Académique Documents
Professionnel Documents
Culture Documents
WiMAX is a wireless access technology for building networks with large coverage areas and high data rates,
so-called Metropolitan Area Networks (MANs). It focuses on various usage scenarios for serving fixed, no-
madic and mobile subscribers and incorporates a broad range of transmission and access technologies, which
can be dynamically applied for serving these different types of subscribers. In addition, it provides mechanisms
for giving Quality-of-Service (QoS) guarantees, and thus it is predestined for enabling real-time services like
Voice over IP (VoIP), video on demand or multiplayer gaming.
Base station
Handover
Subscriber station
NLoS
Subscriber
station
networks operating under real conditions. a so-called hard handover. This type of handover is charac-
Both Fixed and Nomadic WiMAX can be operated in terized by the fact that the connection to the serving base
two modes, which are referred to as point-to-point (PTP) station is terminated before a new one to another target
and point-to-multipoint (PMP) modes. In the former, a base base station is initialized (“break-before-make”). As a result,
station serves only a single subscriber station, which can the customer experiences a short degradation in the quality
exclusively use the entire bandwidth of the radio channel. of service, that is, an interruption of the data transfer, until
In PMP, on the other hand, a base station supplies several the handover is completed. The mobile access mode, on
subscriber stations at once, and hence the available band- the other hand, has been designed for supporting custom-
width must be shared among all subscribers residing in the ers travelling at velocities of up to 125 km/h. It implements
particular cell. The PTP mode is primarily intended for Fixed a soft-handover, where the connection to the target base
WiMAX, while PMP is the preferred choice for nomadic ac- station is established before the old connection is released
cess. (“make-before-break”). A soft handover happens seamless-
In June 2004, standardization activities for Fixed and ly from the point of view of the customer and has a much
Nomadic WiMAX were merged. The resulting standard lower latency than a hard handover. However, this reduced
document is called IEEE 802.16-2004 [2] and replaces latency must be paid by a much higher complexity in the
the former versions IEEE 802.16 and 802.16a. Frequency hardware.
licensing and first commercial trials for WiMAX in many Besides these handover mechanisms, Mobile WiMAX
countries started in 2005, while related products and serv- includes location management functions, which enable to
ices for the mass market have been announced to become determine from the set of all base stations a WiMAX net-
available in 2007. Starting from this time, it is expected that work is made up of the base station the target subscriber
Fixed and Nomadic WiMAX will be requested especially by is currently attached to and which are necessary whenever
customers residing in rural areas, which often suffer from network-initiated data, for example, incoming Emails, needs
the unavailability of wired broadband technologies like DSL, to be pushed to a subscriber. Furthermore, Mobile WiMAX
cable modem or T1 access. defines different power-saving modes to which the device
changes if there is no data transmission in progress and
2.3 Mobile WiMAX which thus contribute to a significant reduction of battery
consumption when compared to devices used for fixed or
A drawback of Nomadic WiMAX is that a service session nomadic access. Finally, as data transmission in mobile net-
can only be maintained as long as the subscriber resides works is always exposed to varying radio propagation con-
in the coverage area of the base station where this session ditions, Mobile WiMAX comes up with improved modulation
has been initiated. If the subscriber moves from one cover- and error correction schemes.
age area to that of another base station, the session is ter- The specification for Mobile WiMAX has been released
minated and must be re-initiated at the new base station. An as an amendment to the 802.16-2004 standard, and is
automatic transfer of the session from the serving to another called IEEE 802.16e [3]. It emerged from the Korean WiBro
target base station, a process which is called handover, is (Wireless Broadband) technology, which is being developed
not possible in Fixed or Nomadic WiMAX systems. since the beginning of the millennium by the Korean tele-
The missing support of mobile subscribers has led to communications industry under significant participation of
initiatives for creating Mobile WiMAX, which, besides vari- Samsung Electronics. Since 2004, WiBro is being standard-
ous handover mechanisms, also incorporates other mobil- ized by the Korean Telecommunications Technology Associ-
ity functions (see also Figure 3). Mobile WiMAX envisages ation (TTA), and first WiBro networks went into operation in
two access modes, which are called portable and mobile 2005. In November 2004, it was decided to adopt the WiBro
access. The portable access mode serves customers trav- technologies for Mobile WiMAX and to keep both systems
elling at pedestrian speeds. When changing the cell, the compatible to each other.
