Vous êtes sur la page 1sur 18

WiMAX

Worldwide Interoperability for Microwave Access


White Paper

WiMAX is a wireless access technology for building networks with large coverage areas and high data rates,
so-called Metropolitan Area Networks (MANs). It focuses on various usage scenarios for serving fixed, no-
madic and mobile subscribers and incorporates a broad range of transmission and access technologies, which
can be dynamically applied for serving these different types of subscribers. In addition, it provides mechanisms
for giving Quality-of-Service (QoS) guarantees, and thus it is predestined for enabling real-time services like
Voice over IP (VoIP), video on demand or multiplayer gaming.

1 Introduction In the mobile area, on the other hand, the breakthrough of


data services is still missing. GPRS has been introduced by
Broadband access is the main prerequisite for delivering all GSM operators in the meantime, but it suffers from low
highly sophisticated IT services to the end user, for example, data rates and high delays. Even the Universal Mobile Te-
video on demand, video conferencing, Voice over IP (VoIP) lecommunications System (UMTS), which was introduced
or interactive gaming. After the Internet and mobile com- a few years ago as the successor of GSM and which actu-
munications reached the mass markets in the mid-1990s, ally targets also at packet-switched data, could not initiate
it turned out very soon that existing network technologies a turn-around towards a broad acceptance of mobile data
such as the analog Plain Old Telephone System (POTS), services so far.
the Integrated Services Digital Network (ISDN) or the Glo- A new technology that specifically focuses on broadband
bal System for Mobile Communications (GSM) could not access is called WiMAX (Worldwide Interoperability for Mi-
fulfil the requirements imposed by these applications. The crowave Access). It is a wireless technology that does not
main reason for this lack was simply the fact that these sys- necessarily replace the systems mentioned before, but
tems were initially designed for speech telephony, which tra- that at least acts as an extension, for example, in regions
ditionally is a circuit-switched service of comparatively low where other broadband technologies are not available or
bandwidth. As a result, standardization and manufacturers do not provide sufficient capacity or bandwidth. WiMAX has
created enhancements and auxiliary technologies for bridg- been designed for operation in a broad range of licensed
ing the gap between the capabilities of existing networks and unlicensed frequency bands, thereby being much more
and the requirements of emerging applications. Examples flexible than cellular networks like GSM and UMTS, which
are the Digital Subscriber Line (DSL) for delivering pack- are confined to operation in dedicated, licensed frequency
switched data at high rates over the telephone wire to the bands being subject to regulation. WiMAX covers different
end user or the General Packet Radio Service (GPRS) for usage scenarios, ranging from supporting mobile users to
introducing packet-switched services in GSM networks. connecting LANs (Local Area Networks) to the Internet. To
In the recent years, DSL has become the standard solu- fulfil the heterogeneous requirements on data transmission
tion for fixed broadband access in the consumer market. imposed by these scenarios, WiMAX incorporates several
However, it requires complex modifications on the infra- physical layers with different modulation schemes, antenna
structure of telephony networks and is therefore often not designs and other features. Furthermore, WiMAX provides
available in rural environments with a low population density. sophisticated functions for guaranteeing a certain quality-

WiMAX — Worldwide Interoperability for Microwave Access 1


of-service (QoS) during transmission, which is of particular Base station

importance for real-time or near real-time applications like


Subscriber station
VoIP or video streaming.
WiMAX is standardized by the Institute of Electrical and LoS

Electronics Engineers (IEEE), the same institution that is


also responsible for standardization of other wired and wire-
less access technologies, for example, Ethernet and WLAN
(Wireless Local Area Network). The group within IEEE
consigned with the specification of WiMAX is known under
the identifier 802.16 and denoted as Broadband Wireless ((( (((
Access Working Group. Strictly speaking, the official term
for WiMAX is actually Wireless Metropolitan Area Network Indoor network installation
(WirelessMAN™). The term WiMAX stems from the WiMAX
forum, which is an organization of more than 400 opera- Figure 1. Fixed WiMAX
tors and manufacturers being concerned with “promot-
ing and certifying the compatibility and interoperability of mal conditions, it may achieve transmission ranges of up to
broadband wireless access equipment that conforms to the 70 km and data rates of up to 134 Mbps. As radio signals
IEEE 802.16 standards” [1]. However, in the recent years, above 10 GHz can hardly penetrate obstacles like buildings
the term WiMAX has prevailed against “WirelessMAN” or or hills, an important prerequisite for successful transmis-
“802.16”, and that is why this term is also used throughout sion is that a line-of-sight (LoS) path exists between sub-
this paper. scriber and base station that is not obstructed by obstacles.
The following sections give an overview of WiMAX and Thus, Fixed WiMAX represents an interesting alternative to
introduce its usages scenarios, transmission technologies older or proprietary LoS radio systems of less bandwidth,
and basic services. for example, Wireless Local Loop (WLL).

2.2 Nomadic WiMAX


2 WiMAX Usage Scenarios
The major drawback of Fixed WiMAX is the need for out-
The WiMAX usage scenarios are commonly referred to as door antennas at the subscriber, which requires a cumber-
fixed, nomadic and mobile access, and they are covered by some wiring inside buildings and fixed antenna installations
different documents of the IEEE 802.16 standards family. at roofs of considerable height for guaranteeing LoS condi-
The scenarios impose very different requirements on the tions to the next base station. In order to address these is-
used frequency bands, modulation schemes, medium ac- sues, the IEEE has released another standard in April 2003,
cess, and mobility mechanisms, and hence WiMAX today which is called IEEE 802.16a and which focuses on the no-
incorporates a number of variants of these technologies. madic WiMAX access. Radio channels of Nomadic WiMAX
occupy frequency bands in the range between 2 and 11
2.1 Fixed WiMAX GHz, which in contrast to higher frequencies allow for non-
light-of-sight (NLoS) transmissions between subscriber and
Initially, WiMAX was designed only for fixed access. The first base stations and vice versa. As a result, it becomes pos-
in a series of standards was released in December 2001 by sible to built WiMAX transceivers with integrated antennas,
IEEE and was called IEEE 802.16. It defines a system for which can be connected directly to a PC or included into
the wireless transmission between stationary senders and handheld devices or laptops, for example, in form of PCM-
receivers in outdoor environments. The main components CIA cards. A fixed-installed outdoor antenna is not neces-
of the system are base stations, which are located at the sary any longer, and the WiMAX customer can enter into
cell sites of the WiMAX operator, and subscriber stations, contact from everywhere within the coverage area of a base
which are usually installed at the roofs of buildings at the station, even from the inside of buildings. This is illustrated
WiMAX customers, see Figure 1. The subscriber stations in Figure 2.
have antennas with dimensions comparable to those of sat- A radio channel of nomadic WiMAX occupies a band-
ellite dishes. They are connected typically to a local network width between 1.75 and 20 MHz. The bandwidth has been
of the subscriber, for example, a WLAN or Ethernet instal- kept variable, because frequency allocation and licensing
lation inside the building. The base stations, on the other are managed very irregular in different countries of the
hand, may be interconnected to public networks like the world and significantly vary in the size of frequency bands
Internet or to private ones. In an alternative scenario, Fixed assigned to the operators.
WiMAX might also be used by a cellular network operator However, the flexibility of nomadic access must be paid
for realizing connectivity between the cell sites and the core by a significant decrease in the transmission range and data
network. rates when compared to Fixed WiMAX. The coverage area
Fixed WiMAX has been designed for operation in a very of a base station is limited to a radius of 5 km. The maximum
broad frequency range between 10 and 66 GHz with band- data rate, which only has been achieved in field tests so
widths of 20, 25 or 28 MHz per radio channel. Under opti- far, is about 70 Mbps, but is expected to be much lower for

