SlideShare une entreprise Scribd logo
1  sur  38
4G Integrated WiMAXA Detailed Introduction By BRIAN RITCHIE Twitter : brianritchie Facebook : facebook.com/brianritchie
Who Am I ? Co worked on the Enterprise Architecture for some of the largest regional as well as international companies Rolled out the first official OSS Centre of Excellence strategy and implementation for a local Financial Institution Experience with large scale Project Management for core systems Designed and Implemented Research and Incubation Services for large scale corporations
Agenda Introduction to WiMAX Introduction to Network Access Control Layers
Before We Go Further !!! Case Study : How would you cope with the increased need for bandwidth delivered at lower costs to more subscribers ? Assume the technologies available to you are the following : Ethernet Wi-Fi Cell Towers, Base Stations, Data Centers, Traditional CDNs
What is WiMAX ? A quick standards introduction
What is WiMAX ? WiMAX =  Worldwide Interoperability for Microwave Access Aim : To provide long distance wireless broadband for applications similar to the coverage and quality of service (QOS) of cellular networks Promotes the IEEE 802.16 standards
What is 802.16 ? Wireless Standards in IEEE Project 802
What is 802.16 ? IEEE 802.16 originally aimed to define fixed broadband wireless (FBW) May possibly replace the past wireless local loop (WLL) in telecommunications Able to deliver performance comparable to traditional cable, T1, xDSL, etc.
What is 802.16 ? Advantages of 802.16 include : Quick and easy deployment especially for areas that are difficult to be wired. No physical limitations compared to wired infrastructure Cost effective for $/MB of data Increased security through multi-level encryption Highly scalable with significantly higher throughout
Wireless Architectures What are the architectures behind WiMAX deployment
Wireless Architectures There are two types of wireless deployment Point to Point (P2P) Point to Multipoint (PMP) How does Line of Sight (LOS) affect these architectures ?
Wireless Architectures Point to Point (P2P) Architecture P2P is used where there are two points of interest Usually used for backend communication/data transfer (e.g: data center, co-lo, base stations) or as a point for distribution for PMP Higher throughput than PMP Transmitter Receiver
Wireless Architectures Point to Multipoint (PMP) PMP is used primarily for distribution Able to serve hundreds of dissimilar subscribers simultaneously
How does it affect WiMAX ? Previous wireless technologies could not server NLOS WiMAX functions best in LOS but is also able to serve NLOS with acceptable throughput which led to lower cost per subscriber because more subscribers could be served from one base station Line of Sight (LOS) Line of Sight (LOS) Non Line of Sight (NLOS)
What is WiMAX ? Types of WiMAXdeployments and what its not
Terminology Fixed WiMAX (IEEE 802.16d / 802.16-2004) Mobile WiMAX(IEEE 802.16e / 802.16e-2005) WiMAXvsWi-Fi
Fixed WiMAX ( IEEE 802.16d ) The capability of Fixed WiMAX One of the major limitations was that this architecture was not mobile. Users were not able to transition data between base towers  P2P : LOS = 30 Miles/48km , 72Mbps PMP : NLOS = 6 Miles/9.6km , 40Mbps
Mobile WiMAX ( IEEE 802.16e ) The capability of Mobile WiMAX Enabled cell-phone like infrastructure on a large scale. This enabled users to move between base towers without loss of connection which allows for more mobile 0n-demand applications to be deployed
WiMAXvsWi-Fi
Hardware Architecture End to End View on WiMAX hardware and the considerations
WiMAX Architecture Antenna/Base Station to Radio Relationship Located outdoors Located outdoors ,[object Object]
Radio = Core, contains a transmitter (send) and receiver (receive), can be likened to a router/bridge
Antenna = Broadcaster, connects to the WMAN networkLocated indoors Located indoors
Advantages Advantage of Radio architecture – Radio is protected from weather extremes, this reduces interruptions/signal loss Advantage of Antenna architecture – optimizes the performance of the WMAN connection between transmitter and receiver
Hardware Architecture Heliax (Pigtail) ,[object Object]
The rule for deploying Heliax cables = shorter the better
Heliax cables loses 1 dB for every 10 feet of cableWiMAX Radio Heliax Cables
Hardware Architecture ,[object Object]
Sector – more focused, used more widely than Omni due to better performance
Panel – sometimes has the radio within the same enclosure, PoE power source, used for relays,[object Object]
Deployment Considerations Aspects to plan when deploying WiMAX technology
Link Budget Link Budget – Performance of the WMAN connection Link Budget – Power received at each detector Prx = Ptx + Gtx – Apl + Grx – Am Where Prx= received power at detector (dBm) Ptx = transmitter output power (dBm) Gtx = transmitter antenna gain (dBi) Grx = receiver antenna gain (dBi) Apl = path loss (dB) Am = miscellaneous attenuation (link margin, diffraction loss, connector loss, physical object interference (eg : wall, glass, trees, etc) Transmitter Receiver
Frequency Plan Logic Exercise Assuming you had a limit of three different frequencies for deployment to 9 base stations, how would you do it ? NOTE : Same frequencies in close proximity will cause interruption to your subscribers. Assume frequencies are deployed by their base station using Omni directional antennas with equal range radius
Answer : This is also how cellular/wireless operators function with limited frequencies to cover the most surface area without interference to the user  Frequency Plan
Network Architecture How does WiMAX work from a networks perspective
IEEE 802.16 Reference Model Scope of Standard CS SAP Management Entity Service Specific Convergence Sublayer MAC SAP Management Entity MAC Common Parte Sublayer MAC Network Management System Privacy Sublayer PHY SAP Management Entity PHY Layer PHY Management Plane Date/Control Plane
IEEE 802.16 MAC MAC = Medium Access Control Has a PMP network topology with support for mesh network topology Backhaul can either be ATM = Asynchronous Transfer Mode or packet based (eg : IP Networks)
IEEE 802.16 MAC Has three sub-layers in the Reference Model Service Specific Convergence Sublayer (CS) – Provides any transformation/mapping of external network data through the CS Service Access Point (CS SAP) MAC Common Part Sublayer (MAC CPS) – Classifies external network service data units (SDU) and associates these SDUs to propoer MAC Service flow and Connection Identifier (CID) Privacy (or Security) Sublayer – Supports authentication, secure key exchange and encryption

