You are on page 1of 22

WiMAX Overview

Parviz Yegani
Cisco Systems
pyegani@cisco.com

IETF-64
Nov. 7-11, 2005
Vancouver, Canada
Session Number
Presentation_ID © 2003 Cisco Systems, Inc. All rights reserved. 1
Outline

™ WiMAX NWG Goals


™ Network Reference Model
™ Reference Points and Interfaces
™ NWG Release 1 Features
™ Implementation Scenarios
™ Usage Modes (Fixed, Nomadic, Mobile)
™ Quality of Service (QoS)
™ Mobility Management (MM)
™Security
™ Next Steps

2
WiMAX NWG Goals

Network WG was formed to create an open


end-to-end framework for interoperable
WiMAX networks.
¾ Normative use of protocols based on
existing IEEE and IETF standards
¾ Protocols are defined for different
capabilities supported by the network
¾ Profiles are defined to allow interoperability
for different usage modes and service models

3
Network Reference Architecture

. NAP
BS – Base Station
MS – Mobile Station
NSP GW - GateWay
ASN – Access Service Network
R2 CSN – Connectivity Service Network
BS R6
NAP – Network Access Provider
HA AAA NSP – Network Service Provider

R1 R8 R3
MS ASN GW
(FA)
BS
visited CSN
R6
ASN
R8 R4 R5 (Roaming)

open
ASN GW home CSN
closed

Architecture allows multiple implementation options for a


given functional entity, and yet achieve interoperability among
different realizations of functional entities
4
Interoperability Framework

™ Main goals:
¾ Maximize vendors access to the market
¾ Maximize revenue opportunity for operators
™ Reference Points (RPs)
¾ Network Entities on either side of an RP represent a collection
of control protocols and bearer end-points
¾ Interoperability will be verified based only on protocols &
procedures exposed across an RP
¾ For a supported capability, NWG will specify the normative use
of protocols over an RP
¾ If the vendor claims support for the capability and exposes the
RP, then the implementation must comply with the NWG
definition
¾ Avoids the situation where a protocol entity can reside on
either end of an RP or replication of identical procedures across
multiple RPs

5
NWG Release 1 Features

¾ NWG Release 1 enforces interoperability across R1, R2,


R3, R4 and R5 for all ASN implementation profiles
¾ Convergence sub-layer considerations/choices
¾ IP Address Assignment (Stateless/Stateful)
¾ Network Discovery and Selection
¾ PKMv2 based end-to-end security
¾ Accounting support for multi-operator roaming (RADIUS
only)
¾ QoS, Admission Control and Service Flow Management
¾ Layer 2/3 Mobility Management
¾ Radio Resource Management

6
Implementation Scenarios
ASN Scenario 1 – Decomposed BS
. Rx
ASN GW

BTS
Visited CSN - IP Core
BSC
Ry R3
R1 BTS Internet

MS R4
R2

. R6

R5
BS1
Home CSN - IP Core
ASN GW

BS2

ASN Scenario 2 – BS and ASN GW

7
Access Scenarios
.

Stateful auto-configuration based on DHCPv6 [RFC3315]. The DHCP


server is in the serving CSN and a DHCP relay must exist in the
network path to the CSN.
Stateless auto-configuration as defined in RFC2462 and privacy
extensions in RFC3041.

8
Usage Modes
.
Full Mobility
(e.g. Greenfield, 3G Overlay)

Portability / Simple Mobility


(e.g. Greenfield, DSL Overlay, 3G Overlay)

Fixed Access / Nomadicity Usage Modes:


(e.g. DSL Overlay, Greenfield) Representative of the
types of profiles the
WiMAX Forum may
WiMAX architecture is designed to develop – to guide
implementations and
support evolution path from fixed to
multi-vendor
nomadic to portability with simple interoperability
mobility and eventually to full mobility
deployment with E2E QoS and Security
support

9
QoS Framework

SFM – Service Flow Management


Home NSP
SFA – Service Flow Authorization
AF – Application Function (1) AF => PF
PF – Policy Function PF
LPF – Local Policy Function AF
QoS/Policy
Data

(2) PF => SFA R3/R5


ASN
(3) SFA => SFM
Admission
Control
R1
MS
LPF
Local Local
Resources Policy
Info Data
SFM SFA
Note – The SFA, after successful user authentication, must update its location with the PF.

10
Mobility & Handover
¾ The architecture must support intra-ASN micro-
mobility
- R6 Mobility
- R8 Mobility (inter-BS handover)
¾ The architecture must support inter-ASN macro-
mobility
- R3 Mobility
- R4 Mobility
¾ Intra/inter-ASN Mobility is to ensure minimal delay
and data loss during the transition/handover from
serving ASN to target ASN. This is done via
transferring context (mobility, security, …) and all
active service flows when handover occurs.

Presentation_ID © 2003 Cisco Systems, Inc. All rights reserved. 11


L3 Mobility – Anchored ASN
¾ Proxy MIP (PMIP) - does not involve a change in the point of
attachment address when the user moves. There is no need
for the terminal to implement a client MIP stack.
¾ Client MIP (CMIP) - with a FA based CoA, the CoA point of
attachment IP address can change with the Foreign Agent.
Foreign Agent change can be detected by Agent
Advertisement. For ASN mobility using client MIPv6 in a Co-
located CoA mode (CoCoA), the point of attachment CoA
changes when subnet changes.
¾ PMIP and CMIP can coexist in the network.
¾ MS should support either Mobile IP with CMIP or simple IP
with PMIP.
¾ Network should support both CMIP and PMIP for coexistence
¾ R3 mobility is established between ASN and CSN that are in
the same or different administrative domains.
¾ R4 mobility should allow for keeping an existing anchor ASN
GW or re-anchoring at the target ASN GW.

