Dec. 2003802.16 Copyright 2001-2004 Global Wireless Education Consortium 802.16 1 IEEE 802.16.
-
Upload
mitchell-berry -
Category
Documents
-
view
221 -
download
0
Transcript of Dec. 2003802.16 Copyright 2001-2004 Global Wireless Education Consortium 802.16 1 IEEE 802.16.
Dec. 2003 802.16 Copyright 2001-2004 Global Wireless Education Consortium
802.16 1
IEEE 802.16IEEE 802.16
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 2
IEEE 802.16IEEE 802.16
© Copyright 2002-2004 Global Wireless Education Consortium
All rights reserved. This module, comprising presentation slides with notes, exercises, projects and Instructor Guide, may not be duplicated in any way without the express written permission of the Global Wireless Education Consortium. The information contained herein is for the personal use of the reader and may not be incorporated in any commercial training materials or for-profit education programs, books, databases, or any kind of software without the written permission of the Global Wireless Education Consortium. Making copies of this module, or any portion, for any purpose other than your own, is a violation of United States copyright laws.
Trademarked names appear throughout this module. All trademarked names have been used with the permission of their owners.
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 3
IEEE 802.16IEEE 802.16
GWEC EDUCATION PARTNERS: This material is subject to the legal License Agreement signed by your institution. Please refer to this License Agreement for restrictions of use.
GWEC INDUSTRY MEMBERS: This material is subject to all copyright laws. By GWEC membership agreement, the material may be used for internal training, but may not be repackaged in any way for distribution and/or sale outside your company.
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 4
OutlineOutline
Overview MAC
Convergence sublayer – to accommodate ATM and Ethernet networks
Security sublayer Common part sublayer – the main part of the MAC
Physical layers Coexistence Concluding comments
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 5
OutlineOutline
Overview MAC
Convergence sublayer – to accommodate ATM and Ethernet networks
Security sublayer Common part sublayer – the main part of the MAC
Physical layers Coexistence Concluding comments
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 6
ArchitectureArchitecture
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 7
IEEE 802.16 frequency IEEE 802.16 frequency bandsbands
10-66 GHz (802.16) 2-11 GHz licensed (802.16a) 2-11 GHz unlicensed (802.16a) In the future perhaps under 2 GHz as well
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 8
The architecture of the The architecture of the IEEE 802.16 standard IEEE 802.16 standard
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 9
OutlineOutline
Overview MAC
Convergence sublayer – to accommodate ATM and Ethernet networks
Security sublayer Common part sublayer – the main part of the MAC
Physical layers Coexistence Concluding comments
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 10
Service specific Service specific convergence sublayerconvergence sublayer
Accepting higher-layer data Classification (and processing) of data Delivering this data to the MAC Receiving data from the peer entity
Two convergence sublayers are defined: ATM CS Packet CS
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 11
MAC Common part MAC Common part sublayersublayer
In the downlink the BS does not have to coordinate its transmissions, except for TDD
The uplink is shared on a demand basis In general the multiple-access procedure in the uplink
is implemented using unsolicited bandwidth grants, polling, and contention procedures.
Vendors can optimize system performance
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 12
Frequency-division Frequency-division duplexing (FDD)duplexing (FDD)
Unframed FDD for full-duplex SS The downlink is always on and TDD TDMA in the uplink
Framed FDD - downlink in bursts
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 13
Time-division duplexing Time-division duplexing (TDD)(TDD)
Downlink and uplink – same frequency
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 14
MACMAC
A MAC frame consists of header, payload, and CRC Frames can be concatenated, fragmented, or packed One SS may serve multiple tenants
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 15
Network entry and Network entry and initialization: initialization:
1. Scan for downlink channel;synchronize with BS
2. Obtain uplink transmission parameters
3. Perform ranging (acquire timing offset)
4. Negotiate capabilities
5. Establish IP connectivity
6. Establish time of day
7. Transfer operational parameters
8. Set up connections
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 16
Efficient poll/grant Efficient poll/grant mechanism mechanism
Scheduling services Unsolicited grant service (UGS) - for real-time fixed-size
packets (VOIP, T1/E1) Real-time polling service (rtPS) - for variable-size packets
(MPEG video) Non-real-time polling service (nrtPS) – non-real-time data
with variable-sized packets (FTP) Best effort service
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 17
Requests/grantsRequests/grants
SSs can request bandwidth During these requests collisions can happen (CSMA) If the request is successful the SS will receive a data
grant There are incremental and aggregate requests Requests are per connections, but grants are only
per SS
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 18
Privacy sublayerPrivacy sublayer
Privacy - encrypting connections SS/BS Encryption has two component protocols
Encapsulation protocol for encrypting packet data Privacy key management (PKM) protocol.
