Professional Documents
Culture Documents
9-16-05 Karim Hassib - WiMAX
9-16-05 Karim Hassib - WiMAX
Outline
What is WiMAX 802.16 Introduction 802.16 MAC Highlights 802.16 Reference Model MAC Convergence Sub-Layer (CS) MAC Common Part Sub-Layer (CPS) MAC Privacy Sub-Layer (PS) Questions
What is WiMAX?
Worldwide Interoperability for Microwave Access (WiMAX) is the common name associated to the IEEE 802.16a/REVd/e standards. These standards are issued by the IEEE 802.16 subgroup that originally covered the Wireless Local Loop technologies with radio spectrum from 10 to 66 GHz.
Air Interface for Fixed Broadband Wireless Access System MAC and PHY Specifications for 10 66 GHZ (LoS) One PHY: Single Carrier Connection-oriented, TDM/TDMA MAC, QoS, Privacy
Amendment to 802.16, MAC Modifications and Additional PHY Specifications for 2 11 GHz (NLoS) Three PHYs: OFDM, OFDMA, Single Carrier Additional MAC functions: OFDM and OFDMA PHY support, Mesh topology support, ARQ
Combines both IEEE 802.16 and 802.16a Some modifications to the MAC and PHY
Source: WiMAX, making ubiquitous high-speed data services a reality, White Paper, Alcatel.
WirelessMAN: Point-to-Multipoint and optional mesh topology Connection-oriented Multiple Access: DL TDM & TDMA, UL TDMA;UL OFDMA & TDMA, DL OFDMA & TDMA (Optional) PHY considerations that affect the MAC
Protocol-independent core (ATM, IP, Ethernet) Flexible QoS offering (CBR, rt-VBR, nrt-VBR, BE) Strong security support
Duplex: TDD, FDD, FDX FDD BS and SS, HDX FDD SS Adaptive burst profiles (Modulation and FEC) on both DL and UL
Reference Model
Adaptive PHY
Source: Understanding WiMAX and 3G for Portable/Mobile Broadband Wireless, Technical White Paper, Intel.
Burst profile: Modulation and FEC On DL, multiple SSs can associate the same DL burst On UL, SS transmits in an given time slot with a specific burst Dynamically assigned according to link conditions
The duplex scheme is Usually specified by regulatory bodies, e.g., FCC Time-Division Duplex (TDD)
Downlink & Uplink time share the same RF channel Dynamic asymmetry does not transmit & receive simultaneously (low cost) Downlink & Uplink on separate RF channels Full Duplexing (FDX): can Tx and Rx simultaneously; Half-duplexing (HDX) SSs supported (low cost)
DL Subframe
DL TDM pre. FCH DL DL burst 1 burst 2
UL subframe
UL TDMA
...
DL burst n
pre.
UL burst 1
...
pre.
UL burst m
DL MAP
UL MAP
DCD opt.
UCD opt.
DL Subframe
DL TDM pre.
Broadcast Control Msgs DL UL DCD MAP MAP opt. UCD opt.
DL TDMA
FCH
DL DL burst 1 burst 2
...
DL burst k
pre.
DL burst k+1
...
pre.
DL burst n
UL subframe
UL MAP for next MAC frame UL bursts
UL TDMA
pre.
UL burst 1
...
pre.
UL burst m
DOWNLINK
UPLINK
frame
Broadcast
16-bit connection ID (CID) 32-bit service flow ID (SFID) 16-bit security association ID (SAID)
Support for VP/VC switched connections Support for end-to-end signaling of dynamically created connections ATM header suppression Full QoS support
Initial support for Ethernet, VLAN, IPv4, and IPv6 Payload header suppression Full QoS support
Functions:
Classification: mapping the higher layer PDUs (Protocol Data Units) into appropriate MAC connections Payload header suppression (optional) MAC SDU (Service Data Unit), i.e, CS PDU, formatting
MAC SDU = CS PDU
PHSI
MAC PDU
payload (optional)
CRC (optional)
HCS (8)
HCS (8)
HT = 0 Payloads are MAC SDUs/segments, i.e., data from upper layer (CS PDUs) Transmitted on data connections
HT =0 Payloads are MAC management messages or IP packets encapsulated in MAC CS PDUs Transmitted on management connections
HT =1; and no payload, i.e., just a Header
Ethernet Packet
Ethernet Packet
MAC PDU
HT
CRC
FEC
FEC block 1
FEC Block 2
FEC Block 3
......
FEC block m
PHY Burst
(e.g., TDMA burst)
Preamble
OFDM symbol 1
OFDM symbol 2
......
OFDM symbol n
Basic Connection:
short and time-urgent MAC management messages MAC mgmt messages as MAC PDU payloads longer and more delay tolerant MAC mgmt messages MAC mgmt messages as MAC PDU payloads Standard based mgmt messages, e.g., DHCP, SNMP, etc IP packets based CS PDU as MAC PDU payload
mgmt msg HD
MAC mgmt msg can be sent on: Basic connections; Primary mgmt connection; Broadcast connection; and initial ranging connections 41 MAC mgmt msgs specified in 802.16 The TLV (type/length/value) encoding scheme is used in MAC mgmt msg, e.g., in UCD msg for UL burst profiles, (type=1, length=1, value=1) QPSK modulation (type=1, length=1, value=2) 16QAM modulation (type=1, length=1, value=3) 64QAM modulation
MAC PDUs are transmitted in PHY Bursts The PHY burst can contain multiple FEC blocks MAC PDUs may span FEC block boundaries Concatenation Packing Segmentation Sub-headers
MAC PDU 1
HT MAC PDU Payload CRC HT
MAC PDU 2
MAC PDU Payload CRC
FEC
FEC block 1
FEC Block 2
FEC Block 3
......