Presentation_ID © 2003 Cisco Systems, Inc. All rights reserved. 12


L3 Mobility - FA Migration
¾ Initiated by policy (e.g. for path optimization)
¾ Triggered by MIP Agent Advertisement
¾ MIP registration to new FA (ASN GW) – for PMIP and CMIP

R6 Src
Src BS ASN R3
GW

MSS
HA
R8 R4

R6 MIP messaging
Tgt
Tgt BS ASN
Optimized GW
path

Presentation_ID © 2003 Cisco Systems, Inc. All rights reserved. 13


R6 Mobility

R6 mobility should take into account different level of Data Path


granularities: per-flow, user, and per-BS Data Paths. The Data Path is
identified via the classification operation based on a set of classification
criteria such as MS IP address.

Presentation_ID © 2003 Cisco Systems, Inc. All rights reserved. 14


Security
™ WiMAX architecture must comply with the security and trust architecture
defined in the IEEE 802.16 specification and IETF EAP RFCs.
™ Authenticator is anchored during HO (e.g., in the ASN GW)
™ Session is anchored at the first GW through which the MS connects to
the network
™ HA and Anchor GW have trust relationship with Home AAA
™ Anchor GW and HA are in different administrative domains
™ Trust relationship needs to be set up before signalling
™ Home AAA distributes keys to Authenticator and HA
™ Authenticator distributes AKs to the BSs
™ HA has to authorize setup of forwarding path for MS to Anchor GW
™ Signaling between HA and Anchor GW needs to be secure
™ EAP packets carried between the EAP Relay (BS) and the Authenticator
to populate channel binding attributes in the Authenticator
¾ ASN is treated as a single NAS

15
What’s Next?

™ NWG Release 1 Schedule


¾ Stage 2 is near completion
¾ Stage 3 just started (Oct. 2005)
™ Release 2 (tentative) Schedule
¾ Stage 1 2Q06
¾ Stage 2&3 4Q06
¾ New Features
- Legal Intercept
- VoIP (full support)
- IPv6 Mobility
- IMS
- BCMCS
- Other features as requested by SPWG.

16
Backup Slides

17
Interfaces …

™ R1 – the interface between the MS and the ASN as per the


air interface (PHY and MAC) specifications (IEEE P802.16d/e).
R1 may include additional protocols related to the
management plane.
™ R2 – the interface between the MS and CSN associated with
Authentication, Services Authorization, IP Host Configuration
management, and mobility management. This is a logical
interface thus does not reflect a direct protocol interface
between MS and CSN.
™ R3 – the interface between the ASN and the CSN to support
AAA, policy enforcement and mobility management
capabilities. It also encompasses the bearer plane methods
(e.g., tunneling) to transfer IP data between the ASN and the
CSN.

18
Interfaces …

™ R4 – consists of a set of control and bearer plane protocols


originating/terminating in various entities within the ASN that
coordinate MS mobility between ASNs. In Release 1, R4 is the
only interoperable interface between heterogeneous or
dissimilar ASNs.
™ R5 – consists of a set of control plane and bearer plane
protocols for internetworking between CSNs operated by
either the home or visited NSP.
™ R6 – consists of a set of control and bearer plane protocols
for communication between the BS and the ASN GW.
¾ The bearer plane consists of intra-ASN data path or inter-ASN
tunnels between the BS and ASN GW.
¾ The control plane includes protocols for IP tunnel management
(establish, modify, and release) in accordance with the MS
mobility events. R6 may also serve as a conduit for exchange of
MAC states information between neighboring BSs.

19
Interfaces

™ R8 – consists of a set of control plane message


flows and, in some situations, bearer plane data
flows between the base stations to ensure fast and
seamless handover.
¾ bearer plane consists of protocols that allow the data
transfer between Base Stations involved in handover of a
certain MS.
¾ control plane consists of the inter-BS communication
protocol defined in IEEE 802.16 and additional set of
protocols that allow controlling the data transfer between
the Base Stations involved in handover of a certain MS.

20
Quality of Service (QoS)

™ IEEE QoS Framework


¾ Deals with radio link (802.16) QoS
¾ Connection-oriented service
¾ Five QoS classes are defined
- UGS: Unsolicited Grant Service
- rtPS: real-time Polling Service
- ertPS: enhanced real-time Polling Service
- nrtPS: non-real-time Polling Service
- BE: Best-Effort
¾ Provisioned QoS profile for permitted flows per subscriber
¾ Admission policies for new service flows
™ NWG QoS Framework
¾ Extends the 802.16 QoS framework to NWG NRM
¾ Deals with WiMax QoS only (see next slide)
¾ QoS control entities are placed either in the BS or ASN GW

21
QoS Models in Release 1

Push or Pull
¾Pre-Provisioned Service Flow - Static Push Model
(steps 1-2)
¾ Dynamic Service Flow - triggered Push Model
(or Push/Pull)
¾ Subscribed QoS profile is provisioned either in AAA DB or
a policy server
¾ User priority may be used to enforce relative precedence
for admitting new flows when radio resources are tight

Triggers:
¾ L2 User-initiated via IEEE 802.16 signaling
¾ L3 User-initiated on-path QoS signaling (e.g., RSVP)
¾ Network-initiated - Application Triggered (e.g., SIP
proxy)
¾ Network-initiated - Administratively Triggered (e.g.,
SNMP)

22

You might also like