2 WiMAX — Worldwide Interoperability for Microwave Access


Base station

Base station

Handover

Subscriber station

NLoS
Subscriber
station

Figure 2. Nomadic WiMAX Figure 3. Mobile WiMAX

networks operating under real conditions. a so-called hard handover. This type of handover is charac-
Both Fixed and Nomadic WiMAX can be operated in terized by the fact that the connection to the serving base
two modes, which are referred to as point-to-point (PTP) station is terminated before a new one to another target
and point-to-multipoint (PMP) modes. In the former, a base base station is initialized (“break-before-make”). As a result,
station serves only a single subscriber station, which can the customer experiences a short degradation in the quality
exclusively use the entire bandwidth of the radio channel. of service, that is, an interruption of the data transfer, until
In PMP, on the other hand, a base station supplies several the handover is completed. The mobile access mode, on
subscriber stations at once, and hence the available band- the other hand, has been designed for supporting custom-
width must be shared among all subscribers residing in the ers travelling at velocities of up to 125 km/h. It implements
particular cell. The PTP mode is primarily intended for Fixed a soft-handover, where the connection to the target base
WiMAX, while PMP is the preferred choice for nomadic ac- station is established before the old connection is released
cess. (“make-before-break”). A soft handover happens seamless-
In June 2004, standardization activities for Fixed and ly from the point of view of the customer and has a much
Nomadic WiMAX were merged. The resulting standard lower latency than a hard handover. However, this reduced
document is called IEEE 802.16-2004 [2] and replaces latency must be paid by a much higher complexity in the
the former versions IEEE 802.16 and 802.16a. Frequency hardware.
licensing and first commercial trials for WiMAX in many Besides these handover mechanisms, Mobile WiMAX
countries started in 2005, while related products and serv- includes location management functions, which enable to
ices for the mass market have been announced to become determine from the set of all base stations a WiMAX net-
available in 2007. Starting from this time, it is expected that work is made up of the base station the target subscriber
Fixed and Nomadic WiMAX will be requested especially by is currently attached to and which are necessary whenever
customers residing in rural areas, which often suffer from network-initiated data, for example, incoming Emails, needs
the unavailability of wired broadband technologies like DSL, to be pushed to a subscriber. Furthermore, Mobile WiMAX
cable modem or T1 access. defines different power-saving modes to which the device
changes if there is no data transmission in progress and
2.3 Mobile WiMAX which thus contribute to a significant reduction of battery
consumption when compared to devices used for fixed or
A drawback of Nomadic WiMAX is that a service session nomadic access. Finally, as data transmission in mobile net-
can only be maintained as long as the subscriber resides works is always exposed to varying radio propagation con-
in the coverage area of the base station where this session ditions, Mobile WiMAX comes up with improved modulation
has been initiated. If the subscriber moves from one cover- and error correction schemes.
age area to that of another base station, the session is ter- The specification for Mobile WiMAX has been released
minated and must be re-initiated at the new base station. An as an amendment to the 802.16-2004 standard, and is
automatic transfer of the session from the serving to another called IEEE 802.16e [3]. It emerged from the Korean WiBro
target base station, a process which is called handover, is (Wireless Broadband) technology, which is being developed
not possible in Fixed or Nomadic WiMAX systems. since the beginning of the millennium by the Korean tele-
The missing support of mobile subscribers has led to communications industry under significant participation of
initiatives for creating Mobile WiMAX, which, besides vari- Samsung Electronics. Since 2004, WiBro is being standard-
ous handover mechanisms, also incorporates other mobil- ized by the Korean Telecommunications Technology Associ-
ity functions (see also Figure 3). Mobile WiMAX envisages ation (TTA), and first WiBro networks went into operation in
two access modes, which are called portable and mobile 2005. In November 2004, it was decided to adopt the WiBro
access. The portable access mode serves customers trav- technologies for Mobile WiMAX and to keep both systems
elling at pedestrian speeds. When changing the cell, the compatible to each other.
service session is transferred to the target base station by

WiMAX — Worldwide Interoperability for Microwave Access 3


2.4 Mobile WiMAX - Difference to other Systems and was one of the main driving forces behind the success
of GSM. As GSM and UMTS in the meanwhile are offered
The emergence of Mobile WiMAX networks expected for by over 700 network operators in 214 countries and territo-
the next years imposes the question of how this system ries, customers on the move experience a nearly seamless
relates to classical wireless technologies like WLAN, GSM world-wide mobility support that no other network technol-
and UMTS. The answer to this question is not clear yet and ogy can provide today.
has led to controversies among experts whether WiMAX is On the other hand, GSM and UMTS only support
rather a competing or complementary technology. In order moderate data rates when compared to those that can be
to get an idea about the role of Mobile WiMAX in the orches- achieved with Mobile WiMAX. GSM was initially designed
tra of wireless consumer technologies it might be helpful for circuit-switched speech telephony only and data rates
to consider these systems regarding their data rates and of the packet-switched GPRS are limited to about 60 kbps
mobility support capabilities, see Figure 4. (depending on the capabilities of the used terminal and the
Similar to WiMAX, WLANs according to the IEEE stand- configuration of the serving network). Data rates in UMTS
ards family 802.11 offer network access, which, however, are considerably higher. In the first network expansion
in contrast to WiMAX is limited to local environments, pre- stage, these networks provide services with a maximum of
dominantly inside buildings. A WLAN access point has a 384 kbps, which may be extended to up to 14 Mbps if UMTS
typical range of a few hundreds of meters (rather only a few is combined with a new technology known as Highspeed
dozens of meters indoors), and a couple of them may be in- Downlink Packet Access (HSDPA) and Highspeed Uplink
terconnected to a so-called extended service set for provid- Packet Access (HSUPA) respectively.
ing larger areas with seamless coverage. A cell change is To draw a conclusion, from a today's perspective, Mobile
supported by a handover function, which, however, causes WiMAX may be classified as a technology that bridges the
noticeable interruptions during transmission and only works gap between traditional cellular networks (seamless mobil-
at very low speeds. The data rate supported by most WLAN ity support and comparatively low data rates) on the one
installations today is about 54 Mbps and is thus beyond of hand and local wireless technologies like WLAN (high data
what the typical Mobile WiMAX subscriber can expect. Due rates, but only rudimentary mobility functions) on the other.
to its limited mobility support, WLAN is the preferred choice
whenever an expensive wiring inside buildings should be
avoided, for example, when a PC or notebook needs to be 3 WiMAX Protocol Stack
connected to a DSL modem, or for nomadic customers,
which require high data rates on the spot, but do not move The WiMAX specifications do not define an entire network
considerably. For mobile customers, however, WLAN is less infrastructure or high-level services as known from telecom-
suited, as it is very difficult and expensive to build a WLAN munications systems like GSM or UMTS. They only fix an
that seamlessly cover larger outdoor areas. access technology for connecting subscriber stations over
Other than WLAN and WiMAX, which only provide net- the so-called last mile to a base station, comparable to DSL
work access capabilities, traditional cellular systems like in the wired domain. This base station then provides inter-
GSM and UMTS realize several high-level services such as connectivity with a fixed network, however, the related pro-
speech and video telephony, transfer of short messages, or tocols and mechanisms used for this are out of scope of the
browsing the Internet via the Wireless Application Protocol IEEE specifications for WiMAX. In terms of the seven layers
(WAP). A single network usually spans an entire country, of the OSI protocol stack, WiMAX covers only the physi-
and it consists of many locally operating access networks cal (PHY) and medium access (MAC) layers and is thus in
that are interconnected via a common core network. GSM close compliance to other IEEE specifications like WLAN
and UMTS provide full mobility support, including hando- 802.11 or Ethernet 802.3. The resulting protocol stack is de-
ver, localization and roaming capabilities. Roaming enables picted in Figure 5.
customers to request and use services in foreign networks, The physical layer primarily deals with the representa-
tion of data bits by radio signals, for which different modula-
Data rates tion schemes are envisaged, as well as with related aspects
like antenna technologies and power control. Furthermore,
WLAN
(IEEE 802.11) it manages the separation of uplink and downlink transmis-
sion, which is called duplexing, and incorporates methods
Mobile for error correction and detection. For the different variants
WiMAX of WiMAX several physical layers are envisaged, which are
(IEEE 802.16e)
called WirelessMAN-SC, WirelessMAN-SCa, WirelessMAN-
HSDPA/ OFDM and WirelessMAN-OFDMA. Some characteristic fea-
HSUPA tures of them are highlighted in the following sections.
UMTS
GSM/ As suggested by its name, the medium access layer pro-
GPRS vides mechanisms that define how a radio channel provided
Mobility by the physical layer is shared between different subscriber
stations. The primary goal of medium access is to avoid
Figure 4. Mobile WiMAX - Difference to other systems collisions that would occur when two or more subscriber