Contenu connexe

Tendances

Tendances (19)

Cloud RAN-Deployment-CPRI-Fronthaul-Technology
Cloud RAN-Deployment-CPRI-Fronthaul-TechnologyCloud RAN-Deployment-CPRI-Fronthaul-Technology
Cloud RAN-Deployment-CPRI-Fronthaul-Technology
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.
 
MOBISTEER
MOBISTEERMOBISTEER
MOBISTEER
 
Cloud ran wp_tfs_nse_ae
Cloud ran wp_tfs_nse_aeCloud ran wp_tfs_nse_ae
Cloud ran wp_tfs_nse_ae
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communications
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
152763323 lte-interview-question
152763323 lte-interview-question152763323 lte-interview-question
152763323 lte-interview-question
 
Ason gmpls
Ason gmplsAson gmpls
Ason gmpls
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
 
Relay lte
Relay lteRelay lte
Relay lte
 
80211n look before_wp
80211n look before_wp80211n look before_wp
80211n look before_wp
 
Lte advanced coverage enhancements
Lte advanced coverage enhancementsLte advanced coverage enhancements
Lte advanced coverage enhancements
 
5 wimax3424
5 wimax34245 wimax3424
5 wimax3424
 
(part-2)Book
(part-2)Book(part-2)Book
(part-2)Book
 
Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...
Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...
Carrier Aggregation Enhancements in Release 11 - Eiko Seidel, Chief Technical...
 
visible light communication
visible light communicationvisible light communication
visible light communication
 
LTE NETWORK OPTIMIZATION FOR URBAN AREA AT TAIZ CITY
LTE NETWORK OPTIMIZATION FOR  URBAN AREA AT TAIZ CITYLTE NETWORK OPTIMIZATION FOR  URBAN AREA AT TAIZ CITY
LTE NETWORK OPTIMIZATION FOR URBAN AREA AT TAIZ CITY
 
