Professional Documents
Culture Documents
Ieee Standard 802.16: A Technical Overview of The Mobile Wimax Air Interface and Beyond
Ieee Standard 802.16: A Technical Overview of The Mobile Wimax Air Interface and Beyond
16:
A Technical Overview of the Mobile
WiMAX Air Interface and Beyond
Eyal Verbin
Contents
1.
Overview of WiMAX
2.
Physical Layer
3.
4.
Convergence Sublayer
MAC PDU Construction and Transmission
Bandwidth Request and Allocation
ARQ
Quality of Service
Scheduling
Adaptive Modulation and Coding
Security
Network Entry Procedures
Power saving Modes
Mobility Management
Typically, using 10MHz spectrum using TDD scheme with 3:1 DL/UL split, the peak PHY data rate is
about 25Mbps (DL) and 7Mbps (UL)
Scalable bandwidth
FFT size may scale from 128 bit to 1024 bit FFT allowing channel bandwidths of 1.25MHz to
10MHz.
WiMAX supports a number of modulation and channel coding schemes and allows the scheme to be
changed on a per user and per frame basis
Auto retransmission requests (ARQ) are supported on top of physical layer error correction schemes
to enable reliable data transmission
Different users can be allocated with different subsets of the OFDM tones
DL and UL resources and transmission schemes are controlled by the scheduler in the base station.
Beamforming, space time coding and spatial multiplexing may be used to improve system capacity
and spectral efficiency
Connection oriented architecture to support variety of applications, each with its own characteristics.
Robust security
Strong encryption using Advance Encryption Standard (AES) and flexible authentication architecture
based on Extensible Authentication Protocol (EAP)
Secure seamless handover for full mobility applications and various power saving mechanisms
IP based architecture
Network architecture is based on an all IP platform. All end to end services are delivered over an IP
architecture
Part I
WiMAX Physical Layer
propagation
Fast Fading: different reflection arrive at the receiver with different phases. The
combined effect can be constructive or destructive, which causes very large
observed difference in amplitude of the receive signal
Different symbols arrive at different time to the receiver, resulting in Inter Symbol
Interference (ISI)
OFDM symbols
The duration of the guard interval is a tradeoff between the delay spread that can be
Drawbacks
High peak to average ratio that causes non linearities and clipping distortion
Channel Coding
Channel Coding
Randomizer
Improves FEC performance and synchronization capabilities
Channel Encoder
Convolution Code (CC)
Used for encoding of Frame Control Header (FCH)
Repetition Code
Further increase signal margin over the modulation and FEC mechanisms
Applies only to QPSK modulation
Interleaver
Improves FEC performance by ensuring that adjacent coded bits are mapped onto non
adjacent subcarriers (frequency diversity) and that adjacent bits are alternately mapped to less
and more significant bits of modulation constellation
Symbol Mapping
QPSK
16QAM
64QAM (optional for UL)
Operates at the FEC block level and combines PHY and MAC (Hybrid)
The FEC encoder is responsible for generating HARQ sub packets.
The sub packets are combined by the receiver FEC decoder as part of the decoding process.
The receiver combines the newly received burst with the formerly received bursts to enhance decoding performance.
Based on 16 bit CRC, the receiver replies with an ACK if the sub packet decoding succeeded
In order delivery
Due to the N Stop and Wait scheme, out of order delivery of HARQ packets is possible.
Since some applications are sensitive to the delivery order, e.g. TCP, there is an option to
guarantee in order delivery by using PDU SN subheaders.
Symbol Structure
Frequency Domain
Representation
(e.g. 10MHz)
(e.g. 840 for 10MHz)
(e.g. 720 for 10MHz)
(e.g. 28/25 for 10MHz)
(1/8)
Spectral Efficiency
R N data bm cr / Ts
N data bm cr n
R
Efficiency
BW (1 CP) N FFT
5
35Mbps 720 6 /102.9
6
of contiguous logical
subchannels. Each logical
subchannel is mapped to a set
of physical subcarriers
Segment: One or more
Provides frequency diversity and inter cell interference averaging. Includes two
permutations:
Contiguous Permutation: Groups a block of contiguous subcarriers to form a
subchannel. Enables multi user diversity by choosing the subchannel with the best
frequency response.
In general, distributed permutation perform well in mobile applications, while
contiguous permutation are well suited for fixed or low mobility environments.
parameters
Three segments are created from the groups
Logical subchannels are created from a permutation of cluster pairs such that each group is
Slot is one subchannel by two OFDM symbols. It contains 48 data subcarriers and eight pilot
subcarriers
1024 FFT
512 FFT
Guard subcarriers
183
91
Data subcarriers
720
360
Pilot subcarriers
120
60
14
14
Clusters
60
30
48
48
Subchannels
30
15
DC subcarriers
Parameter
1024 FFT
512 FFT
Guard subcarriers
183
103
Used subcarriers
840
408
Tiles
210
102
48
48
Subchannels
35
17
DC subcarriers
TDD only
Each frame is divided into DL and UL sub frames separated by Transmit To receive Gap (TTG) and
estimation.
