Nuaymi | WiMAX | Buch | 978-0-470-02808-7 | sack.de

Buch, Englisch, 320 Seiten, Format (B × H): 176 mm x 248 mm, Gewicht: 730 g

Nuaymi

WiMAX

Technology for Broadband Wireless Access

Buch, Englisch, 320 Seiten, Format (B × H): 176 mm x 248 mm, Gewicht: 730 g

ISBN: 978-0-470-02808-7
Verlag: Wiley


WiMAX Broadband Wireless Access Technology, based on the IEEE 802.16 standard, is at the origin of great promises for many different markets covering fixed wireless Internet Access, Backhauling and Mobile cellular networks. WiMAX technology is designed for the transmission of multimedia services (voice, Internet, email, games and others) at high data rates (of the order of Mb/s per user). It is a very powerful but sometimes complicated technique.
The WiMAX System is described in thousands of pages of IEEE 802.16 standard and amendments documents and WiMAX Forum documents. WiMAX: Technology for Broadband Wireless Access provides a global picture of WiMAX and a large number of details that makes access to WiMAX documents much easier. All the aspects of WIMAX are covered. Illustrations and clear explanations for all the main procedures of WiMAX are pedagogically presented in a succession of relatively short chapters
- Topics covered include WiMAX genesis and framework, WiMAX topologies, protocol layers, MAC layer, MAC frames, WiMAX multiple access, the physical layer, QoS Management, Radio Resource Management, Bandwidth allocation, Network Architecture, Mobility and Security
- Features a glossary of abbreviations and their definitions, and a wealth of explanatory tables and figures
- Highlights the most recent changes, including the 802.16e amendment of the standard, needed for Mobile WiMAX
- Includes technical comparisons of WiMAX vs. 802.11 (WiFi) and cellular 3G technologies

This technical introduction to WiMAX, explaining the rather complex standards (IEEE 802.16-2004 and 802.16e) is a must read for engineers, decision-makers and students interested in WiMAX, as well as other researchers and scientists from this evolving field.
Nuaymi WiMAX jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