Cellular expert for lte planning 2
Cellular expert for lte planning   2Cellular expert for lte planning   2
Cellular expert for lte planning 2
 

Similaire à WiMAX_Intro

WIMAX THE ULTIMATE BROADBAND SOLUTION
WIMAX THE ULTIMATE BROADBAND SOLUTIONWIMAX THE ULTIMATE BROADBAND SOLUTION
WIMAX THE ULTIMATE BROADBAND SOLUTION
Aninda Bhowmik
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16e
Simona Halunga
 

Similaire à WiMAX_Intro (20)

Thesis on Wimax
Thesis on WimaxThesis on Wimax
Thesis on Wimax
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
WiMax Technology
WiMax TechnologyWiMax Technology
WiMax Technology
 
A secure and service oriented
A secure and service orientedA secure and service oriented
A secure and service oriented
 
Wireless Backhaul
Wireless BackhaulWireless Backhaul
Wireless Backhaul
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
computer network
computer networkcomputer network
computer network
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Copy (4) of 5 wimax3424
Copy (4) of 5 wimax3424Copy (4) of 5 wimax3424
Copy (4) of 5 wimax3424
 
5 wimax3424
5 wimax34245 wimax3424
5 wimax3424
 
Wi max
Wi maxWi max
Wi max
 
WIMAX THE ULTIMATE BROADBAND SOLUTION
WIMAX THE ULTIMATE BROADBAND SOLUTIONWIMAX THE ULTIMATE BROADBAND SOLUTION
WIMAX THE ULTIMATE BROADBAND SOLUTION
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16e
 
Survey on mobile wimax
Survey on mobile wimaxSurvey on mobile wimax
Survey on mobile wimax
 

Plus de Brian Ritchie

Plus de Brian Ritchie (7)

Make it Personal by Making it Local
Make it Personal by Making it LocalMake it Personal by Making it Local
Make it Personal by Making it Local
 
Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...
Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...
Buzzwords, Statistics and Lies - True Drivers of Digital Marketing and Growth...
 
Advanced Growth Marketing 101 by Brian Ritchie
Advanced Growth Marketing 101 by Brian RitchieAdvanced Growth Marketing 101 by Brian Ritchie
Advanced Growth Marketing 101 by Brian Ritchie
 
Growth by Segmentation - Part 1 by Brian Ritchie
Growth by Segmentation - Part 1 by Brian RitchieGrowth by Segmentation - Part 1 by Brian Ritchie
Growth by Segmentation - Part 1 by Brian Ritchie
 
Tell Your Story - Brian Ritchie
Tell Your Story - Brian RitchieTell Your Story - Brian Ritchie
Tell Your Story - Brian Ritchie
 
Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

WiMAX_Intro

  • 1. 4G Integrated WiMAXA Detailed Introduction By BRIAN RITCHIE Twitter : brianritchie Facebook : facebook.com/brianritchie
  • 2. Who Am I ? Co worked on the Enterprise Architecture for some of the largest regional as well as international companies Rolled out the first official OSS Centre of Excellence strategy and implementation for a local Financial Institution Experience with large scale Project Management for core systems Designed and Implemented Research and Incubation Services for large scale corporations
  • 3. Agenda Introduction to WiMAX Introduction to Network Access Control Layers
  • 4. Before We Go Further !!! Case Study : How would you cope with the increased need for bandwidth delivered at lower costs to more subscribers ? Assume the technologies available to you are the following : Ethernet Wi-Fi Cell Towers, Base Stations, Data Centers, Traditional CDNs
  • 5. What is WiMAX ? A quick standards introduction
  • 6. What is WiMAX ? WiMAX = Worldwide Interoperability for Microwave Access Aim : To provide long distance wireless broadband for applications similar to the coverage and quality of service (QOS) of cellular networks Promotes the IEEE 802.16 standards
  • 7. What is 802.16 ? Wireless Standards in IEEE Project 802
  • 8. What is 802.16 ? IEEE 802.16 originally aimed to define fixed broadband wireless (FBW) May possibly replace the past wireless local loop (WLL) in telecommunications Able to deliver performance comparable to traditional cable, T1, xDSL, etc.
  • 9. What is 802.16 ? Advantages of 802.16 include : Quick and easy deployment especially for areas that are difficult to be wired. No physical limitations compared to wired infrastructure Cost effective for $/MB of data Increased security through multi-level encryption Highly scalable with significantly higher throughout
  • 10. Wireless Architectures What are the architectures behind WiMAX deployment
  • 11. Wireless Architectures There are two types of wireless deployment Point to Point (P2P) Point to Multipoint (PMP) How does Line of Sight (LOS) affect these architectures ?
  • 12. Wireless Architectures Point to Point (P2P) Architecture P2P is used where there are two points of interest Usually used for backend communication/data transfer (e.g: data center, co-lo, base stations) or as a point for distribution for PMP Higher throughput than PMP Transmitter Receiver
  • 13. Wireless Architectures Point to Multipoint (PMP) PMP is used primarily for distribution Able to serve hundreds of dissimilar subscribers simultaneously
  • 14. How does it affect WiMAX ? Previous wireless technologies could not server NLOS WiMAX functions best in LOS but is also able to serve NLOS with acceptable throughput which led to lower cost per subscriber because more subscribers could be served from one base station Line of Sight (LOS) Line of Sight (LOS) Non Line of Sight (NLOS)
  • 15. What is WiMAX ? Types of WiMAXdeployments and what its not
  • 16. Terminology Fixed WiMAX (IEEE 802.16d / 802.16-2004) Mobile WiMAX(IEEE 802.16e / 802.16e-2005) WiMAXvsWi-Fi
  • 17. Fixed WiMAX ( IEEE 802.16d ) The capability of Fixed WiMAX One of the major limitations was that this architecture was not mobile. Users were not able to transition data between base towers P2P : LOS = 30 Miles/48km , 72Mbps PMP : NLOS = 6 Miles/9.6km , 40Mbps
  • 18. Mobile WiMAX ( IEEE 802.16e ) The capability of Mobile WiMAX Enabled cell-phone like infrastructure on a large scale. This enabled users to move between base towers without loss of connection which allows for more mobile 0n-demand applications to be deployed
  • 20. Hardware Architecture End to End View on WiMAX hardware and the considerations
  • 21.
  • 22. Radio = Core, contains a transmitter (send) and receiver (receive), can be likened to a router/bridge
  • 23. Antenna = Broadcaster, connects to the WMAN networkLocated indoors Located indoors
  • 24. Advantages Advantage of Radio architecture – Radio is protected from weather extremes, this reduces interruptions/signal loss Advantage of Antenna architecture – optimizes the performance of the WMAN connection between transmitter and receiver
  • 25.
  • 26. The rule for deploying Heliax cables = shorter the better
  • 27. Heliax cables loses 1 dB for every 10 feet of cableWiMAX Radio Heliax Cables
  • 28.
  • 29. Sector – more focused, used more widely than Omni due to better performance
  • 30.
  • 31. Deployment Considerations Aspects to plan when deploying WiMAX technology
  • 32. Link Budget Link Budget – Performance of the WMAN connection Link Budget – Power received at each detector Prx = Ptx + Gtx – Apl + Grx – Am Where Prx= received power at detector (dBm) Ptx = transmitter output power (dBm) Gtx = transmitter antenna gain (dBi) Grx = receiver antenna gain (dBi) Apl = path loss (dB) Am = miscellaneous attenuation (link margin, diffraction loss, connector loss, physical object interference (eg : wall, glass, trees, etc) Transmitter Receiver
  • 33. Frequency Plan Logic Exercise Assuming you had a limit of three different frequencies for deployment to 9 base stations, how would you do it ? NOTE : Same frequencies in close proximity will cause interruption to your subscribers. Assume frequencies are deployed by their base station using Omni directional antennas with equal range radius
  • 34. Answer : This is also how cellular/wireless operators function with limited frequencies to cover the most surface area without interference to the user Frequency Plan
  • 35. Network Architecture How does WiMAX work from a networks perspective
  • 36. IEEE 802.16 Reference Model Scope of Standard CS SAP Management Entity Service Specific Convergence Sublayer MAC SAP Management Entity MAC Common Parte Sublayer MAC Network Management System Privacy Sublayer PHY SAP Management Entity PHY Layer PHY Management Plane Date/Control Plane
  • 37. IEEE 802.16 MAC MAC = Medium Access Control Has a PMP network topology with support for mesh network topology Backhaul can either be ATM = Asynchronous Transfer Mode or packet based (eg : IP Networks)
  • 38. IEEE 802.16 MAC Has three sub-layers in the Reference Model Service Specific Convergence Sublayer (CS) – Provides any transformation/mapping of external network data through the CS Service Access Point (CS SAP) MAC Common Part Sublayer (MAC CPS) – Classifies external network service data units (SDU) and associates these SDUs to propoer MAC Service flow and Connection Identifier (CID) Privacy (or Security) Sublayer – Supports authentication, secure key exchange and encryption
  • 39. IEEE 802.16e Handover Arch. In order to deal with mobility for the IEEE 802.16e, the MAC Layer specifies a MAC Layer Handover procedure Handover happens in 2 possible situations: When the mobile station (MS) moves and needs (due to signal fading/interference, etc) to change the base station (BS) that it is currently connected to, in order to provide better signal quality When the mobile station can be served with higher QOS at another base station
  • 40. IEEE 802.16e Handover Arch. Prior to handover, the network topology acquisition must be achieved in 3 steps : Network topology advertisement – A BS broadcasts info regarding the network topology which must be obtained from the backbone MS Scanning the neighboring BSs – BS can allocate time intervals for the MS to perform scans and once the BS is identified, MS may attempt to synchronize with its downlink connection and estimate quality of physical channel. Association – Optional initial ranging procedure during scanning interval with respect to one of the neighboring BSs and functions to enable MS to acquire and record ranging parameters and service availability info.
  • 41. IEEE 802.16e Handover Arch. Handover Procedure: Cell re-selection – MS uses BS info or may request scanning interval to evaluate interest in handover Handover decision and initiation – Handover begins with a decision from MS to switch from serving BS to target BS Sync to Target BS Downlink – MS first syncs downlink transmissions from target Bs to obtain parameters. If target BS received previous handover notice from serving BS via backbone, the target BS allocates a non-contention initial range opportunity Ranging – Target BS gets info from serving BS through backbone. MS and target BS will either conduct initial ranging or handover ranging to setup correct comm parameters Termination of MS context – Terminate service at serving BS.
  • 43.
  • 45. Mobile WiMax by Kwang and De Marca