Preamble subcarriers are boosted BPSK modulated with a specific PN code
To generate the preamble the PHY uses a series of 114 binary PN sequences. The
sequence to be used is determined by the segment number and the Cell ID. It is
mapped to every third subcarrier except the DC carrier.
Enables MS to obtain signal measurements and extract Cell ID for multiple co-
DL Subframe (1)
Multiplexing: OFDMA
Preamble
First symbol of the DL subframe
Used for time and frequency
DL Subframe (2)
DL MAP and UL MAP are broadcast
Standard DL IE includes:
Connection Identifier (CID)
Downlink Interval Usage Code (DIUC), which
defines the MCS and the FEC used for the burst
Repetition coding indication
Burst boundaries
Symbol offset (start of burst in time domain)
Subchannel offset (start of burst in frequency domain)
Number of symbols (burst duration in time domain)
Number of subchannels (burst duration in frequency
domain)
Boosting (power boosting for the burst +6 dB to
UL Subframe
Multiple Access: OFDMA
No Preambles
Standard UL IE includes:
Connection Identifier (CID)
Uplink Interval Usage Code
Duration (in OFDMA slots)
Repetition coding indication
frequency assignment
Reuse 1: Marked as (113) and requires one
frequency assignment
Segmentation
PUSC symbol structure enables division of the
subcarriers into three segments and allows a reuse 3
scheme with a single channel assignment
Reuse 1 scheme has higher capacity at the center
Cell ID
Each three sector BS is assigned with Cell ID (range: 0..31)
Should be unique among neighbors
Each sector in the BS is assigned with unique segment (range: 0..2)
The preamble index is calculated as 32*Segment + Cell ID
DL Permutation Base
Used to randomize pilot modulation and subcarrier permutation
If R1 is used, DL Permutation Base should be set to a unique value among neighbors (range: 0..31)
UL Permutation Base
Used to randomize pilot modulation and subcarrier permutation
If R1 is used, UL Permutation Base should be set to a unique value among neighbors (range: 0..127)
If R1 is not used
UL Permutation Base for neighbor BS with the same FA should be set with an offset of 35 (e.g. 0, 35,
70, 115)
UL Permutation Base the three sectors in the same BS should be set to the same value (to maintain
orthogonality)
transmitter
fades.
Diversity order (d) = NTx x NRx
Ranging
Ranging is an UL PHY procedure that maintains the quality
IR codes
PR codes
BR codes
HO codes
MS maintains the same transmitted power spectral density (PSD), regardless of the
The requirements calls for a complex link adaptation algorithm that makes a
C/N: Carrier to noise for the burst profile in the current transmission
R: repetition rate
Offset SS per SS: Correction factor employed by the SS (set to zero for passive mode)
Closed loop power control may be combined with open loop as an outer mechanism,
Feedback can be carried over the Channel Quality Indication Channel (CQICH) in a special UL
region or over MAC control message
2.
26/21
3.
4.
Deduce overhead
5.
6.
8.
7.
DL: 28.8Mbps
UL: 4Mbps
Part II
Medium Access Control Layer
MAC Functions
Segment or concatenate service data units (SDU) received from higher
SDU
SAP
SAP
CID 1
CID 2
Classification
Reconstruction
(e.g. undo
text PHS)
text
CID n
{SDU, CID,...}
{SDU, CID,...}
SAP
SAP
identified by a Connection Identifier (CID). Connection can carry user plane data and control plane
information
CS performs many-to-one mapping between higher layer applications and a specific connection.
source address.
Classification may be performed at the BS or at the ASN-GW
receiver
Improves efficiency of the network, especially for applications with small packet size (e.g. VoIP)
PHS rules at the transmitter and the receiver are synchronized during service flow initiation and
modification
PHS may be performed at the BS or at the ASN-GW
Robust Header Compression (ROHC) is an alternative to PHS, which is transparent to the MAC
operation. Defined by RFC 3095, ROHC compress the IP, UDP, RTP and TCP headers of IP packets
(can compress 60 bytes of overhead into 3 bytes)
ARQ
For application sensitive to packet error (TCP), ARQ can be used on top of
transmitter and receiver at an given time) are set during connection establishment.