Protection from theft of service
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 19
Mesh architectureMesh architecture
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 20
Mesh architectureMesh architecture
In mesh mode channel resources are shared on demand basis
Distributed or centralized scheduling Mesh BS has connection to backbone Omnidirectional or sectorized antenna usually
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 21
MAC support for mesh MAC support for mesh topologytopology
Mesh networks need different multiple-access No separate downlink and uplink Stations can talk directly Only TDD is supported in mesh mode The control part of every frame is reserved for mesh
network configuration packets
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 22
Distributed schedulingDistributed scheduling
Neighborhood – stations one hop away All stations coordinate transmissions in two-hop
neighborhood; BS not needed for scheduling Schedules and schedule changes are sent to all SS
over one particular channel
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 23
Centralized schedulingCentralized scheduling
Same network topology The BS determines flow assignments for all SS less
than HR hops from the BS SS themselves determine the schedule from these
flow assignments
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 24
OutlineOutline
Overview MAC
Physical layers
Coexistence Concluding comments
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 25
PHYPHY
Convergence sublayer PMD sublayer PLME may be implemented
Several PHYs are standardized: Single-carrier (SC) for 10-66 GHz Single-carrier (SC2) for 2-11 GHz OFDM for 2-11 GHz OFDMA for 2-11 GHz
High degree of flexibility for cost, capability, services, capacity
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 26
PHY for 10-66 GHzPHY for 10-66 GHz
TDD and FDD are supported Transmission parameters (modulation, coding) can be
adjusted for each SS on a per frame basis – adaptive modulation
Downlink - randomization, FEC encoding, and modulation according to QPSK, 16-QAM, or 64-QAM (optional).
Uplink - randomization of the incoming data, FEC encoding, and modulation using QPSK, 16-QAM (optional), or 64-QAM (optional)
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 27
PreamblesPreambles
Two preambles: one at the beginning of each frame and another at the beginning of each burst within a frame
QPSK Based on 45-degrees rotations 32 or 16 symbols
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 28
Physical layer Physical layer
Synchronization Frequency offsets Power control
These are required, but not defined, left as vendor-specific
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 29
802.16a – 2-11 GHz PHY802.16a – 2-11 GHz PHY
PHY is point-to-multipoint and in unlicensed bands – mesh topology
LOS is not necessary Multipath may be significant Channel BW – 1.5 to 14 MHz Advanced power management Interference mitigation Smart antennas MAC change – ARQ on a per-connection basis
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 30
2-11 GHz OFDM and 2-11 GHz OFDM and OFDMA physical layersOFDMA physical layers
Signal processing operations: Scrambling FEC Interleaving Constellation mapping – QPSK, 16QAM, 64QAM OFDM or OFDMA modulation
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 31
OutlineOutline
Overview MAC
Convergence sublayer – to accommodate ATM and Ethernet networks
Security sublayer Common part sublayer – the main part of the MAC
Physical layers
Coexistence
Concluding comments
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 32
Three methods for Three methods for interference mitigation in interference mitigation in unlicensed bandsunlicensed bands
Dynamic frequency selection (DFS) Transmitter power control (TPC) Antenna directivity
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 33
Recommended practice for Recommended practice for coexistence in 10-66 GHz coexistence in 10-66 GHz
Design and deployment recommendations Does not cover intra-system problems What does it cover?
Co-channel case: adjacent territory, same band Adjacent channel: territories overlap, adj band
Coexistence is generally good for intra-system performance
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 34
OutlineOutline
Overview MAC
Convergence sublayer – to accommodate ATM and Ethernet networks
Security sublayer Common part sublayer – the main part of the MAC
Physical layers Coexistence
Concluding comments
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 35
Current projects within Current projects within 802.16802.16
802.16e – mobility Physical layer below 2 GHz MAC modification to support point-to-point systems
Dec. 2003802.16 Copyright 2002-2004 Global Wireless Education
Consortium802.16 36
Individual ContributorsIndividual ContributorsThe following individuals and their organization or institution provided materials, resources, and development input for this module:
Dr. Todor Cooklev, San Francisco State University, E-mail: [email protected] Modified by Dr. Larry Hash
State University of New York Institute of Technology