service session is transferred to the target base station by
{
Network layer (e.g., IP)
phase. For data transmission, one or several of these pa-
MAC convergence sub-layer rameters are changed depending on the data to be trans-
mitted, which, as mentioned before, is called modulation or,
MAC common part
using an alternative term, shift keying. The resulting signal
WiMAX MAC privacy sub-layer is then emitted by the antenna connected to the transmit-
Medium access layer (MAC) ter, propagates in the environment, and is finally caught by
another antenna, which is connected to a receiver. This re-
Physical layer (PHY) ceiver then interprets the incoming signal and recovers the
data bits originally sent, which is called demodulation.
Figure 5. WiMAX Protocol Stack In each modulation scheme, data bits are represented in
form of symbols, and each symbol is given by a certain con-
stellation of the carrier’s amplitude, frequency, and phase,
stations use the same radio resources at the same time. the so-called signal state. WiMAX envisages different vari-
Another important focus is on control mechanisms for guar- ants of phase shift keying. The simplest variant is Binary
anteeing a certain performance of data transmission, which Phase Shift Keying (BPSK) and modulates data by shifting
is referred to as Quality of Service (QoS). This performance the carrier phase between two signal states, one represent-
can be described by several parameters, among them data ing the binary “1” and the other the binary “0”. Thus, each
rate, delay, jitter (variation in delay) and error rates. Different symbol only carries a single bit. For transferring more bits
applications, for example, multimedia streaming, VoIP and per symbol, one needs a modulation scheme that defines
web browsing, impose different requirements on QoS, and more signal states. Quadrature Phase Shift Keying (QPSK)
WiMAX provides adequate mechanisms to fulfil them. fixes four signal states and thus represents two bits by one
As can be derived from Figure 5, the common part of symbol. The modulation of a carrier with QPSK is demon-
the medium access layer is supplemented by two sub-lay- strated in Figure 6. The four symbols “00”, “01”, “11”, and
ers, referred to as MAC privacy sub-layer and MAC con- “10” are assigned to the carrier phases 45°, 135°, 225°,
vergence sub-layer. The former provides the usual security and 315°. The number of bits per symbol can be further
mechanisms needed for the authentication of subscribers, increased by changing the signal’s amplitude in addition,
the exchange of key and the ciphering of messages. The which is called Quadrature Amplitude Modulation (QAM).
convergence sub-layer acts as an interface between exter- WiMAX supports 16, 64 and 256-ary QAM (16-QAM, 64-
nal non-WiMAX protocols and the WiMAX medium access QAM, 256-QAM), which represent 4, 6 and 8 bits by one
layer. Its main task is the encapsulation and decapsulation symbol. Figure 7 shows the signal states of 64-QAM.
of external Protocol Data Units (PDUs) into and from so- Of particular concern is the symbol rate, which denotes
called Service Delivery Units (SDUs), which are exchanged the number of symbols transmitted per second. The symbol
between subscriber and base station. The convergence rate is an important measure for the bandwidth the signal
sub-layer is also responsible for bandwidth allocation and adopts in the frequency domain. The higher the symbol
the adherence of negotiated QoS parameters. Two specific rate, the more bandwidth is required and vice versa. The
convergence sub-layers so far exist, one for carrying data of data rate is the product of symbol rate and bits carried per
packet-switched networks like IPv4 or IPv6 and another one symbol. For increasing the data rate, either the symbol rate
for connecting to networks being operated according to the must be increased or the number of bits per symbol must be
Asynchronous Transfer Mode (ATM). increased by using another modulation scheme. The former
spreads the bandwidth of the radio channel, while the latter
makes the signal more susceptible to interferences. This is
4 WiMAX Physical Layer due to the fact that with an increasing number of symbols the
signal states need to be spaced closer and closer together,
This section highlights the physical layer and gives an over- and hence even small interferences during the propagation
view of modulation schemes, antennas, error correction may result in misinterpretations of the incoming signal at
schemes and frame formats used for WiMAX. the receiver.