4 WiMAX — Worldwide Interoperability for Microwave Access


erates a single carrier of a certain amplitude, frequency and

{
Network layer (e.g., IP)
phase. For data transmission, one or several of these pa-
MAC convergence sub-layer rameters are changed depending on the data to be trans-
mitted, which, as mentioned before, is called modulation or,
MAC common part
using an alternative term, shift keying. The resulting signal
WiMAX MAC privacy sub-layer is then emitted by the antenna connected to the transmit-
Medium access layer (MAC) ter, propagates in the environment, and is finally caught by
another antenna, which is connected to a receiver. This re-
Physical layer (PHY) ceiver then interprets the incoming signal and recovers the
data bits originally sent, which is called demodulation.
Figure 5. WiMAX Protocol Stack In each modulation scheme, data bits are represented in
form of symbols, and each symbol is given by a certain con-
stellation of the carrier’s amplitude, frequency, and phase,
stations use the same radio resources at the same time. the so-called signal state. WiMAX envisages different vari-
Another important focus is on control mechanisms for guar- ants of phase shift keying. The simplest variant is Binary
anteeing a certain performance of data transmission, which Phase Shift Keying (BPSK) and modulates data by shifting
is referred to as Quality of Service (QoS). This performance the carrier phase between two signal states, one represent-
can be described by several parameters, among them data ing the binary “1” and the other the binary “0”. Thus, each
rate, delay, jitter (variation in delay) and error rates. Different symbol only carries a single bit. For transferring more bits
applications, for example, multimedia streaming, VoIP and per symbol, one needs a modulation scheme that defines
web browsing, impose different requirements on QoS, and more signal states. Quadrature Phase Shift Keying (QPSK)
WiMAX provides adequate mechanisms to fulfil them. fixes four signal states and thus represents two bits by one
As can be derived from Figure 5, the common part of symbol. The modulation of a carrier with QPSK is demon-
the medium access layer is supplemented by two sub-lay- strated in Figure 6. The four symbols “00”, “01”, “11”, and
ers, referred to as MAC privacy sub-layer and MAC con- “10” are assigned to the carrier phases 45°, 135°, 225°,
vergence sub-layer. The former provides the usual security and 315°. The number of bits per symbol can be further
mechanisms needed for the authentication of subscribers, increased by changing the signal’s amplitude in addition,
the exchange of key and the ciphering of messages. The which is called Quadrature Amplitude Modulation (QAM).
convergence sub-layer acts as an interface between exter- WiMAX supports 16, 64 and 256-ary QAM (16-QAM, 64-
nal non-WiMAX protocols and the WiMAX medium access QAM, 256-QAM), which represent 4, 6 and 8 bits by one
layer. Its main task is the encapsulation and decapsulation symbol. Figure 7 shows the signal states of 64-QAM.
of external Protocol Data Units (PDUs) into and from so- Of particular concern is the symbol rate, which denotes
called Service Delivery Units (SDUs), which are exchanged the number of symbols transmitted per second. The symbol
between subscriber and base station. The convergence rate is an important measure for the bandwidth the signal
sub-layer is also responsible for bandwidth allocation and adopts in the frequency domain. The higher the symbol
the adherence of negotiated QoS parameters. Two specific rate, the more bandwidth is required and vice versa. The
convergence sub-layers so far exist, one for carrying data of data rate is the product of symbol rate and bits carried per
packet-switched networks like IPv4 or IPv6 and another one symbol. For increasing the data rate, either the symbol rate
for connecting to networks being operated according to the must be increased or the number of bits per symbol must be
Asynchronous Transfer Mode (ATM). increased by using another modulation scheme. The former
spreads the bandwidth of the radio channel, while the latter
makes the signal more susceptible to interferences. This is
4 WiMAX Physical Layer due to the fact that with an increasing number of symbols the
signal states need to be spaced closer and closer together,
This section highlights the physical layer and gives an over- and hence even small interferences during the propagation
view of modulation schemes, antennas, error correction may result in misinterpretations of the incoming signal at
schemes and frame formats used for WiMAX. the receiver.

4.1 Modulation Schemes


Unmodulated
Carrier
Modulation is a process to represent data by changing the
parameters of a periodic sinusoidal electromagnetic wave, Symbol
Q
which is known as carrier. WiMAX incorporates a multitude 00 duration T
10

of modulation schemes, which can be dynamically deployed


under consideration of the error characteristics of the radio I
11 01

channel and the required data rates.


00 10 11 01
(45° shift) (135° shift) (225° shift) (315° shift)
Single Carrier Modulation
In a single carrier modulation scheme, the transmitter gen- Figure 6. Modulation of a carrier with QPSK

WiMAX — Worldwide Interoperability for Microwave Access 5


Q
100000 100010 101010 101000 001000 001010 000010 000000 spread.
Multipath propagation may cause heavy interferences if
100001 100011 101011 101001 001001 001011 000011 000001 the symbol duration T used during transmission is smaller
than the delay spread. The symbol duration denotes the
100101 100111 101111 101101 001101 001111 000111 000101 length of time a single symbol is transmitted, and thus it cor-
responds to the reciprocal of the symbol rate. As depicted
100100 100110 101110 101100 001100 001110 000110 000100 in Figure 9b, the delayed secondary impulses of a symbol
may destruct the impulses of subsequent impulses if the
110100 110110 111110 111100 011100 011110 010110 010100
I symbol duration is much smaller than the delay spread. This
phenomenon is called intersymbol interference and is one
110101 110111 111111 111101 011101 011111 010111 010101
of the main sources for transmission errors.
Intersymbol interference does not represent a serious
110001 110011 111011 111101 011001 011011 010011 010001
problem for Fixed WiMAX, as these networks operate above
10 GHz, where effects of multipath propagation hardly ap-
110000 110010 111010 111000 011000 011010 010010 010000
pear and where radio signals are increasingly radiated in a
directional fashion from the emitting antenna. As a conse-
Figure 7. 64-QAM signal states quence, the antennas of subscriber and base stations must
be adjusted for LoS transmission, and a significant delay
Single carrier modulation is used for Fixed and Nomadic spread does not occur.
WiMAX and is part of the physical layers WirelessMAN- However, one of the main motivations behind the devel-
SC and WirelessMAN-SCa. As mentioned before, Fixed opment of Nomadic and Mobile WiMAX was to enable NLoS
WiMAX operates in the frequency ranges between 10 and transmission. As consequence, radio signals in these sys-
66 GHz, and thus it is only suitable for LoS transmission. A tems are reflected and scattered for several times until they
radio channel has a bandwidth of 20, 25 or 28 MHz, and the reach the receiver. In order to cope with the resulting inter-
supported modulation schemes are QPSK, 16-QAM and symbol interferences, Nomadic and Mobile WiMAX apply a
64-QAM, which can be deployed depending on the error technique known as multi carrier modulation. As suggested
characteristics of the radio link and the desired data rates. by its name, in multi carrier modulation a single radio chan-
For Nomadic WiMAX, single carrier modulation is only nel of a certain bandwidth is subdivided into N sub-carriers,
optional. Nomadic WiMAX focuses on NLoS transmission and the data stream to be sent is distributed over these sub-
and has therefore been developed for operation in frequen- carriers. The total symbol rate of the radio channel remains
cy ranges between 2 and 11 GHz. The channel bandwidth the same, but because each sub-carrier transmits only the
is scalable and may vary between 1,75 and 20 MHz. Single N-th part of the entire data, the symbol duration at each
carrier modulation works similar as in Fixed WiMAX, but has sub-carrier is N times larger compared to the symbol dura-
been extended by BPSK and 256-QAM. tion of a conventional single carrier modulation. Accordingly,
each sub-carrier occupies the N-th part of bandwidth of the
Multi Carrier Modulation entire radio channel. Following this approach, intersymbol
There are multiple error sources a radio signal is exposed interferences are avoided, because the symbol duration on
to during transmission, for example, multipath propagation, each sub-carrier is larger than the expected delay spread,
attenuation, noise, shadowing by buildings and, in the case assuming N is chosen sufficiently large
of Mobile WiMAX, frequency deviations, which are called However, multi carrier modulation may suffer from so-
Doppler shifts and which are caused by movements of the called side lobes in the frequency domain, which result from
mobile subscriber station during transmission. out-of-band radiation in the frequency bands below and
Of particular concern in WiMAX as well as in all other
wireless networks with large data rates and long transmis-
sion ranges is multipath propagation. As depicted in Figure
8, this phenomenon arises if a signal is reflected, scattered
and diffracted from and at obstacles like buildings, trees or
hills. As a result, the signal is copied during transmission,
and the receiver not only receives the primary impulse of a
signal, but also several delayed secondary impulses of it as
shown in Figure 9a. The travelling time of a signal impulse
corresponds to the length of the path at which it propagates
from the transmitter to the receiver. The delay between ar-
rival of a signal’s primary impulse and the arrival of its last
secondary impulse is called delay spread, and its size sig-
nificantly depends on the range of the transmitter and the
density of obstacles in the close surrounding. The longer
the ranges and the higher the density of obstacles at which
the signal is reflected and scattered, the larger is the delay Figure 8. Multipath propagation

6 WiMAX — Worldwide Interoperability for Microwave Access


Symbol
Symbol duration T duration T
Delay spread Delay spread
Power Power

Secondary impulses Secondary impulses Time Time


Primary impulse of Primary impulse of Primary impulse of Primary impulse of Primary impulse of
symbol n symbol n+1 symbol n symbol n+1 symbol n+2

(a) Delay spread without intersymbol interferences (b) Delay spread with intersymbol interference
Figure 9. Delay spread and intersymbol interference