Once SDU is partitioned into ARQ blocks, the partition remains in effect until all the blocks have
For ARQ enabled connection, fragmentation and packing subheader contains the
Generic MAC Header (GMH) is used for carrying user plane data and MAC
Type (6)
EKS
(2)
Rsv (1)
Rsv (1)
CI (1)
HT=0 (1)
EC (1)
control messages
LEN
MSB (3)
HCS (8)
headroom)
BW request and UL sleep control header
SN report header (ARQ)
per CID basis. BS schedules MAC PDUs based on the connection QoS requirements.
The allocation is indicated in the DL MAP.
MS requests UL BW in bytes on a per connection basis by using either stand alone
UL grants are done on a per MS basis and indicated in the UL MAP. MS UL scheduler
dedicated UL region.
Contention is resolved using an exponential backoff window mechanism
Quality of Service
Each service flow is associated with QoS parameters: maximum traffic rate,
guaranteed traffic rate, maximum latency and Priority. MAC layer is responsible
to ensure QoS requirements subject to loading conditions.
Each service flow is mapped to a certain transport connection with its own QoS
messages
Primary management connection: Used to transfer longer, more delay-tolerant messages such as
QoS Architecture
Classification
IP Protocol
Source/Dest IP Address
ToS
Source/Dest MAC
Address
VLAN
Scheduler
Select PDU based on SF
attributes and subject to
available resources
Provisioned
SF defined in BS/MS
SFID assigned
Traffic disabled
Transient stage
CID assigned
Traffic disabled
Traffic enabled
Admitted
Active
suppression
Similar to UGS, but allows dynamic adaptation of grant size based on MS feedback
polling
Scheduling Algorithms
The scheduler prioritizes the backlogged SDUs in the DL and the pending BWR in the UL.
Prioritization is done on a per SF basis based on the various attributes associated with the
service flow.
Scheduler target: Maximize system capacity subject to service requirements of each flow.
Scheduling procedure is outside the scope of the WiMAX standard and has been left to the
equipment manufacturers to implement. It has a profound impact on the overall capacity and
performance of the system, thus it serves as a key differentiator among vendors.
Classical scheduling algorithm
Strict Priority (SP)
SFi = argmax(iPi)
Adaptive PFS takes into account link condition (spectral efficiency) in order to maximize
system capacity
APFS metric
Combination of different algorithms is possible, e.g. SP for the guaranteed rate and APFS for the
excess bandwidth
Input:
HARQ error rate based on MS feedback received on the HARQ ACK UL channel
Output:
MCS
Input:
Output:
MCS
Power adjustment
MIMO mode
Two modes of operation are supported: The first selects a solution that maximize the spectral efficiency (highest order
possible MCS) and the second selects a solution that maximizes the user throughput, i.e. the spectral efficiency multiplied
by the maximum number of subchannels
Security
Security architecture of mobile WiMAX support the following requirements:
Privacy: Provide protection from eavesdropping as the user data traverse the network
Data integrity: Ensure the user data and control messages are protected from being modified
while in transit
Authentication: A mechanism to ensure that a given user/device is the one it claims to be.
Conversely, the user/device should be able to verify the authenticity of the network that it is
connecting to (mutual authentication)
Authorization: Mechanism to verify that a given user is authorized to receive a particular
service
Access control: Ensure that only authorized users are allowed to get access to the offered
services
RSA
Ciphertext that is encrypted with one key can be decrypted by the other key
authentication server
EAP includes a number of EAP methods, which define the rules for authenticating a user and/or a
EAP Transport Layer Security (TLS) defines a certificate based strong mutual authentication.
In WiMAX, EAP runs from the MS to the BS over PKMv2 (Privacy Key Management) security
protocol. The BS relays the authentication protocol to the authenticator in the ASN-GW. From the
authenticator to the authentication server, EAP is carried over RADIUS or DIAMETER.
Encryption
Mobile WiMAX encryption is based on Advanced Encryption Standard (AES)
authentication
AES data encryption provides a built in data authentication capability
AES encryption adds 12 bytes of overhead.
Network Entry
To make a valid DCD and DL-MAP BSID and NAI should match MS configuration and
DCD and DL MAP should indicate the same DCD change counter
To maintain DL SYNC MS should periodically receive DL-MAP and DCD
To make a valid UCD and UL-MAP UCD and UL MAP should indicate the same UCD
change counter
To maintain UL SYNC MS should periodically receive UL-MAP and UCD
Sleep Mode
Sleep Mode is a state in which an MS conducts pre-negotiated periods of
absence from the Serving BS air interface. These periods are characterized
by the unavailability of the MS, as observed from the Serving BS, to DL or
UL traffic. Sleep Mode is intended to minimize MS power usage.