FEC block m
PHY Burst
(e.g., TDMA burst)
Preamble
OFDM symbol 1
OFDM symbol 2
......
OFDM symbol n
MAC SDU
MAC SDU seg-1
HT CRC F S H
HT
F S H
FEC
FEC block 1
......
FEC Block m1
FEC block 1
......
FEC Block m2
Pre.
OFDM symbol 1
......
OFDM symbol n1
Pre.
OFDM symbol 1
......
OFDM symbol n2
PHY Burst
PHY Burst
......
MAC SDU k
HT
CRC
Variable size MSDUs or MSDU segments, e.g., IP packets, on the same connection
CRC
HT
PSH
PSH
......
PSH
Service Flow
Service flow QoS scheduling Dynamic service establishment Two-phase activation model (admit first, then activate) A unidirectional MAC-layer transport service characterized by a set of QoS parameters, e.g., latency, jitter, and throughput assurances Identified by a 32-bit SFID (Service Flow ID) Provisioned: controlled by network management system Admitted: the required resources reserved by BS, but not active Active: the required resources committed by the BS
Unsolicited Grant Services rtPS: Real-time Polling Services nrtPS: Non-real-time Polling Services BE: Best Effort
For CBR or CBR-like services, e.g., T1/E1. The BS scheduler offers fixed size UL BW grants on a real-time periodic basis. The SS does not need to send any explicit UL BW req.
For rt-VBR-like services, e.g., MPEG video. The BS scheduler offers real-time, periodic, UL BW request opportunities. The SS uses the offered UL BW req. opportunity to specify the desired UL BW grant. The SS cannot use contention-based BW req.
For nrt-VBR-like services, such as, bandwidth-intensive file transfer. The BS scheduler shall provide timely (on a order of a second or less) UL BW request opportunities. The SS can use contention-based BW req. opportunities to send BW req.
Best Effort
For best-effort traffic, e.g., HTTP, SMTP. The SS uses the contention-based BW request opportunities.
Allows real-time reaction to QoS need, i.e., SS may redistribute bandwidth among its connections, maintaining QoS and service-level agreements Lower overhead, i.e., less UL-MAP entries compare to grant per connection Off- loading base stations work Requires intelligent subscriber station to redistribute the allocated BW among connections
Implicit requests (UGS): No actual requests BW request messages, i.e., BW req. header
Sends in either a contention-based BW req. slot or a regular UL allocation for the SS;he special B Requests up to 32 KB with a single message Request Incremental or aggregate, as indicated by MAC header
Presented in Grant Management (GM) sub-header in a data MAC PDU of the same UL connection is always incremental Up to 32 KB per request for the CID Presented in the GM sub-header on a UGS connection request a bandwidth req. opportunity for non-UGS services
Poll-Me bit
Initial Ranging Used for new SS to join the system Requires a long preamble BW Request Used for sending BW req Short preamble
Detection: SS does not get the expected response in a given time Resolution: a truncated binary exponential backoff window
Source: http://www.cygnuscom.com/pdf/WP_PN_Article.pdf
Ranging is a process of acquiring the correct timing offset, and PHY parameters, such as, Tx power level, frequency offset, etc. so that the SS can communicate with the BS correctly. BS performs measurements and feedback. SS performs necessary adjustments. Two types of Ranging:
Initial ranging: for a new SS to join the system Periodic ranging (also called maintenance ranging): dynamically maintain a good RF link.
A Layer-2 sliding-window based flow control mechanism. Per connection basis. Only effective to non-real-time applications. Uses a 11-bit sequence number field. Uses CRC-32 checksum of MAC PDU to check data errors. Maintain the same fragmentation structure for Retransmission. Optional.
Secures over-the-air transmissions Protects from theft of service Data encryption protocol A client/server model based Key management protocol (Privacy Key Management, or PKM)
A set of privacy information, e.g., encryption keys, used encryption algorithm Three types of Security Associations (SAs)
Primary SA: established during initial registration Static SA: provisioned within the BS Dynamic SA: dynamically created on the fly
Public Key
Contained in X.509 digital certificate Issued by SS manufacturers Used to encrypt AK Provided by BS to SS at authorization Used to derive KEK Derived from AK Used to encrypt TEK
Use DES (Data Encryption Standard) in CBC (Cipher Block Chaining) mode with IV (Initialization Vector). CBC IV is calculated from
Only MAC PDU payload (including subheaders) is encrypted. MAC PDU headers are unencrypted. Management messages are unencrypted.
Scheduler
Questions ??
References
IEEE802.16-2004 Alcatel White Paper: WiMAX, making ubiquitous high-speed data services a reality Intel White Paper: Understanding WiMAX and 3G for Portable/Mobile Broadband Wireless WiMAX Forum: www.wimaxforum.com http://en.wikipedia.org/wiki/WiMax
BS Base Station SS Subscriber Station, (i.e., CPE) DL Downlink, i.e. from BS to SS UL Uplink, i.e. from SS to BS FDD Frequency Division Duplex TDD Time Division Duplex TDMA Time Division Multiple Access TDM Time Division Multiplexing OFDM Orthogonal Frequency Division Multiplexing OFDMA - Orthogonal Frequency Division Multiple Access QoS Quality of Service