above each sub-carrier. These side lobes do not carry any has also advantages regarding power control and battery
useful information that is needed for interpreting the incom- consumption. For example, base stations can increase the
ing signal at the receiver, but they can distort the transmis- transmit power on sub-channels serving indoor subscriber
sion in neighbouring sub-carriers. An important concern stations, and decrease it for subscriber stations staying
when using multi carrier modulation is therefore to select an outdoors or in the close surrounding of the base station.
appropriate frequency space between the sub-carriers. For Subscriber stations, on the other hand, may concentrate
this purpose, the sub-carriers are placed orthogonal to each transmit power in a few sub-carriers by OFDMA, thereby
other in the frequency domain, a technique that is called Or- saving valuable battery resources, which is especially of ad-
thogonal Frequency Division Multiplexing (OFDM). A pair of vantage for small, mobile devices with integrated subscriber
sub-carriers is said to be orthogonal if the frequency space station as intended for Mobile WiMAX.
between them is given by 1/Ts Hz, where Ts represents the The physical layers envisaged for Nomadic and Mobile
symbol duration on each sub-carrier. As depicted in Figure WiMAX incorporate different variants of OFDM and OFD-
10, the advantage of orthogonality is that the peak of a sub- MA respectively. In WirelessMAN-OFDM, the radio channel
carrier’s main lobe corresponds to the zero crossings of the is subdivided into 256 sub-carriers, each of which can be
neighbouring sub-carriers. In this way, out-of-band radiation modulated with QPSK, 16-QAM or 64-QAM. The channel
in the side lobes neutralize each other, and the transmission can adopt different bandwidths between 1,75 and 20 MHz.
in a sub-carrier have no negative impacts on its neighbour- From the 256 sub-carriers, only 192 carry user data. The re-
ing sub-carriers. Furthermore, OFDM allows the overlap- maining ones are needed for frequency synchronization (pi-
ping of the main lobes of neighbouring sub-carriers, and lot sub-carriers) or as guard bands (NULL sub-carriers) for
hence they can be arranged very close together, which is avoiding neighbour channel interferences that result from
very bandwidth efficient when compared to a non-orthogo- side lobes of adjacent radio channels. Sub-channelization
nal multi carrier modulation. is only applied on an optional basis for transmissions in the
In WiMAX, OFDM has been extended with a feature uplink. WirelessMAN-OFDMA, on the other hand, subdi-
called sub-channelization, see Figure 11. The OFDM radio vides the radio channel into 2048 sub-carriers. Thus, the
channel is subdivided into several sub-channels, and each symbol duration on each sub-carrier is much longer here
sub-channel, in turn, is composed of several sub-carriers. than in WirelessMAN-OFDM, and hence the signals are
Instead of using all sub-carriers the radio channel consists less susceptible to intersymbol interferences. In contrast to
of, a transmitter may send on only one or several select- WirelessMAN-OFDM, sub-channelization is mandatory for
ed sub-channels. In this way, multiple users can share the both directions. It can be used in different configurations
same OFDM channel simultaneously. Therefore, sub-chan- that differ from each other regarding the fragmentation of
nelization in OFDM is basically a multiple access scheme, the OFDM radio channel into sub-channels.
and therefore this variant of OFDM is called Orthogonal Mobile WiMAX adopts the WirelessMAN-OFDMA physi-
Frequency Division Multiple Access (OFDMA). OFDMA cal layer, but introduces a new feature that is called Scal-

fn fn+1 fn+2 fn+3 fn+4 OFDM channel


Sub- Sub- Sub- Sub-
channel 1 channel 2 channel 3 channel 4
Main lobes

Side lobes

Guard bands Guard bands


1/T Frequency
Figure 10. OFDM Figure 11. OFDMA

WiMAX — Worldwide Interoperability for Microwave Access 7


able-OFDMA (SOFDMA). While in Nomadic WiMAX, the on beamforming and generates a beam that is directed to-
number of sub-carriers remains constant irrespective of wards a subscriber or a group of subscribers staying close
the channel bandwidth, which can vary between 1,25 and by. MIMO, on the other hand, utilizes the effects of multipath
20 MHz, in SOFDMA the number of sub-carriers is scaled propagation and is the preferred choice in cluttered environ-
in dependence on the channel bandwidth. As a result, the ments. Signals from the different antennas are radiated in
spacing between sub-carriers and the symbol durations a way that they travel at different paths from the sender to
remain constant for varying channel bandwidths, which re- the receiver. The different paths may either carry the same,
duces the system complexity needed for smaller channels redundant copies of the data stream or they might be used
and improves the performance of wider ones. to transfer different data streams to the receiver. The former
approach makes the transmission more robust, because in-
4.2 Antennas terferences on a certain path may be compensated by the
transmissions received from another path, or transmissions
Besides multi carrier modulation, another key factor for from different paths may be combined at the receiver to get
making the transmission more robust and for achieving high a useful signal. This option is the preferred choice for serv-
data rates is the choice of an appropriate antenna technol- ing mobile subscribers, which suffer from rapidly changing
ogy. Most wireless systems today follow a single-antenna radio conditions. The transfer of different data streams, on
approach, where each base station is connected to a single the other hand, increases the capacity, but is less robust. It
antenna, which either radiates power in all directions equally is primarily intended for fixed and nomadic subscribers.
(omnidirectional antenna) or which concentrates power in a
beam of a certain direction and width (directional antenna) 4.3 Channel Coding
for serving only the sector of a radio cell.
For WiMAX, the usage of intelligent multiple-antenna The goal of channel coding is to prepare the data stream to
architectures is envisaged, where base stations and sub- be transmitted in a manner that errors that may occur dur-
scriber stations are equipped with several highly directional ing transmission can be reliably detected and corrected at
antennas (arranged in a so-called multi-antenna array), the receiver. This is accomplished by calculating redundant
each of it connected to a dedicated transmitter and receiver data from the data stream. WiMAX applies different error
respectively. The antennas can be dynamically adjusted to coding schemes, and their deployment and parameters de-
radiate power in a certain direction under consideration of pend on the physical layer used.
the subscribers’ positions within the coverage area and the In general, it can be distinguished between block and
current conditions of multipath propagation. Because the convolutional codes. Block coding subdivides the data
power is concentrated into a beam of small width, the cov- stream into blocks of n bits, and generates a parity word for
erage area can be increased and interferences eliminated. each block that is attached to it, resulting in a block of size m
Furthermore, the different transmitters connected to a mul- bits (m>n) that is then further processed. The type of block
ti-antenna array can independently transmit different data code used in WiMAX is called Reed-Solomon code. Con-
streams on the same radio channel, assuming that their volutional coding takes n bits from a continuous input data
beams are sufficiently separated in space. This technique is stream and maps them onto m bits of an output stream. The
known as Space Division Multiplexing (SDM) and increases generation of output bits is realized by combining (convolv-
the capacity within a radio cell linearly with the number of ing) the outputs of several linear feedback shift registers in
antennas deployed. a certain manner.
WiMAX incorporates two different multiple-antenna tech- The quality of error coding can be measured by the
nologies, which are called Adaptive Antenna System (AAP) maximum number of errors that can be corrected in a data
and Multiple Input Multiple Output (MIMO). Both of them block or stream of fixed size and whether error bursts or
are compared in Figure 12. The former technique is based only single-bit errors can be corrected. These capabilities
mainly depend on the algorithms used for error correction
as well as on the code rate r=n/m, which expresses the
number of output bits per input bit. The lower the code rate
is, the higher is the probability that errors can be corrected,
but the lower is the net data rate that can be achieved at the
radio channel. Therefore, the WiMAX standards envisage to
dynamically fix an appropriate code rate under considera-
tion of the expected degree of interferences.
Error correction mechanisms reliably detect and correct
(a) Adaptive Antenna System errors. Unfortunately, each radio transmission suffers from
the appearance of error bursts, which are characterized by
a large number of errors occurring in consecutive bits. Be-
cause it is difficult or even impossible in many cases to cor-
rect such errors, the output bits generated by error coding
(b) Multiple Input Muliple Output
can be mixed prior to transmission, a process that is known
Figure 12. Comparison of AAS and MIMO as interleaving. For this purpose, the data stream is subdi-

8 WiMAX — Worldwide Interoperability for Microwave Access


(a) Frequency Divsion Duplexing (FDD)
vided into code words of fixed length, and the consecutive
Downlink frame n Downlink frame n+1
bits of a code word are exchanged with the bits of previous
SS#1 SS#2 SS#3 SS#1 SS#2 SS#3
and subsequent words according to a certain algorithm. At xx MHz BC
(VD) (HD) (HD) BC (VD) (HD) (HD)
the receiver, the original bit sequence is then reassembled
by a de-interleaving process. Thus, error bursts occurring yy MHz
SS #1 SS #3 SS #2 SS #1 SS #3 SS #2
(VD) (VD) (VD) (VD) (VD) (VD)
during transmission are distributed over several code words,
that is, they are subdivided into single bit errors that can be Uplink frame n Uplink frame n+1

corrected in most cases.


(b) Time Divsion Duplexing (TDD)
As stated before, WiMAX supports different options Frame n
for error coding. Figure 13 depicts a two-step error coding Downlink subframe n Uplink subframe n
process that applies both block and convolutional coding. In SS#1 SS#2 SS#3 SS #1 SS #3 SS #2
xx MHz BC
the first step, which is also referred to as outer coding, the (VD) (HD) (HD) (VD) (VD) (VD)