Power Saving class may be activated per connection basis. Activation of
the need to perform any link maintenance activity and handover related
procedures for MS in idle mode.
paging group of its current location. When MS detects that it has moved
to a new paging group it performs location update, in which it informs
the network its new location.
In case of pending DL traffic, the network needs to page the MS only in
paging-listen interval.
Paging-unavailable: MS is not available for paging and can power down or scan for
neighbouring BS.
Paging-listen interval: MS listens to DCD and DL MAP of the serving BS to
determine when the broadcast paging message is scheduled
Paging broadcast message can indicate pending DL traffic and instruct the MS to
perform network re-entry, request MS to perform location update or indicate to the
MS to return to paging unavailable state.
Mobility Management
Handover: The migration of the MS from the air interface of one BS to the air
provided by each BS own DCD/UCD message. The BS obtains that information over the
backbone.
MS scanning of neighbour BS: A BS may allocate time intervals to MS for the
purpose of monitoring and measuring the radio conditions of neighbouring BS. The
time during which the MS scans for available BS will be referred to as a scanning
interval.
Handover may be MS initiated (typically in order to improve link quality) or BS
Handover Process
Scanning and target cell selection
Based on certain triggers (e.g. CINR of target BS falls below 20dB, MS scans link quality of neighbouring BS
Handover Initiation
MS initiated using MOB_MSHO-REQ
BS initiated using MOB_BSHO-REQ
Part IV
Network Architecture
entities. The architecture shall specify open and well defined reference points
between the functional entities.
Deployment modularity and flexibility: The architecture shall support a broad range
of deployment options. It shall scale from the simple case of a single operator with a
single base station to a large scale deployment by multiple operators with roaming
agreements
Support of variety of usage models: Architecture shall support fixed, nomadic,
portable and mobile usage models. Both Ethernet and IP services shall be supported.
Decoupling of access and connectivity services: The architecture shall allow
decoupling of the access network from the IP connectivity network and services
Support for a variety of business models: The architecture shall allow for logical
separation between the network access provider (NAP), the network service
provider (NSP) and the application service provider (ASP)
Extensive use of IETF protocols: Network layer procedures and protocols used
ASN Gateways.
BS is defined as representing one sector with one frequency assignment
connectivity services to the WiMAX subscribers. CSN provides the following functions:
IP address allocation to the MS for user sessions
AAA proxy or server for user and/or device authentication, authorization and accounting
Policy and access control based on user subscription profiles
Subscriber billing and inter-operator settlement
Inter-CSN tunnelling for roaming
Inter-ASN mobility and mobile IP home agent functionality
Connectivity infrastructure for services such as Internet access, VPN and IP multimedia
CSN comprises network elements such as routers, AAA proxy/servers and subscribers
database.
Protocol Layering
Control plane is based on UDP/IP
Data plane is based on GRE tunnelling within the ASN and IP in IP tunnelling
GRE Tunneling
Generic Routing Encapsulation (GRE) may be used as
access networks are available and multiple service providers are offering services over
those networks. Mobile WiMAX specifies a process for network discovery and selection
NAP discovery
MS detects available NAPs in a wireless coverage area based on
with the selected NSP, and by providing its identity and home NSP
domain in the form of NAI
The ASN uses the realm portion of the NAI to determine the next
Mobile IP or Simple IP
Mobile IP only
Simple IP only
Mobile IP or Simple IP
Simple IP
IP address is either assigned from local address pool, or retrieved as RADIUS attributes from
AAA Server
The ASN-GW DHCP proxy is used to transfer IP address information to MS
framework.
Supports both user and device authentication
Supported EAP methods: EAP-TLS and EAP-TTLS
In addition, AAA framework is used for service flow authorization, QoS policy
ASN
NAS forwards the request to the service provider AAA server (NAS acts as
an AAA client on behalf of the user)
AAA server evaluates the request and returns an appropriate response to
the NAS
NAS sets up a service and notifies the MS
Authentication Protocols
PKMv2 is used to perform over-the-air user/device authentication. PKMv2 transfers EAP over the
them via one or more AAA proxies to the AAA Server in the CSN of the home NSP
Authentication Procedure
Initial network entry and
negotiation
Exchange of EAP messages
Establishment of the shared
key (AK)
Transfer of authentication
key
Transfer of security
associations
Generation and transfer of
AAA server
Reservation
Request/Response
(FA) unchanged
No impact on IP level
Handover Procedures
MS Initiated preparation phase
Handover Procedures
MS Initiated action phase
BS functional entity that handles interaction between PC and air interface related paging functionalities
One or more PA can form a Paging Group (PG), which is managed by the network operator. PA may
belong to more than one PG
A database containing information on idle mode MS (e.g. PGID, paging cycle, paging offset, SF
information)