ieee 806.16
TRANSCRIPT
![Page 1: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/1.jpg)
IEEE 802.16 Presented By Saba Arif GCUF
![Page 2: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/2.jpg)
Topics:Introduction Overview of the IEEE 802.16 standard. What is WiMAX WiMAX Services Burst Profile Reference Model MAC PDU format MAC PDU Transmission Fragmentation/Packing Classes of Uplink service Power Management Handoff
![Page 3: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/3.jpg)
Introduction:Wireless Networks are generally less efficient as
compared to wired network.Wireless medium has limited bandwidth Higher packet error rate In response to increase the QOS challenge , the IEEE
802.16 standard known as Worldwide Interoperability for Microwave Access (WiMAX) , has emerged as the strongest competitor for Broadband wireless technology.
Promise to offer guaranteed QOS for wireless users Aimed to provide last-mile wireless broadband
access. Ref:
1009.6091pdf
![Page 4: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/4.jpg)
Overview of the IEEE 802.16 Standard Designed for point-to-point (PTP) and point-to-
multipoint (PTM) topologies but mainly deployed for point to multipoint topologies.
It also support mesh topologies. In PTM a base station (BS) services many subscriber stations (SS) which are mounted outdoors.
IEEE 802.16 has three major versions; 802.16-2001, 802.16-2004 and IEEE 802.16-2005.
ref: http://www.slideshare.net/sajidmarwatt/wimax-ieee-
80216-33468312
![Page 5: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/5.jpg)
What is WiMAX: Today world moves to wireless network.There are two reasons for this: i) People want to have access to the Internet,
home or office (fixed) where the wired access to the Internet is either not available expensive.
ii) They want to access the Internet when they are using their cell phones.
The worldwide interoperability for microwave access(WiMAX) has been designed for these type of applications.
It provide last-mile broadband wireless access. Ref: Data Communication and Networking By Behrouz-
A.Forouzan(p#467)
![Page 6: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/6.jpg)
WiMAX Services:
It’s provide two types of services
i) Fixed WiMAX Optimized for Home/Offices ii) Mobile WiMAX Optimized for Mobiles
![Page 7: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/7.jpg)
Fixed WiMAX
![Page 8: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/8.jpg)
Mobile WiMAX
![Page 9: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/9.jpg)
Burst ProfileThe burst profile is a basic tool in the 802.16
standardMAC Layer. The burst profile allocation, which
changesdynamically and possibly very fast, is aboutphysical transmission.
The burst profiles are used for the link adaptation
procedure.
![Page 10: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/10.jpg)
Reference Model:
![Page 11: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/11.jpg)
Reference Model:
Service Specific Convergence sublayer(CS)
It is used for the transport of all packet based protocols
Such as internet protocol(IP)802.3 Ethernet protocolConnection benefits from a specific Qos.
![Page 12: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/12.jpg)
Reference Model
MAC LayerSub-layer of Data-Link LayerDefine access method and frame formatBandwidth request\AllocationConnection Establishment \ MaintainanceAvoid collisions.
![Page 13: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/13.jpg)
Reference Model:
Security SubLayerProvide authenticationEncryption b/t SS & BS
![Page 14: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/14.jpg)
Reference Model:
Physical Layer An interface between the MAC and the
wireless media where the frames are transmitted and received .
Encoding and Decoding of signals.Convert MAC layer frames into signals
![Page 15: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/15.jpg)
MAC PDU FormatEach MAC PDU consists of three components i) A fixed-length Generic MAC Header ii) A variable length Payload iii) A CRC ( Cyclic Redundancy Check )
6 byte Variable 4 byte
MAC Header Payload Management Message
![Page 16: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/16.jpg)
Types of MAC header
HT EC TYPE BR CID HCS
Header Payload Management Message
HT EC TYPE
RSV CI EKS LEN CID HCS
Bandwidth request MAC header
Generic MAC header
![Page 17: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/17.jpg)
Specification of MAC layerThe first bit in a frame is frame identifier.EC. The encryption control field use one bit
to define weather the frame should be encrypted for security purpose.
Type. Type field use 6 bits to define the type of the frame.
CI. The checksum ID is used 1 bit to define weather the field should be present or not.
Length . Length bit use 11 bits to define the total length of the frame.This field is present in generic frame. Header + Payload + CRC ID (Connection Identifier)
![Page 18: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/18.jpg)
Specification of Mac layerByte needed . use 16 bits to define the
number of bytes needed for allocated slots in physical layer
Connection Identifier . use 16 bits to define connection identifier for the current connection
Header CRC. Both type of frame need to be have 8-bt header CRC field.
Payload . The variable length define the payload
CRC. The last field if present used for error detection over the whole frame
![Page 19: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/19.jpg)
MAC PDU TransmissionThe application first establishes the
connection with the BS as well as the associated service flow (UGS, rtPS, nrtPS or BE).
BS will assign the connection with a unique connection ID (CID).
All packets from the application layer in the SS are classified by the connection classifier based on CID and are forwarded to the appropriate queue. So, the scheduler inside the BS has outdated information about the current state of each uplink connection due to the large Round Trip Delay (RTD) and possible collision occurred in the uplink channel transmission .
![Page 20: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/20.jpg)
MAC PDU Transmission
Multiple MAC PDUs may be concatenated into a single transmission in either the uplink or downlink directions.
Fragmentation is the process in which a MAC SDU isdivided into one or more MAC PDU fragments.
Ref: 1009.6091 pdf
![Page 21: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/21.jpg)
Fragmentation/Packing
It may be interesting to fragment a MAC SDU in many
MAC PDUs or, inversely, to pack more than one MSDU in
Single MAC PDUs.The advantage of fragmentation is to lower
the risk oflosing a whole MSDU to the risk of losing part
of it.
![Page 22: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/22.jpg)
Classes Of Uplink Services:The WiMAX Standard specifies the different
service classes. Classes are Set by Priority wise UGS > rtPS > nrtPS > BE.
UGSUnsolicited Grant Service (UGS): No need to request bandwidth for each
packetThe BS periodically assigns slotsScheduling for DL UGS traffic is not required
![Page 23: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/23.jpg)
Uplink Services
Real-time Polling Service (rtPS): Packets are not fixed in size BS polls the connection of this class
periodically to ask how much bandwidth is needed.The packet with smaller deadline will be
transmitted earlier.
![Page 24: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/24.jpg)
Uplink Classes
Non real-time Polling Service (nrtPS): Used to support traffic with no QoS. May have additional bandwidth allocated throughnon periodic polling.
Best Effort (BE): Used to support traffic with no QoS.There is possibility that BE traffic is starved by thelack of bandwidth.
![Page 25: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/25.jpg)
Model Of Uplink Classes.
![Page 26: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/26.jpg)
Power Management HandoffA telecommunication system (e.g., cable, radio,
satellite), as opposed to sensory aspects of communication(e.g., audio, video).
The standard addresses the support of handovers for both mobile and stationary users.
For mobile users, handovers can occur when wireless link conditions change due to the users’ movement.
For the stationary user, handovers become imminent when the surrounding network environment changes, making one network more attractive than another.
![Page 27: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/27.jpg)
Power Management Handoff
As an example, whenMaking a network transition during a
phone call, the handover procedures should be executed in such a way that any perceptible interruption to the conversation will be minimized.
![Page 28: IEEE 806.16](https://reader031.vdocument.in/reader031/viewer/2022030314/5889835b1a28ab461b8b62a9/html5/thumbnails/28.jpg)
Thank You