802 16

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

802.

16 2009 WMAN
WMAN (Wide Metropolitan Area Network) is a type of wireless networks and is owned by a single authority like ISP (Internet Service Provided).

WiMAX
The most renowned form of WMAN is WiMAX (Worldwide interoperability for Microwave Access) technology which is largely based on 802.16 standards. WiMAX provides wireless broadband support to fixed line as well as the mobile users.

802.16
In earlier WiMAX technology was designed for fixed broadband lines using 802.16-2004 and earlier versions, later in 2005 it was upgraded to support the mobile users too. Furthermore, 802.16-2009 has been introduced with combined effect of 802.16 2004-2005 versions and furthers upgradations approved during 2004-2008.802.16-2009 also support the multiple hop networking. IEEE 802.16 basically defines the frequency band for signal broadcast/propagation operations and provides the air interference for Broadband Wireless Access Systems It uses RF (Radio Frequency) for propagation of the signals. There are two types of it: i) LOS (Line of Sight) In this type signal propagate between specified nodes and the nodes need to be in the Lineof-sight, which means there should not be any obstruction between any connected nodes. Therefore, it is used to fixed line applications. ii) NLOS (Non Line Of Sight) As the name says this type dont need any connected nodes to be in line-of-sight. It uses advance methods for modulating the signal in order to balance the disturbance caused by obstacles in path of propagation of the signal. Therefore, it is used for both fixed line as well as mobile operations.

Due to its support to both mobile and fixed line operations, NLOS is used preferably. Below are the evolutionary enhancements made in 802.16: i) ii) iii) iv) v) 802.16-2001 (Fixed Access) +802.16a-2003 (OFDM/OFDMA) 802.16-2004 +802.16e-2005 (Mobility) 802.16-2009

Introduction to 802.16-2009
802.16-2009 is an air interface which include layer one (Physical Layer) and layer two (MAC Layer) of networking system to support fixed and mobile point-to-multipoint broadband wireless access systems, multimedia applications, therefore, providing the multiple services. The MAC is designed to support multiple physical layer specifications, each for a specified operation/application environment. This standard has encouraged to develop cost effective, more efficient and multi vendor products. It also supports the orthogonal frequency division multiplexing and orthogonal frequency division multiple access in revised form, the revision of 802.16-2004. It also supports 802.16e-2005,802.16-2004/Cor12005, 802.16e, 802.16f, and 802.16g, along with additional maintenance material availability.

Business Prospective
From late 2006, 802.16e got special attention from the vendors and 802.16-2004 fabrication was stopped. Vendors started releasing new stations and terminals supportive to 802.16e. They had higher performance but low cost as compared to older version. Its extension in recent years is named as 802.16-2009, it is also supportive to 802.16-2005 stations and terminals and they can interwork with old version terminals and stations, whereas 802.16-2005 didnt support the old version systems. Operators are quite aware of the matter as they are planning to develop the networks which are future ready, era of 802.16e has come to an end and 802.16-2009 is on its evolutionary path. 802.16-2009 got more attention in market as it supports cost effective, efficient and multivendor products. It is also supportive to commercialization of broadband wireless systems in effective manners.

Application
In wireless networks security is a primary issue due to lack of wired infrastructure. Privacy is the most basic or fundamental step to secure a data transmission/communication. Authentication provides the reliability of the channel and the sender. Access control avoids unwanted access to the network. There are three steps involved in WiMAX security framework: i) ii) iii) Authentication Key establishment Data encryption

Authentication is the point where 802.16 standards step in for the security purposes. Authentication support common keying for Subscriber Station (SS) and Base Station (BS) for secure and encrypted data transmission over the channel to the other end without any unwanted interference. If a Subscriber Station send authentication to the Base Station, no matter how much informative it is Base Station may discard. However, when Subscriber Station send authentication request then the Base Station consider the request compare it to its pre-defined security criteria and then allow the Subscriber Station to connect the network freely.

You might also like