transmitter encodes the data stream with a Reed-Solomon


code. The resulting blocks together with their parity words Figure 14. Channel coding in WiMAX
are then interleaved. In order to improve robustness, a con-
volutional coding process is then applied in the last step, Figure 14b demonstrates full and half duplex modes for
which is also called inner coding. The decoding steps at the different subscriber stations. SS #1 is a full duplex station,
receiver are then executed in reverse order. and can thus send and receive simultaneously. SS #2 and
#3, on the other hand, are half duplex stations. Their uplink
4.4 Duplexing and downlink bursts must be arranged in a way that they
do not overlap. It must also be considered that their uplink
Another task of the physical layer is the separation of uplink bursts are not in conflict with broadcast transmissions from
and downlink transmissions, which is commonly referred to the base station.
as duplexing. Two fundamental approaches exist, which are Using TDD, downlink and uplink share a common radio
called Frequency Division Duplex (FDD) and Time Division channel and are separated in the time domain as demon-
Duplex (TDD) and which are both supported in all WiMAX strated in Figure 14b. A transmission frame is subdivided into
variants. downlink and uplink subframes, each of it consisting again
In FDD mode, uplink and downlink are separated in the of a number of data bursts assigned to different subscriber
frequency domain, that is, there exists a dedicated radio stations. A challenge of TDD is to avoid an overlapping be-
channel for each direction, which is demonstrated in Figure tween downlink and uplink subframes. The overlapping may
14a. Both uplink and downlink channels are subdivided into result from the fact that different subscriber stations are lo-
frames of a certain duration, and each frame, in turn, con- cated at different distances to the base station, and hence
sists of several data bursts. Each subscriber station is as- do not receive the end of a downlink subframe simultane-
signed two data bursts, one on the downlink channel for re- ously. Therefore, uplink and downlink subframes must be
ceiving data from the base station and another on the uplink separated by guard periods during which no transmission
channel for transferring data to the base station. In addition, is allowed.
there is a dedicated data burst for broadcast transmissions, Both FDD and TDD are available for all physical layers
which is used by the base station to supply all subscriber of WiMAX. FDD is the preferred solution for regulated op-
stations with control information. This will be explained in eration in licensed frequency bands, while TDD is primarily
subsequent sections. deployed in unlicensed bands, which require less regulatory
FDD can be operated in full duplex (FD) or half duplex and organizational constraints. The following section gives
(HD) mode. In full duplex, the stations can send and receive a more detailed overview of the structure of transmission
simultaneously. However, a major problem of FDD is that frames used for FDD and TDD.
the transmission power of an outgoing signal is much higher
than the received power of an incoming signal, and there- 4.5 Frame Format
fore the side lobes of the outgoing signal may drown out
the incoming signal. To cope with this problem, it is recom- The physical layers of WiMAX come along with different
mended to arrange uplink and downlink far away from each frame formats, which, however, only slightly differ from each
other in the frequency domain. Nevertheless, there often other. Therefore, only their common elements are explained
remain interferences, which can only be avoided by using here. Figure 15 shows a simplified version of the frame
frequency filters, which, however, makes mobile devices structure as used for the TDD mode. A frame consists of
complex and expensive. Another solution is therefore to use a downlink and uplink subframe and lasts 5, 10 or 20 ms.
half duplex, where subscriber stations do not receive and Consecutive downlink and uplink subframes are separated
transmit at the same time. by guard periods (as explained in the last section), which
are called Transmit/Receive Transition Gap (TTG) and Re-
Convolutional ceive/Transmit Transition Gap (RTG) and during which no
Block coding
Interleaving Coding
(Outer coding)
(Inner coding) data transmission is allowed. For FDD, basically the same
format is used: the downlink and uplink subframes shown
Figure 13. Channel coding in WiMAX in Figure 15 are assigned to different radio channels for

WiMAX — Worldwide Interoperability for Microwave Access 9


Time
Frame n-1 Frame n Frame n+1 work entry and will be described below. Using the band-
width request field, a subscriber station can announce its
Downlink sub-frame Uplink sub-frame
bandwidth requirements to the base station, which will also

Bandwidth
Preamble

DL DL DL
be explained later.

request
UL UL UL

ranging
Initial
FCH

RTG
TTG
Burst Burst Burst Burst Burst Burst
#1 #2 #n #1 #2 #n The broadcast fields (in the downlink) and the fields
for initial ranging and bandwidth request (in the uplink) are
followed by data bursts for individual transmissions to and
Broad- MAC MAC MAC
cast PDUs PDU #1 PDU #n
from subscriber stations. A data burst is of variable length
and carriers the protocol data units of the medium access
layer (MAC PDU). The assignment of data bursts to sub-
DL UL
DCD UCD
MAC MAC
CRC scriber stations is part of the medium access layer and is
MAP MAP Header Payload
executed by the base station under consideration of QoS
Figure 15. TDD frame format requirements.
For each data burst, another configuration of modulation
parallel transmission and constitute an entire frame with a scheme and error coding rate can be used, which is speci-
maximum length of 20 ms. Furthermore, there is no need in fied in the DL-MAP and UL-MAP fields of the frame. The
the FDD mode to separate consecutive frames by TTG and configuration can be dynamically selected under considera-
RTG respectively. The following descriptions refer to both tion of the capabilities of the subscriber station, the required
TDD and FDD. data rates and the expected robustness of transmission. For
Because the WiMAX physical layers provide several example, subscriber stations located close-by to the base
options, for example, regarding modulation schemes or station may be served by 64-QAM, which provides high
error coding rates, it is necessary to inform all subscriber data rates but which is very susceptible to interferences,
stations in a radio cell about the configuration of the radio while for subscriber stations located farther away the more
channel. For this purpose, the serving base station broad- robust QPSK modulation may be preferred. This is demon-
casts control information at the beginning of each frame, strated for the downlink in Figure 16. However, the usage of
which is received by all subscriber stations connected to different modulation schemes imposes certain constraints
that base station. The broadcast is constituted by a pream- regarding the ordering of bursts within a frame. A particular
ble, a so-called frame control header (FCH) and the first concern is that a subscriber station that wants to transmit
data burst, see Figure 15. Modulation and coding of these in (or receive) a burst has to detect the end of the previ-
fields are standardized in order to make them interpretable ous burst assigned to another subscriber station. This can
for all subscriber stations being in the process of network only be guaranteed if for the previous burst either the same
entry, which will be explained below. modulation scheme is used or another one that is more ro-
The preamble indicates the beginning of a frame and bust against interferences. In Figure 15, SS#1 is located far-
enables the synchronization of subscriber stations to the thest away from the base station and is served with a QPSK
transmissions of the base station. It always has a length of modulation in the first burst. SS#2, on the other hand, is
two OFDM symbols of a fixed radio pattern and is modulat- closer by and receives in the second burst modulated with
ed with QPSK. The preamble is followed by the FCH field, the less robust 16-QAM. It can easily detect the end of the
which carries the so-called burst profile of the first downlink first burst, because QPSK is more robust than 16-QAM. If,
burst. This burst profile indicates the modulation scheme however, the order of the two bursts would be exchanged,
and code rate used in the first burst. The FCH field consists SS#1 could hardly detect the end of the first burst, because
of only one OFDM symbol and is modulated with BPSK. it is located out of the range where 16-QAM modulated sig-
The first burst then carries a so-called broadcast control nals can be reliably received. Therefore, the bursts within
field, which is composed of further fields denoted as DL- a frame must always be arranged in decreasing order with
MAP, UL-MAP, Downlink Channel Descriptor (DCD) and
Uplink Channel Descriptor (UCD). DL-MAP and UL-MAP Decreasing robustness of modulation
indicate the positions of all downlink and uplink bursts within
Preamble

the corresponding subframes as well as their burst profiles. Downlink SS #1 SS#2 SS#3 SS#4
FCH

subframe (QPSK) (16-QAM) (16-QAM) (64-QAM)


DCD and UCD are complex descriptions of the configura-
tion of downlink and uplink, and contain information like the
identifier of the serving base station, the frame length, the
length of various fields within a frame, the frame number
and information for power adjustment and initial ranging, to SS#2
name only a few. Each subscriber station that wants to get BS
SS#1
access to a base station has to receive these descriptions SS#4
SS#3
and adjust to it.
An uplink subframe starts with two fields denoted as ini-
tial ranging and bandwidth request. The former is accessed Increasing interferences
by subscriber stations in order to determine the range to
the base station. This process is performed during the net- Figure 16. Modulation of data bursts

10 WiMAX — Worldwide Interoperability for Microwave Access


DL sub-frame UL sub-frame
tection are activated as well as the length of the entire PDU.
DL-MAP The bandwidth request header additionally contains the
FCH
Frequency domain - OFDMA sub-carriers

DL Burst #2 UL Burst #1 number of bytes the subscriber station intends to transmit


in the uplink. The payload field carries the actual user data

(Multicast/Broadcast burst)
UL-MAP

as well as control and management information and is of


DL Burst #3 variable length. For example, the payload field may carry IP

DL Burst #5
Preamble

data packets, which are filled into the payload field by the
DL-MAP

UL Burst #2
DL Burst #1 convergence sub-layer.
DL Burst #5

Finally, the Cyclic Redundancy Check (CRC) field con-


BW tains a checksum that the transmitter calculates from the
DL Burst #4
UL Burst #1 header and payload fields. The term CRC denotes a special
IR
mechanism of error detection, where the checksum is given
Time domain - OFDMA symbols TTG RTG by the remainder of a polynomial division. The checksum is
analyzed by the receiver in order to detect those errors that
Figure 17. Example of frame structure when using could not be corrected by the channel decoding process of
OFDMA the physical layer (see also Section 4.3).