(a) Delay spread without intersymbol interferences (b) Delay spread with intersymbol interference
Figure 9. Delay spread and intersymbol interference
above each sub-carrier. These side lobes do not carry any has also advantages regarding power control and battery
useful information that is needed for interpreting the incom- consumption. For example, base stations can increase the
ing signal at the receiver, but they can distort the transmis- transmit power on sub-channels serving indoor subscriber
sion in neighbouring sub-carriers. An important concern stations, and decrease it for subscriber stations staying
when using multi carrier modulation is therefore to select an outdoors or in the close surrounding of the base station.
appropriate frequency space between the sub-carriers. For Subscriber stations, on the other hand, may concentrate
this purpose, the sub-carriers are placed orthogonal to each transmit power in a few sub-carriers by OFDMA, thereby
other in the frequency domain, a technique that is called Or- saving valuable battery resources, which is especially of ad-
thogonal Frequency Division Multiplexing (OFDM). A pair of vantage for small, mobile devices with integrated subscriber
sub-carriers is said to be orthogonal if the frequency space station as intended for Mobile WiMAX.
between them is given by 1/Ts Hz, where Ts represents the The physical layers envisaged for Nomadic and Mobile
symbol duration on each sub-carrier. As depicted in Figure WiMAX incorporate different variants of OFDM and OFD-
10, the advantage of orthogonality is that the peak of a sub- MA respectively. In WirelessMAN-OFDM, the radio channel
carrier’s main lobe corresponds to the zero crossings of the is subdivided into 256 sub-carriers, each of which can be
neighbouring sub-carriers. In this way, out-of-band radiation modulated with QPSK, 16-QAM or 64-QAM. The channel
in the side lobes neutralize each other, and the transmission can adopt different bandwidths between 1,75 and 20 MHz.
in a sub-carrier have no negative impacts on its neighbour- From the 256 sub-carriers, only 192 carry user data. The re-
ing sub-carriers. Furthermore, OFDM allows the overlap- maining ones are needed for frequency synchronization (pi-
ping of the main lobes of neighbouring sub-carriers, and lot sub-carriers) or as guard bands (NULL sub-carriers) for
hence they can be arranged very close together, which is avoiding neighbour channel interferences that result from
very bandwidth efficient when compared to a non-orthogo- side lobes of adjacent radio channels. Sub-channelization
nal multi carrier modulation. is only applied on an optional basis for transmissions in the
In WiMAX, OFDM has been extended with a feature uplink. WirelessMAN-OFDMA, on the other hand, subdi-
called sub-channelization, see Figure 11. The OFDM radio vides the radio channel into 2048 sub-carriers. Thus, the
channel is subdivided into several sub-channels, and each symbol duration on each sub-carrier is much longer here
sub-channel, in turn, is composed of several sub-carriers. than in WirelessMAN-OFDM, and hence the signals are
Instead of using all sub-carriers the radio channel consists less susceptible to intersymbol interferences. In contrast to
of, a transmitter may send on only one or several select- WirelessMAN-OFDM, sub-channelization is mandatory for
ed sub-channels. In this way, multiple users can share the both directions. It can be used in different configurations
same OFDM channel simultaneously. Therefore, sub-chan- that differ from each other regarding the fragmentation of
nelization in OFDM is basically a multiple access scheme, the OFDM radio channel into sub-channels.
and therefore this variant of OFDM is called Orthogonal Mobile WiMAX adopts the WirelessMAN-OFDMA physi-
Frequency Division Multiple Access (OFDMA). OFDMA cal layer, but introduces a new feature that is called Scal-
Side lobes
Bandwidth
Preamble
DL DL DL
be explained later.
request
UL UL UL
ranging
Initial
FCH
RTG
TTG
Burst Burst Burst Burst Burst Burst
#1 #2 #n #1 #2 #n The broadcast fields (in the downlink) and the fields
for initial ranging and bandwidth request (in the uplink) are
followed by data bursts for individual transmissions to and
Broad- MAC MAC MAC
cast PDUs PDU #1 PDU #n
from subscriber stations. A data burst is of variable length
and carriers the protocol data units of the medium access
layer (MAC PDU). The assignment of data bursts to sub-
DL UL
DCD UCD
MAC MAC
CRC scriber stations is part of the medium access layer and is
MAP MAP Header Payload
executed by the base station under consideration of QoS
Figure 15. TDD frame format requirements.