Preface and Acknowledgements xv

Abbreviations List xvii

Part One Global Introduction to WiMAX 1

1 Introduction to Broadband Wireless Access 3

1.1 The Need for Wireless Data Transmission 3

1.2 Wireless Networks and Broadband Wireless Access (BWA) 4

1.2.1 Different Types of Data Networks 4

1.2.2 Some IEEE 802 Data Network Standards 5

1.2.3 Cordless WLL Phone Systems 6

1.3 Applications of BWA 8

1.3.1 Wireless is Not Mobile! 10

1.3.2 Synthesis of WiMAX BWA Applications 11

1.4 History of BWA Technologies 11

1.4.1 Video Distribution: LMDS, MMDS and DVB 11

1.4.2 Pre-WiMAX Systems 12

2 WiMAX Genesis and Framework 13

2.1 IEEE 802.16 Standard 13

2.1.1 From 802.16-2004 to 802.16e 14

2.2 WiMAX Forum 15

2.2.1 WiMAX Forum Working Groups 15

2.2.2 WiMAX Forum White Papers 16

2.3 WiMAX Products Certification 16

2.3.1 WiMAX Certifi ed Products 18

2.4 Predicted Products and Deployment Evolution 19

2.4.1 Product Types 19

2.4.2 Products and Deployment Timetable 19

2.5 Other 802.16 Standards 20

2.6 The Korean Cousin: WiBro 21

3 Protocol Layers and Topologies 23

3.1 The Protocol Layers of WiMAX 23

3.2 Convergence Sublayer (CS) 25

3.3 Medium Access Control Common Part Sublayer (MAC CPS) 25

3.4 Security Sublayer 25

3.5 PHYsical Layer 26

3.5.1 Single Carrier (SC) and OFDM 27

3.6 Network Management Reference Model 28

3.7 WiMAX Topologies 28

4 Frequency Utilisation and System Profiles 31

4.1 The Cellular Concept 31

4.1.1 Sectorisation 31

4.1.2 Cluster Size Considerations 33

4.1.3 Handover 35

4.2 Licensed and Unlicensed Frequencies 36

4.2.1 Frequency Channels and Spectral Masks 37

4.3 WiMAX Frequencies, Regulations and Availability 38

4.3.1 France 39

4.3.2 Korea 40

4.3.3 USA 40

4.3.4 UK 40

4.3.5 China 40

4.3.6 Brazil 41

4.3.7 Elsewhere 41

4.4 WiMAX System Profiles 41

4.4.1 Fixed WiMAX System Profi les 41

4.4.2 Mobile WiMAX System Profi les 42

Part Two WiMAX Physical Layer 43

5 Digital Modulation, OFDM and OFDMA 45

5.1 Digital Modulations 45

5.1.1 Binary Phase Shift Keying (BPSK) 45

5.1.2 Quadrature Phase Shift Keying (QPSK) 45

5.1.3 Quadrature Amplitude Modulation (QAM): 16-QAM and 64-QAM 47

5.1.4 Link Adaptation 47

5.2 OFDM Transmission 47

5.2.1 Basic Principle: Use the IFFT Operator 48

5.2.2 Time Domain OFDM Considerations 50

5.2.3 Frequency Domain OFDM Considerations 51

5.2.4 OFDM Symbol Parameters and Some Simple Computations 52

5.2.5 Physical Slot (PS) 53

5.2.6 Peak-to-Average Power Ratio (PAPR) 53

5.3 OFDMA and Its Variant SOFDMA 53

5.3.1 Using the OFDM Principle for Multiple Access 53

5.3.2 Scalable OFDMA (SOFDMA) 55

5.3.3 OFDMA in the OFDM PHYsical Layer: Subchannelisation 55

5.4 Subcarrier Permutations in WiMAX OFDMA PHY 57

5.4.1 The Main Permutation Modes in OFDMA 57

5.4.2 Some OFDMA PHY Defi nitions 57

5.4.3 PUSC Permutation Mode 58

5.4.4 FUSC Permutation Mode 65

5.4.5 AMC Permutation Mode 67

5.4.6 TUSC Permutation Mode 68

6 The Physical Layer of WiMAX 69

6.1 The 802.16 Physical Transmission Chains 69

6.1.1 The Global Chains 69

6.2 Channel Coding 69

6.2.1 Randomisation 70

6.2.2 Forward Error Correction (FEC) Codes 71

6.2.3 Interleaving 73

6.2.4 Repetition 73

6.3 Turbo Coding 74

6.3.1 Convolutional Turbo Codes (CTC) 75

6.3.2 Block Turbo Codes (BTC) 76

6.4 Transmission Convergence Sublayer (TCS) 77

6.5 Burst Profile 78

6.5.1 Downlink Burst Profi le Parameters 78

6.5.2 Uplink Burst Profi le Parameters 79

6.5.3 MCS Link Adaptation 79

Part Three WiMAX Multiple Access (MAC Layer) and QoS Management 81

7 Convergence Sublayer (CS) 83

7.1 CS in 802.16 Protocol Architecture 83

7.2 Connections and Service Flow 83

7.2.1 Connection IDentifi ers (CIDs) 85

7.2.2 Service Flows 85

7.3 Classification and Mapping 88

7.4 CS and QoS 90

7.5 Payload Header Suppression (PHS) 90

7.5.1 PHS Rules 92

7.5.2 PHS Rules Signalling 93

7.5.3 Header Compression in WiMAX 94

8 MAC Functions and MAC Frames 95

8.1 Introduction 95

8.2 MAC Addresses and MAC Frames 95

8.2.1 MAC Addresses and Other Addresses 95

