Professional Documents
Culture Documents
net/publication/281291210
CITATIONS READS
3 5,986
1 author:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Visual Attention based System for Compression of Medical Images View project
All content following this page was uploaded by Paramveer Kaur Sran on 28 August 2015.
4. Smart antennas
Fig: 3 Typical GSM 3 Sector Base Station As a general rule, the cell radius is proportional to the
carrier frequency used. Thus a WiMAX network at 3.5
With normal antennas you can adjust the power and the GHz could require roughly 60—80% more base-stations
tilt of the antenna but you cannot adjust the beam itself. than a 2.1 GHz 3G network. The licensed frequencies
Smart antennas work differently — they consist of available for broadband wireless access vary from
multiple transmit elements and the key to their operation country to country. However, it is thought that operators
is to adjust the amplitude and phase of each element so are also looking especially at lower frequency spectrum
as to create constructive interference where there is a for potential WiMAX early deployment due to the larger
user, or group of users, and destructive interference cells and attendant lower start-up costs.
where there are no users, as shown in Fig 4. This results
in more of the overall transmit power being received, There is very little harmonisation across the continents
reduces multipath and can avoid other sources of and even when common spectrum exists, individual
interference If interference becomes a problem a null countries often apply different regulations on how that
beam is sent out to reduce the interference. The spectrum can be used. For example, the 3.5 GHz
licences offered in the UK in 2003 prohibited mobile
services to be offered. This therefore prevents technical 7. WiMAX quality of service
features, such as handover, which would be needed in
order to support mobility. The WiMAX Forum is WiMAX, in contrast to Wi-Fi, has an architecture with a
appealing to regulators across the world to release base-station that is responsible for processing requests to
frequency allocations in the 3.5 GHz and 2.5 GHz bands send or receive data from terminals, performing access
as soon as possible. control and allocating the required radio resources to
. meet the requests that are accepted. In this respect it is
In Europe most interest centres on the so-called ‘UMTS very similar to 2G or 3G cellular systems. As a result it
extension band’ (2500 MHz to 2690 MHz) — which has is possible to offer guaranteed quality of service as well
been declared ‘technology neutral’ and will be auctioned as best effort and other service types.
in the next year or so in the UK. After this, the next
major opportunity for spectrum will be when analogue 8. WiMAX security
TV transmissions cease in 2010—12 in the UK.
Regulations on the use of the unlicensed 5 GHz band The issues regarding the shortcomings of Wi-Fi’s
should be harmonized across the EU shortly, following a security have been well documented. The Wi-Fi
decision by the European Commission. All member Alliance has reacted to the security problems with wired
states will have to comply with the EU regulations on equivalent privacy (WEP) by developing Wi-Fi
the licence-free use of the 5150— 5350 MHz and 5470 protected access (WPA). WPA is not yet widely
—5725 MHz frequency bands. deployed and it requires an upgrade to the access point
as well as the network adapter. The perceived lack of
6. WiMAX throughput and coverage security in Wi-Fi is one of the key drivers behind using
WiMAX.
WiMAX coverage and throughput has been the subject
of considerable debate — with a throughput of 70 Mbit/s WiMAX provides industrial-strength measures for
with a coverage area of 50 km being claimed at one privacy and encryption. Authentication is achieved with
point. In fact, more realistic simulations and trials, such X.509 certificates and extensible authentication protocol
as those run by AT&T in the USA and trials of WiBro1 (EAP). EAP can be used to provide standard SIM
in Korea, indicate a more prosaic performance. WiBro authentication as well as support for soft SIMs. For
offers an aggregate data throughput of 20 to 30 Mbit/s encryption on the link layer (from handset to base-
from a base-station. This gives a sector throughput of 18 station), WiMAX supports the Advanced Encryption
Mbit/s on the downlink and 6 Mbit/s on the uplink Standard (AES) and triple DES, where DES is the Data
giving each user a downlink throughput of 3 Mbit/s and Encryption Standard (3DES), which is the recognised
an uplink throughput of 1 Mbit/s. The base-station ‘strong’ encryption standard. WiMAX also has built-in
coverage radius was 1—5 km and yet the throughput virtual private network (VPN) support, which provides
deteriorated quite rapidly at the cell edge with the rate protection for data that is being transmitted by different
down to around 500—300 kbit/s. The trials in Korea users on the same basestation.
were run using the 2.3 GHz frequency bandwidth. The
coverage and throughput is likely to improve with the 9. WiMAX applications
introduction of smart antennas.
There are four main fixed WiMAX applications, as
Fixed WiMAX has been deployed extensively for described below.
broadband infill as an alternative for DSL — a good
example being WiMAX Telecom which has fixed
WiMAX operations in Austria, Slovakia and Croatia • Digital subscriber line (DSL) alternative or fill-in
with over 6000 subscribers.
One of the main uses of WiMAX will be as a fill-in or
an alternative to cable and DSL. Fixed WiMAX offers a Given the high cost of a nationwide network build, it is
good solution for broadband access in greenfield sites. likely that mobile WiMAX would be deployed firstly in
At least 15% of the US market, and huge portions of the urban areas as a means of offering broadband-like data
rest of the world, do not have a broadband infrastructure. rates on the move (500 kbit/s+).
WiMAX is therefore a good solution as it can be rolled
out quickly with less expense than a wired network. 10.Conclusion