For each data burst, another configuration of modulation
parallel transmission and constitute an entire frame with a scheme and error coding rate can be used, which is speci-
maximum length of 20 ms. Furthermore, there is no need in fied in the DL-MAP and UL-MAP fields of the frame. The
the FDD mode to separate consecutive frames by TTG and configuration can be dynamically selected under considera-
RTG respectively. The following descriptions refer to both tion of the capabilities of the subscriber station, the required
TDD and FDD. data rates and the expected robustness of transmission. For
Because the WiMAX physical layers provide several example, subscriber stations located close-by to the base
options, for example, regarding modulation schemes or station may be served by 64-QAM, which provides high
error coding rates, it is necessary to inform all subscriber data rates but which is very susceptible to interferences,
stations in a radio cell about the configuration of the radio while for subscriber stations located farther away the more
channel. For this purpose, the serving base station broad- robust QPSK modulation may be preferred. This is demon-
casts control information at the beginning of each frame, strated for the downlink in Figure 16. However, the usage of
which is received by all subscriber stations connected to different modulation schemes imposes certain constraints
that base station. The broadcast is constituted by a pream- regarding the ordering of bursts within a frame. A particular
ble, a so-called frame control header (FCH) and the first concern is that a subscriber station that wants to transmit
data burst, see Figure 15. Modulation and coding of these in (or receive) a burst has to detect the end of the previ-
fields are standardized in order to make them interpretable ous burst assigned to another subscriber station. This can
for all subscriber stations being in the process of network only be guaranteed if for the previous burst either the same
entry, which will be explained below. modulation scheme is used or another one that is more ro-
The preamble indicates the beginning of a frame and bust against interferences. In Figure 15, SS#1 is located far-
enables the synchronization of subscriber stations to the thest away from the base station and is served with a QPSK
transmissions of the base station. It always has a length of modulation in the first burst. SS#2, on the other hand, is
two OFDM symbols of a fixed radio pattern and is modulat- closer by and receives in the second burst modulated with
ed with QPSK. The preamble is followed by the FCH field, the less robust 16-QAM. It can easily detect the end of the
which carries the so-called burst profile of the first downlink first burst, because QPSK is more robust than 16-QAM. If,
burst. This burst profile indicates the modulation scheme however, the order of the two bursts would be exchanged,
and code rate used in the first burst. The FCH field consists SS#1 could hardly detect the end of the first burst, because
of only one OFDM symbol and is modulated with BPSK. it is located out of the range where 16-QAM modulated sig-
The first burst then carries a so-called broadcast control nals can be reliably received. Therefore, the bursts within
field, which is composed of further fields denoted as DL- a frame must always be arranged in decreasing order with
MAP, UL-MAP, Downlink Channel Descriptor (DCD) and
Uplink Channel Descriptor (UCD). DL-MAP and UL-MAP Decreasing robustness of modulation
indicate the positions of all downlink and uplink bursts within
Preamble
the corresponding subframes as well as their burst profiles. Downlink SS #1 SS#2 SS#3 SS#4
FCH
(Multicast/Broadcast burst)
UL-MAP
DL Burst #5
Preamble
data packets, which are filled into the payload field by the
DL-MAP
UL Burst #2
DL Burst #1 convergence sub-layer.