8.2.2 MAC Frames 96

8.2.3 MAC Header Format 96

8.2.4 MAC Subheaders and Special Payloads 100

8.3 Fragmentation, Packing and Concatenation 100

8.3.1 Fragmentation 100

8.3.2 Packing 101

8.3.3 Concatenation 102

8.4 Basic, Primary and Secondary Management Connections 102

8.5 User Data and MAC Management Messages 105

8.6 TLV Encoding in the 802.16 Standard 105

8.6.1 TLV Encoding Sets 106

8.7 Automatic Repeat Request (ARQ) 106

8.7.1 ARQ Feedback Format 108

8.7.2 Hybrid Automatic Repeat Request (HARQ) Mechanism 109

8.8 Scheduling and Link Adaptation 110

9 Multiple Access and Burst Profile Description 113

9.1 Introduction 113

9.2 Duplexing: Both FDD and TDD are Possible 113

9.2.1 FDD Mode 114

9.2.2 TDD Mode 114

9.3 Transmission of Downlink and Uplink Subframes 115

9.3.1 OFDM PHY Downlink Subframe 116

9.3.2 OFDM PHY Uplink Subframe 117

9.3.3 OFDMA PHY Frame 118

9.3.4 Frame Duration 119

9.3.5 Preambles 120

9.4 Maps of Multiple Access: DL-MAP and UL-MAP 121

9.4.1 DL-MAP Message 122

9.4.2 UL-MAP Message 123

9.4.3 OFDMA PHY UL-MAP and DL-MAP Messages 124

9.5 Burst Profile Usage: DCD Message and the DIUC Indicator 125

9.5.1 Burst Profi le Selection Thresholds 125

9.5.2 DCD (Downlink Channel Descriptor) Message 126

9.5.3 Transmission of the DCD Message 128

9.5.4 An Example of the DCD Message 128

9.5.5 DIUC Values 129

9.5.6 UCD (Uplink Channel Descriptor) Message and UIUC Indicator 132

9.6 Mesh Frame 134

9.6.1 Network Control Subframe 134

9.6.2 Schedule Control Subframe 135

10 Uplink Bandwidth Allocation and Request Mechanisms 137

10.1 Downlink and Uplink Allocation of Bandwidth 137

10.2 Types of Uplink Access Grant-request 138

10.2.1 Incremental and Aggregate Bandwidth Request 138

10.2.2 Standalone and Piggyback Bandwidth Request 138

10.3 Uplink Access Grant-request Mechanisms 140

10.3.1 Unsolicited Bandwidth Grants 141

10.3.2 Unicast Polling 141

10.3.3 Contention-based Group (Multicast or Broadcast) Polling 142

10.3.4 Management of Multicast Polling Groups 143

10.3.5 Contention Resolution for Group Polling 144

10.3.6 Bandwidth Stealing 146

10.3.7 Example of Uplink Access 147

10.4 Contention-based Focused Bandwidth Request in OFDM PHY 150

10.4.1 Full Contention (REQ Region Full) 151

10.4.2 Focused Contention (REQ Region Focused) 151

10.4.3 Summary of Contention-based Uplink Grant-request Methods 153

10.5 Contention-based CDMA Bandwidth Request in OFDMA PHY 153

11 Network Entry and Quality of Service (QoS) Management 155

11.1 Ranging 155

11.1.1 Ranging Messages 155

11.1.2 Initial Ranging 158

11.1.3 Ranging (or Periodic Ranging) 160

11.2 Link Adaptation 161

11.2.1 Downlink Channel Link Adaptation 162

11.2.2 Uplink Channel Link Adaptation 163

11.3 The Five Scheduling Services or QoS Classes 163

11.3.1 Unsolicited Grant Service (UGS) 165

11.3.2 Extended Real-Time Polling Service (ertPS) 166

11.3.3 Real-Time Polling Service (rtPS) 166

11.3.4 Non-Real-Time Polling Service (nrtPS) 166

11.3.5 Best Effort (BE) 167

11.4 Scheduling and Deployment of Services Over WiMAX 167

11.4.1 The Scheduler is in the BS! 167

11.4.2 Scheduling of the Different Transmission Services 168

11.5 Dynamic Service Addition and Change 170

11.5.1 Service Flow Provisioning and Activation 170

11.5.2 Service Flow Creation 171

11.5.3 Service Flow Modifi cation and Deletion 173

11.5.4 Authorisation Module 174

11.6 Network Entry 175

11.6.1 Registration 179

11.6.2 De-registration and Re-registration 180

11.6.3 SS Reset 181

Part Four Diverse Topics 183

12 Efficient Use of Radio Resources 185

With the contribution of Jérôme Brouet, Alcatel, France

12.1 Introduction 185

12.2 Radio Engineering Consideration for WiMAX Systems 186

12.2.1 LOS/NLOS Propagation 186

12.2.2 Radio Parameters and System Gains 186

12.2.3 WiMAX Radio Features that Enhance the Range 187

12.2.4 Frequency Planning Guidelines 188

12.2.5 Base Station Synchronisation 188

12.3 Radio Resource Management Procedures 189

12.3.1 Power Control 189