regard to the robustness of the used modulation schemes. 5.2 Service Flows and MAC Connections
Finally, Figure 17 shows a possible appearance of down-
link and uplink frames for the case that OFDMA is used. The medium access layer of WiMAX organizes the ex-
The different data bursts are not only separated in the time change of data between subscriber and base station by
domain here. They can also be transmitted simultaneously the concept of service flows. A service flow is always uni-
assuming that they adopt different sub-channels, which are directional, that is, it is defined either for uplink or downlink
composed of the several sub-carriers built by the multi car- direction. It is represented by a unique Service Flow Identi-
rier modulation. fier (SFID) and characterized by a set of QoS parameters,
for example, data rate, latency and jitter. The requirements
5 WiMAX Medium Access Layer of different applications on these parameters are very het-
erogeneous. For example, VoIP without silence suppression
If a base station operates in the point-to-multipoint mode demands for a constant bit rate and a guaranteed maximum
(see Section 2.2), subscriber stations located within its cov- latency and jitter, while a simple file transfer only requires
erage area compete against each other for access to the ra- a minimum data rate, but no guarantees regarding other
dio channel. This access is coordinated by the base station QoS parameters. Each service flow is realized by a MAC
and belongs to the main tasks of the medium access layer. connection, which is referenced by a Connection Identifier
The primary focus of medium access on the one hand is to (CID) and which is constituted by a series of data bursts
avoid collisions, which would occur if two or more subscrib- allocated by the base station in the different transmission
er stations would enter the same radio channel (or some of frames. This allocation has to be organized in a way that the
its sub-carriers if OFDMA is applied) simultaneously and, QoS requirements of the service flow the connection carries
on the other, to guarantee the access in a way that QoS re- are fulfilled. This process represents the core mechanism
quirements are met. Besides this, the medium access layer of medium access. It is called scheduling and is based on
also provides related functions, for example, authentication sophisticated algorithms.
and ciphering as well as error correction and radio link con- The allocation of data bursts has to be considered for
trol. The following sub-sections provide a short overview of downlink and uplink direction differently. For the downlink,
the most important procedures of medium access. the allocation is comparatively simple, because the base
station is the only sender in this direction. The data of an
5.1 MAC Protocol Data Units external network, for example, the Internet, arrives at the
base station and is there assigned to the service flow that
Data is transferred via protocol data units (PDUs) of the is maintained between the base station and the subscriber
MAC layer, which, in turn, are included into the data bursts station the data is intended for. The scheduling algorithm of
provided by the physical layer. There may be several MAC the base station then identifies one or several bursts within
PDUs per data burst. The PDUs carry user data, control and one or several frames for data transmission.
management information as well as bandwidth requests In the uplink, the medium access is much more com-
issued by the subscriber stations to announce their band- plicated, because it has to be coordinated among all sub-
width requirements for uplink transmission. Apart from the scriber stations within a cell. In classical mobile networks,
bandwidth request, which only consists of a single header, for example, GSM, the problem of assigning transmission
a PDU contains a header field, a payload field and another capacity to mobile stations is often solved by reserving a
field for error detection, see also Figure 15. burst of fixed length in each frame and for each active sta-
The header is of fixed length and carries control infor- tion. In other wireless system, for example, WLAN, access
mation, for example, the identifier of the connection (see to the radio channel is not centrally coordinated. Instead,
description below), whether or not encryption and error de- the stations enter the channel whenever they have data to

WiMAX — Worldwide Interoperability for Microwave Access 11


Another mechanism for requesting bandwidth is piggy-
backing. The name is derived from the fact that bandwidth
requests are piggybacked (or attached) to the regular uplink
transmissions of a subscriber station, instead of sending
Polling
[UL-MAP] a dedicated bandwidth requests header. Piggybacking is
Bandwidth request performed independently from polling, that is, a subscriber
[Bandwidth request field] station does not have to wait until it is polled, but can imme-
Bandwidth grant diately inform the base station about changing bandwidth
[UL-MAP]
demands if necessary. The bandwidth request is included
UL transmission
[assigned data burst] into the header of a conventional MAC PDU and always re-
fers to the connection this PDU is part of.
Figure 18. Polling Finally, a subscriber station can get assigned uplink
bursts of fixed length at regular intervals without the need
send. Collisions between the transmissions of different sta- to explicitly request them. This mechanism is called unsolic-
tions are avoided in that the channel has to be sensed free ited scheduling and is the preferred choice for applications
prior to transmission. The former approach is suitable for the that require a constant bit rate during the entire session.
adherence of QoS guarantees, but it suffers from an inef- The reservation may hold for the entire duration of the serv-
ficient utilization of the channel if the stations do not use the ice session, but it may be temporarily cancelled in the case
full capacity of a burst, for example, during periods of silence of inactive time periods. Furthermore, a subscriber station
in a VoIP session. The latter approach, on the other hand, can indicate additional bandwidth demand for an unsolic-
performs much better with regard to channel utilization, but ited connection if it turns out that the amount of unsent data
it is not suitable for providing a negotiated QoS, for example, exceeds a pre-defined value. In this case, the subscriber
when too many stations contend for channel access. There- station sets a so-called slip indicator bit in the MAC PDU
fore, in order to cope with the antagonism of efficiency and header, whereupon the base station allocates more band-
quality, WiMAX provides different access mechanisms for width for the respective connection.
the uplink that can be dynamically deployed under consid-
eration of QoS requirements. 5.3 Service Classes
One of these mechanisms is polling, which is depicted in
Figure 18. The base station here explicitly invites a subscrib- The different mechanisms of bandwidth request presented
er station to announce its uplink bandwidth demand for a previously are used for realizing different service classes,
particular connection. The polling request specifies the CID which differ from each other in the QoS they provide. These
of the connection the polling refers to, and it is encoded as a service classes are basically descriptions of service flows
special element of the uplink map. Upon arrival of a poll, the with a pre-configured set of QoS parameters and are sup-
subscriber station determines the number of bytes it wants ported by associated scheduling algorithms in the base sta-
to transmit in the uplink and returns this number to the base tion. The following services classes have been defined for
station by sending a bandwidth request header (see Section WiMAX:
5.1). Besides the byte number, this header also specifies the
connection the request refers to and whether the bandwidth • Unsolicited Grant Service (UGS). This service class
request is incremental or aggregated. Using an incremental has the strongest requirements on QoS mechanisms
request, the subscriber station indicates a change of band- and has been designed for supporting real-time appli-
width demand with regard to previous requests, while an cations of constant bit rate, that is, for applications that
aggregated request specifies the total amount of bytes that periodically create a certain amount of data for realtime
needs to be sent. The bandwidth request header is included transfer over the network. A typical example is VoIP
in the bandwidth request field of the uplink frame, see Fig- without silence suppression, where both periods of con-
ure 15. After the base station has received the bandwidth versation and silence are encoded and transferred with
request header, it reserves a burst of appropriate size for a constant bit rate. The bandwidth request mechanism
the next uplink frame. The parameters for uplink transmis- in the uplink used for this service class is unsolicited
sion, for example, the burst number and length, are then scheduling.
indicated to the subscriber station in the next UL-MAP sent
on the downlink. • Real-time Polling Service (rtPS). Another real-time
The polling of a subscriber station may be performed service class is the Real-time Polling Service, which in
regularly or irregularly, which depends on the base sta- contrast to UGS supports the periodic transfer of data
tion’s scheduling algorithm and the QoS parameters that packets of variable size. A typical example is MPEG-
have been negotiated for the respective service flow. Fur- compressed video, where the single frames of a video
thermore, it is distinguished between unicast and multicast/ stream are encoded depending on the data of previous
broadcast polling. In the former category, the polling refers and following frames and therefore differ in size. This
to only a single subscriber station, while multicast/broad- service class is based on the polling and piggybacking
cast polling addresses several or all subscriber stations lo- mechanisms for bandwidth request.
cated in a cell.

12 WiMAX — Worldwide Interoperability for Microwave Access


Subscriber Base rameters for a service flow, which, however, increases the
station station
complexity of configuration.

5.4 Procedures of the MAC Layer


Network entry
Regular DL transmissions This section gives an overview of the procedures taking
place between subscriber station and base station in order
1 Downlink channel to register with the network and to get assigned resources.
synchronization The different steps are depicted in Figure 19.
2 Ranging request
[Initial ranging field] Network Entry
Ranging response 3 Before a subscriber station can use any services, it must
4 Capability request
first introduce to the base station, a process that is known
as network entry. An important goal when designing WiMAX
Capability response 5 was to avoid complex and cumbersome manual configura-
tions to be made by the subscriber, as often required, for
Authentication and example, in order to get access to a WLAN system. Instead,
key exchange the subscriber should enter into contact with a WiMAX net-
6 Authentication request work in a plug-and-play fashion, that is, in a similar manner
as mobile phones register with a GSM network, for example.
Authentication response 7
Therefore, the different steps of network entry are hidden
from the subscriber as far as possible, and may only require
Registration
a pre-configuration of subscriber stations by the respective
8 Registration request
operator (to be made before they are delivered to the sub-
Registration response 9 scriber).
The first step a subscriber station has to perform for net-
10 work entry is called downlink channel synchronization (see
DHCP/Internet Time Protocol/TFTP Step (1) in Figure 19). The subscriber station scans the fre-
quency range for detecting the downlink channel of a base
station and then listens to the preamble periodically broad-
Connection Setup
cast in each downlink frame. If the subscriber station is syn-
11 Dynamic service addition request
chronized, it derives information about the organization of
DS received 12 uplink and downlink, that is, about the type of physical layer
and the used modulation and error correction schemes,
13 Authorization from the broadcast control field of the first burst.
Dynamic service addition response 14
In the next step, which is denoted as initial ranging, the
range between subscriber and base station is determined
15 Dynamic service addition ack. in order to fix a suitable transmission power and timing cor-
rections. For this purpose, the subscriber station enters the
Figure 19. MAC procedures initial ranging field of an uplink frame and sends a ranging
request message (2) with the minimum transmission power.
If no response is received from the base station within a
• Non-real-time Polling Service (nrtPS). This service certain timeout period, this message is resent with an in-
class supports typical non-real-time applications such creased transmission power. This process is repeated until
as file transfer or Internet browsing. This service class the subscriber station receives a ranging response mes-
does not necessarily need periodic transmission oppor- sage (3), which either contains corrections for transmission
tunities or a guaranteed end-to-end latency. However, power and timing or which indicates success.
in order to provide an acceptable QoS, the base station The last step of network entry is capability negotiation,
issues unicast polls on a regular basis. and it is used to inform the base station about the modula-
tion schemes, error correction schemes and rates as well
• Best Effort Service (BE). Services of this class do not as duplexing methods supported by the subscriber station.
receive any QoS guarantees at all. They are only served Upon arrival and checking of the capability request mes-
if sufficient capacity is available. Examples for such low- sage from the subscriber station (4), the base station can
priority applications are those which create a low amount accept or deny network entry in a capability response mes-
of data that may be delivered with a considerable delay, sage (5).
that is, Email, instant messaging or chat applications.
Authentication and Key Exchange
If required, it is possible to modify the QoS parameters After network entry is completed, the subscriber station must
of a services class or to determine its own set of QoS pa- authenticate towards the network, which is necessary in or-

