMAC generation. The MAC is also called keyed hash or MAC Digest
- Figure 15.14: HMAC/CMAC/KEK derivation from the AK. (Based on Reference .)
Категории