12.3.2 Dynamic Frequency Selection (DFS) 190

12.3.3 Other Radio Resource Management Procedures 192

12.3.4 Channel Measurements 192

12.3.5 Support of Radio Resource Management in the WiMAX RAN 194

12.4 Advanced Antenna Technologies in WiMAX 194

12.4.1 Beamforming or AAS Technologies 195

12.4.2 MIMO (Multiple-Input Multiple-Output) Solution 200

12.4.3 About the Implementation of Advanced Antenna Technologies 203

12.5 Multicast Broadcast Services (MBS) 204

12.5.1 Multi-BS Access MBS 204

12.5.2 MBS Frame 205

13 WiMAX Architecture 207

With the contribution of Jérôme Brouet, Alcatel, France

13.1 The Need for a Standardised WiMAX Architecture 207

13.1.1 Supporting Working Groups and Documents 207

13.1.2 High-level Architecture Requirements 208

13.2 Network Reference Model 209

13.2.1 Overview and Defi nitions 209

13.2.2 ASN Reference Model and Profi les 210

13.2.3 CSN Reference Model 213

13.2.4 Reference Points 214

13.3 Network Functionalities 215

13.3.1 Network Discovery and Selection 215

13.3.2 IP Addressing 216

13.3.3 AAA Framework 216

13.3.4 Mobility 217

13.3.5 End-to-End Quality of Service 217

14 Mobility, Handover and Power-Save Modes 219

14.1 Handover Considerations 219

14.2 Network Topology Acquisition 220

14.2.1 Network Topology Advertisement 220

14.2.2 MS Scanning of Neighbour BSs 220

14.2.3 Association Procedure 221

14.2.4 CDMA Handover Ranging and Automatic Adjustment 222

14.3 The Handover Process 222

14.3.1 Cell Reselection 222

14.3.2 Handover Decision and Initiation 223

14.3.3 Synchronisation to a Target BS Downlink 223

14.3.4 Ranging and Network Re-entry 224

14.3.5 Termination of MS Context 224

14.3.6 Handover Cancellation 224

14.4 Fast BS Switching (FBSS) and Macro Diversity Handover (MDHO) 225

14.4.1 Diversity Set 225

14.4.2 Different Types of BS for a Given MS 225

14.4.3 FBSS (Fast BS Switching) 226

14.4.4 MDHO (Macro Diversity Handover) 226

14.5 Power-Save Modes 227

14.5.1 Sleep Mode 227

14.5.2 Idle Mode 228

15 Security 231

15.1 Security Elements Used in the 802.16 Standard 231

15.1.1 Encryption Algorithms 232

15.1.2 X.509 Certifi cate 232

15.1.3 Encryption Keys and Security Associations (SAs) 233

15.2 Authentication and the PKM Protocol 235

15.2.1 PKM Protocol MAC Management Messages 235

15.2.2 PKMv1: the BS Authenticates the SS and then Provides it with Keying Material 236

15.2.3 Mutual Authentication as Defi ned in 802.16e 239

15.2.4 Authorisation Key (AK) Management 240

15.2.5 Management of the Authorisation Key in PKMv 2 242

15.3 Data Encryption 242

15.3.1 Generation of Encryption Keys 243

15.3.2 Generation of Encryption Keys in the 802.16e Amendment 245

15.3.3 Traffi c Encryption Keys and Handover 246

15.3.4 Traffi c Encryption Algorithms 246

15.3.5 Traffi c Encryption Algorithms Added in the 802.16e Amendment 248

15.4 Message Authentication with HMAC 248

15.4.1 Message Authentication Keys 249

15.5 Other Security Issues 250

16 Comparisons and Conclusion 251

16.1 Comparison Between Fixed WiMAX and Mobile WiMAX 251

16.2 Comparison Between WiMAX and WiFi 252

16.3 Comparison Between WiMAX and 3G 253

16.3.1 Advantages of the 3G Cellular System 253

16.3.2 Advantages of the (Mobile) WiMAX System 254

16.4 Final Thoughts and Conclusion 254

Annex A: The Different Sets of MAC Management Messages 255

Annex B: Example of a Downlink Channel Descriptor (DCD) Message 265

References 273

Index 277


Loutfi Nuaymi is Associate Professor in the Networks, Security and Multimedia Department of Telecom Bretagne, France. In addition to WiMAX, his areas of research include: power control and other radio resource management procedures in cellular and wireless networks, and multiple access in wireless ad hoc networks, UMTS/LTE and WLAN networks. He has published numerous journal and conference papers, including at IEEE VTC and PIMRC, and is also in charge of the Mobile Networks and Professional Services Masters at Telecom Bretagne.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.