WiMAX — Worldwide Interoperability for Microwave Access 13


der to validate the subscriber’s identity. The authentication is 6.1 Handover
based on X.509 certificates, which are issued by the manu-
facturer of the subscriber station and which are encrypted Basically, the handover process as performed in most mo-
with the subscriber’s secret key. The certificate is passed to bile networks can be subdivided into the three following
the network (6) and is decrypted there with the subscriber’s phases: measurements, decision and execution. In Mobile
public key. If the validation is successful, the base station WiMAX, all of them are initialized by the subscriber station,
sends an authentication response (7), which contains an but supported by the base stations involved in the handover
authorization key for ciphering subsequent messages. This procedure, that is, the serving base station and possible tar-
authorization key is encrypted with the subscriber’s public get base stations.
key and can only be decrypted with her secret key at the As stated in Section 2.1, Mobile WiMAX supports hard
subscriber station. as well as soft handover. The three handover phases for
both types are explained in the following.
Registration and IP Connectivity
The subscriber station can now register with the network Hard Handover
and be configured for IP operation. Upon sending a registra- A hard handover is characterized by the fact that the con-
tion request message (8), it receives information about the nection to the serving base station is released before an-
used IP version, supported protocols for retransmission of other one is established to the new base station ("break-
erroneous data (Automatic Repeat Request, ARQ) and oth- before-make").
er capabilities needed for medium access (9). Finally, fur- Measurements are made by the subscriber station and
ther operations are executed for IP connectivity (10), among refer to observing the signal-to-noise ratio (SNR) of down-
them the allocation of an IP address by using the Dynamic link transmissions from the serving base station as well as
Host Configuration Protocol (DHCP), the exchange of cur- from possible target base stations. The SNR expresses the
rent date and time via the Internet Time Protocol and the ratio between the reception power of the intended signal
download of operational parameters by using the Trivial File and that of other interferences. If the SNR of the serving
Transfer Protocol (TFTP). base station gets low, the error rates increase, and a hando-
ver to another base station should be performed.
Connection Setup In order to measure the SNR of possible target base
After a subscriber station is known to the network, service stations, the measuring subscriber station must be aware of
flows can be established in both directions, for which a se- their existence and the configuration of the associated radio
ries of management messages is exchanged. The service channels. Therefore, the serving base station periodically
flows may be initiated by the subscriber station or by the
base station. In the former case, which is shown in Figure Subscriber Serving Target #1
station base station Target #2
19, the subscriber station sends a request message to the
base station (11), which addresses the convergence sub-
layer the service flow refers to (that is, IP or ATM) and which
contains the desired QoS parameters. After reception of this
message, the base station acknowledges its reception (12)
and checks whether the requesting subscriber is allowed at Network topology advertisement 1
all to request service flows with the specified QoS configu-
ration (13). If this check is successful, this is indicated to the
2 Scanning request
subscriber station by sending another message (14). The
connection setup is completed if the subscriber station then Scanning response 3
acknowledges this message (15).
In addition to this setup procedure, an existing service
flow can be reconfigured (regarding its QoS parameters) or 4 Regular downlink transmissions
deleted, for which similar procedures exist. Also, it is pos- Scanning
interval Regular downlink transmissions
sible to establish several service flows in parallel.

6 Mobility Support 5 Handover request


6
Capacity & QoS
This section gives an overview of functions for mobility sup- 8 checks
port in Mobile WiMAX systems. The focus is on the different Handover response 7
types of handover, modes for power saving, procedures of
location management and a reference model for a WiMAX
9 Network entry, registration, ...
network architecture.

Figure 20. Hard handover

14 WiMAX — Worldwide Interoperability for Microwave Access


broadcasts a so-called network-topology-advertisement then (9) and for this purpose executes network entry, regis-
message, which contains a list of all neighbouring base sta- tration and all following steps as explained in Section 5.4.
tions together with their configuration, see Step (1) in Figure
20. Basically, this configuration is an aggregation of the DCD Soft Handover
and UCD fields broadcast by the respective base stations in During a soft handover, the subscriber station maintains
their downlink frames. After analyzing the network-topology- several connections to different base stations simultane-
advertisement message, the subscriber can switch between ously ("make-before-break"), see Figure 21. Measurements
different neighbouring base stations and obtain the SNRs of are performed in the same manner as for the hard hando-
their downlink transmissions. ver during scanning intervals, see Step (1)-(4) in Figure 20.
However, for listening to the transmissions of neighbour- However, handover decision and execution are handled dif-
ing base stations, the subscriber station must interrupt the ferently.
reception of the serving base station. For this purpose, it The base stations a subscriber station is connected to
requests the serving base station for the assignment of a are managed in its active set. At the beginning, the active
so-called scanning interval (2). During this interval, trans- set only contains the base station the subscriber station has
missions to and from the requesting subscriber station are initially registered with, which is called anchor base station.
interrupted. The beginning and length of the scanning in- The active set can be extended if the subscriber station
terval are returned in a scanning-response message to the measures an SNR from another base station that exceeds a
subscriber station (3), whereupon it starts the scanning of pre-defined threshold value. If this happens, the subscriber
neighbouring base stations (4). station requests the anchor base station for updating the
After the scanning is complete, the subscriber station active set, which can be accepted or denied depending on
compares the measured SNRs with the SNR of the serving similar capacity checks as performed for the hard handover,
base station and decides whether or not a handover is nec- see Step (6) in Figure 20. Analogously, a base station can
essary. This decision process also includes the identification be removed from the active set if its SNR falls below an-
of potential target base stations, which are also selected other threshold value. Furthermore, if the SNR of the anchor
under consideration of the transmission quality experienced base station is lower than that of another base station for a
during the scanning interval. However, this decision cannot certain period of time, the subscriber station can request to
be made by the subscriber station solely. The list of potential change the anchor.
target base stations must first be sent to the serving base Maintaining connections to several base stations simul-
station (5), which then checks whether the identified base taneously means that the subscriber station receives the
stations have enough capacity at all to serve the subscriber same data for several times over different paths. In order to
station and to maintain the QoS parameters of its service improve the reception quality, all signals are combined to
flows (6). After the results of this check are available, the an aggregated signal, which usually shows a much better
serving base station returns the list of remaining target base SNR when compared to that of a single signal. This feature
stations or proposes new ones (7). If the subscriber station is called macro diversity and is also implemented in UMTS
does not accept one of the chosen base stations, it returns networks. In the uplink, the signals of the subscriber station
a negative acknowledgement. This negotiation process can are received by all base stations of the active set. Instead
then be repeated for several times until a suitable target of summing up the signals, only that with the best quality
base station is determined (8). is selected and further processed, which is called selective
If the subscriber station does not return a negative ac- diversity.
knowledgement within a specified time period, the serving Making soft handovers possible is a difficult task and
base station acts on the assumption that the subscriber sta- requires a careful design and planning of WiMAX networks
tion has switched to one of the proposed target base sta- as well as complex and sophisticated coordinations during
tions and releases all connections. The subscriber station, their operation. The realization of macro and selective diver-
on the other hand, registers with the new target base station sity makes it necessary that neighbouring base stations op-
erate at the same frequencies and follow the same structure
of data bursts within the transmission frames. Furthermore,
in order to avoid interferences, the frames must be exactly
synchronized in time, for which GPS receivers mounted at

Ready for reception/ Suspended


Standby
transmission Paging + Location Update
Handover
Handover

Active Sleep Idle


mode mode mode

Figure 21. Multiple connections to different base stations Figure 22. Power saving modes
during soft handover