Notes de l'éditeur

  1. - Before we delve in any further into WIMAX we need to understand a little more about the 802.16 standard.
  2. Here we can see the IEEE Project 802’S evolvement from the 802.11 WLAN to 802.16 to cope with the growing needs and demands for better bandwidth with lower cost
  3. It is a standard
  4. Why did it actually take off, what made people decide on this technology
  5. Here, before we delve any further into defining and understanding WIMAX, we need to take a step back and understand the different types of Wireless architectures that are required to enable this technology
  6. Be careful not to confuse this terms with peer to peer and/ project management professional
  7. Can anyone tell me why P2P has a higher throughput than PMP even though PMP has more users ?
  8. Imagine a user/police car/ambulance moving between towers and are still able to communicate via VOIP or Video
  9. [End of slide] While this gives you a brief overview of WiMAX, we will be back to go more indepth into its network Architecture. Lets first look into its Hardware Architecure
  10. PoE – Power over Ethernet
  11. CPE – Customer Premise Equipment
  12. Antenna gain relates the intensity of an antenna in a given direction to the intensity that would be produced by a hypothetical ideal antenna that radiates equally in all directions (isotropically) and has no losses.Although the gain of an antenna is directly related to its directivity, the antenna gain is a measure that takes into account the efficiency of the antenna as well as its directional capabilities. In contrast, directivity is defined as a measure that takes into account only the directional properties of the antenna and therefore it is only influenced by the antenna pattern. However, if we assumed an ideal antenna without losses then Antenna Gain will equal directivity as the antenna efficiency factor equals 1 (100% efficiency). In practice, the gain of an antenna is always less than its directivity.