DL Burst #5
regard to the robustness of the used modulation schemes. 5.2 Service Flows and MAC Connections
Finally, Figure 17 shows a possible appearance of down-
link and uplink frames for the case that OFDMA is used. The medium access layer of WiMAX organizes the ex-
The different data bursts are not only separated in the time change of data between subscriber and base station by
domain here. They can also be transmitted simultaneously the concept of service flows. A service flow is always uni-
assuming that they adopt different sub-channels, which are directional, that is, it is defined either for uplink or downlink
composed of the several sub-carriers built by the multi car- direction. It is represented by a unique Service Flow Identi-
rier modulation. fier (SFID) and characterized by a set of QoS parameters,
for example, data rate, latency and jitter. The requirements
5 WiMAX Medium Access Layer of different applications on these parameters are very het-
erogeneous. For example, VoIP without silence suppression
If a base station operates in the point-to-multipoint mode demands for a constant bit rate and a guaranteed maximum
(see Section 2.2), subscriber stations located within its cov- latency and jitter, while a simple file transfer only requires
erage area compete against each other for access to the ra- a minimum data rate, but no guarantees regarding other
dio channel. This access is coordinated by the base station QoS parameters. Each service flow is realized by a MAC
and belongs to the main tasks of the medium access layer. connection, which is referenced by a Connection Identifier
The primary focus of medium access on the one hand is to (CID) and which is constituted by a series of data bursts
avoid collisions, which would occur if two or more subscrib- allocated by the base station in the different transmission
er stations would enter the same radio channel (or some of frames. This allocation has to be organized in a way that the
its sub-carriers if OFDMA is applied) simultaneously and, QoS requirements of the service flow the connection carries
on the other, to guarantee the access in a way that QoS re- are fulfilled. This process represents the core mechanism
quirements are met. Besides this, the medium access layer of medium access. It is called scheduling and is based on
also provides related functions, for example, authentication sophisticated algorithms.
and ciphering as well as error correction and radio link con- The allocation of data bursts has to be considered for
trol. The following sub-sections provide a short overview of downlink and uplink direction differently. For the downlink,
the most important procedures of medium access. the allocation is comparatively simple, because the base
station is the only sender in this direction. The data of an
5.1 MAC Protocol Data Units external network, for example, the Internet, arrives at the
base station and is there assigned to the service flow that
Data is transferred via protocol data units (PDUs) of the is maintained between the base station and the subscriber
MAC layer, which, in turn, are included into the data bursts station the data is intended for. The scheduling algorithm of
provided by the physical layer. There may be several MAC the base station then identifies one or several bursts within
PDUs per data burst. The PDUs carry user data, control and one or several frames for data transmission.
management information as well as bandwidth requests In the uplink, the medium access is much more com-
issued by the subscriber stations to announce their band- plicated, because it has to be coordinated among all sub-
width requirements for uplink transmission. Apart from the scriber stations within a cell. In classical mobile networks,
bandwidth request, which only consists of a single header, for example, GSM, the problem of assigning transmission
a PDU contains a header field, a payload field and another capacity to mobile stations is often solved by reserving a
field for error detection, see also Figure 15. burst of fixed length in each frame and for each active sta-
The header is of fixed length and carries control infor- tion. In other wireless system, for example, WLAN, access
mation, for example, the identifier of the connection (see to the radio channel is not centrally coordinated. Instead,
description below), whether or not encryption and error de- the stations enter the channel whenever they have data to
Figure 21. Multiple connections to different base stations Figure 22. Power saving modes
during soft handover
performs a handover when it leaves the coverage area of Access Connectivity Connectivity
Subscriber Service Service Service
the serving base station. However, as demonstrated in Sec- Station Network Network Network
R1 R3 R5
tion 6.1, performing a handover goes along with a complex
sequence of control information exchanged between sub-
R4
scriber and base station, which significantly burdens the
air interface as well the battery resources of the subscriber
Application Application
station. Therefore, handovers are not performed when the Service Service
Anderes
subscriber station is in idle mode. However, in this case it ASN Provider Provider
or or
must still be available for network-initiated traffic, even if the Internet Internet
Control data
subscriber moves around and leaves the coverage area User data
of the serving base station. While in the other modes, the
change to another base station is recognized when perform- Figure 23. WiMAX Network Reference Model