WiMAX — Worldwide Interoperability for Microwave Access 15


the base stations deliver a common time basis. Finally, there ing a handover, the idle mode uses classical mechanisms
is additional management overhead, for example, the coor- known from the location management of cellular networks
dination of uplink and downlink maps and the assignment of like GSM. These mechanism enable to locate a subscriber
common CIDs and SFIDs, to name only a few. station within the topology of a network, or, strictly speak-
ing, to determine the access network and base station a
6.2 Power Saving subscriber is currently connected to.
Location management in Mobile WiMAX is based on
A typical problem of mobile devices is the lack of sufficient paging areas, which comprise the coverage areas of sev-
battery resources, and that is why for Mobile WiMAX new eral base stations. The different paging areas may overlap,
operational modes are defined, see Figure 22. These are that is, a single base station may be assigned to different
called sleep and idle mode and consume considerably less paging areas. In idle mode, a subscriber's location is known
power than the conventional active mode. to the network only with the granularity of paging areas. The
A subscriber station turns from the active into the sleep serving base station is not known. Therefore, if network-initi-
mode if no data is to be sent in the various service flows it ated traffic needs to be delivered, the serving base station
maintains with the base station. This may happen, for exam- of the target subscriber must be determined, which is done
ple, if a service flow is used for transferring web pages, and via paging. It is realized by broadcasting the subscriber sta-
the subscriber remains on a certain web page over a longer tion's identifier during the paging intervals of the idle mode
period of time before requesting the next one. The sleep (see last section). Paging is performed by all base stations
mode is characterized by alternating listening and sleep pe- that belong to the paging area the subscriber is registered
riods. In a sleep period, the subscriber station is deactivated with. Upon recognizing that it is paged, the subscriber sta-
and does neither monitor the downlink transmission frames tion returns to the active mode and re-registers with its serv-
from the base station nor does it transmit in the uplink. From ing base station. In this way, the serving base station has
time to time, however, the subscriber station changes into been determined and the data can be routed over this base
a listening period in order to check whether data from the station for transmission to the subscriber.
network has arrived. If so, it then returns to the active mode. The advantage of this concept is that a handover is not
If data arrive from the network during the sleep periods, the necessary, and the subscriber stations only need to inform
base station has to buffer it until the next listening period the network when crossing the boundaries of the paging
occurs. The start and length of sleep and listening periods area, which is denoted as location update. For this purpose,
are negotiated between subscriber station and base station each base station broadcasts in the paging interval the
before starting into the sleep mode. identifiers of the paging areas it belongs to. If a subscriber
In the idle mode, the subscriber station is suspended station recognizes that it receives the identifier of another
from the network, but remains available for the case that paging area than in the previous paging interval, it has obvi-
network-initiated data is to be delivered, for example, an ously entered another paging area and issues a location
incoming VoIP session or push email. The subscriber sta- update. This location update contains the identifier of the
tion does neither transmit nor receive, similar to the sleep paging area and the subscriber station's identity, both of
periods in the sleep mode, and hence saves its power re- which are stored in the databases of the network and used
sources. It only awakens for listening to so-called paging in- for paging. In addition to the location update on crossing
tervals, during which it is informed about incoming data and the boundaries of a paging area, subscriber stations issue
other procedures of the location management, which will location updates on a periodic basis or on request by the
be described in the next section. The idle periods between network.
two paging intervals can alternatively be used for scanning
neighbouring base stations if the transmissions in the pag-
Network Visited Home
ing intervals from the serving base station get too weak. Access Network Network
Service Service
Provider
Provider Provider
6.3 Location Management
R2

A subscriber station being in active or sleep mode always R2

performs a handover when it leaves the coverage area of Access Connectivity Connectivity
Subscriber Service Service Service
the serving base station. However, as demonstrated in Sec- Station Network Network Network
R1 R3 R5
tion 6.1, performing a handover goes along with a complex
sequence of control information exchanged between sub-
R4
scriber and base station, which significantly burdens the
air interface as well the battery resources of the subscriber
Application Application
station. Therefore, handovers are not performed when the Service Service
Anderes
subscriber station is in idle mode. However, in this case it ASN Provider Provider
or or
must still be available for network-initiated traffic, even if the Internet Internet
Control data
subscriber moves around and leaves the coverage area User data
of the serving base station. While in the other modes, the
change to another base station is recognized when perform- Figure 23. WiMAX Network Reference Model

16 WiMAX — Worldwide Interoperability for Microwave Access


Access Service Network resource management.
The CSN of a V-NSP and H-NSP respectively provides
Base
R6
ASN
connectivity services to other public and non-public net-
Station Gateway works, offers high-level services, for example, multimedia
R1
and location-based services, and manages subscriber data.
R6
R8 R4 R3 Furthermore, it centrally coordinates the assignment of IP
addresses to subscriber stations and provides mobility sup-
Base
R6
ASN port for subscribers moving between different ASNs. Finally,
R1
Station Gateway it is also responsible for accounting and charging subscrib-
ers for the usage of services.
R4 The separation between the CSNs of H-NSP and V-NSP
has been arranged to support roaming subscribers in a sim-
Figure 24. Components of the Access Service Network ilar manner as known from GSM networks. Subscribers reg-
istering with a V-NSP do not need to maintain a dedicated
6.4 WiMAX System Architecture subscription with that provider. Instead, the V-NSP accounts
the H-NSP for all services the subscriber has accessed.
Initially, WiMAX was planned as access technology that
simply connects subscriber stations to a network. However,
the migration towards a system with full mobility support re- 7 Conclusion
quires additional components for realizing and supporting
mobility-related procedures like handover, location man- WiMAX belongs to the class of wireless Metropolitan Area
agement, roaming as well as authentication, authorization, Networks and provides access to fixed, nomadic and mobile
accounting (AAA). A system with standalone base stations, subscribers. While Fixed and Nomadic WiMAX represent
as it might be sufficient for Fixed or Nomadic WiMAX, is not an interesting alternative to wired access technologies like
sustainable and cannot fulfil the demands of the functions DSL and cable modem, the role of Mobile WiMAX in the
mentioned before. Instead, base stations must be connected area of other mobile networks is unclear so far. From a to-
among each other as well as to other components such as day's perspective, Mobile WiMAX bridges the gap between
databases or gateways. The WiMAX forum has recognized WLAN, which realizes high data rates but almost no mobility
these demands and released an architecture for WiMAX support, and cellular networks like GSM and UMTS, which
End-to-End Network Systems in December 2005 [4]. provide world-wide coverage but suffer from low data rates
Figure 23 gives a rough overview of the WiMAX Network and capacity shortages. In the long-term, however, Mobile
Reference Model (NRM), which is a logical representation of WiMAX and cellular systems might merge into what is today
this architecture. It incorporates the four administrative do- referred to as 4G networks, which are characterized by the
mains of the Subscriber, Network Access Provider (NAP), coexistence of heterogeneous radio technologies, for exam-
Visited Network Service Provider (V-NSP) and Home Net- ple, UMTS, WLAN and WiMAX, operated under a common
work Service Provider (H-NSP). The different domains are core network. Alternatively, WiMAX networks as defined by
interconnected by reference points, which are an abstract the NRM might be realized by a homogenous approach and
representation of communication links, interfaces, protocols then provide interoperability with GSM, UMTS or other wire-
and transactions that are needed to exchange control data less systems.
(represented by the dotted line in Figure 23) or user data This white paper could give only a rough overview of
(represented by the solid line). The NRM describes an All- WiMAX. A detailled description can be found in [5] and [6].
IP network, that is, all reference points depicted in the figure
are realized on top of the Internet protocol. This approach References
is very similar to what is envisaged for the next releases of
UMTS networks. [1] WiMAX Forum, Web Site, http://www.wimaxforum.org/
A subscriber station is connected to an Access Service [2] IEEE Standard for Local and Metropolitan Area Networks; Part
16: Air Interface for Fixed Broadband Wireless Access Sys-
Network (ASN) of the NAP, which consists of several base
tems, IEEE 802.16-2004, New York, October 2004
stations and Access Service Network Gateways (ASN-GW).
[3] IEEE Standard for Local and Metropolitan Area Networks; Part
The reference point R1 describing that connection compris- 16: Air Interface for Fixed and Mobile Broadband Wireless Ac-
es all functions of the physical and medium access layer cess Systems, Amendment for Physical and Medium Access
described in the last sections. As depicted in Figure 24, the Control Layers for Combined Fixed and Mobile Operation in
base stations of an ASN are connected among each other Licensed Bands, IEEE 802.16e-2005, New York, February
2006
via reference point R6, for example, in order to exchange
[4] WiMAX Forum; Mobile WiMAX — Part 1: A Technical Overview
control information needed for handover support. The ASN- and Performance Evaluation, February 2006
GW provides typical bridging and routing functions and [5] Johannes Maucher and Jörg Furrer; WiMAX — Der IEEE-
transfer user data between base stations and the Connec- 802.16-Standard: Technik, Anwendung, Potential, Heise
tivity Service Network (CSN), which is operated by the V- Zeitschriften Verlag, November 2006
NSP or H-NSP, and vice versa. In addition, it controls and [6] Loutfi Nuaymi; WiMAX: Technology for Broadband Wireless
manages the load of base stations, which is part of the radio Access, John Wiley & Sons, January 2007

WiMAX — Worldwide Interoperability for Microwave Access 17


http://www.samsungmobile.com/
Samsung Telecommunication Europe
Samsung House • Am Kronberger Hang 6 • 65824 Schwalbach/Ts. • Deutschland/Germany

Vous aimerez peut-être aussi