Documente Academic
Documente Profesional
Documente Cultură
16
Said Abushamleh
Nizabat Khan
Georg Oberholzer
It is worth noting
that a concept of
mobile multihop
relay (MMR)
Base station networking has also
been introduced for
Relay station
PMP mode in
Subscriber station
IEEE 802.16e, which
Wireless link Mobile station
may expand the
(a) (b) coverage area and
enhance throughput
■ Figure 1. WiMAX network architectures: a) PMP mode; b) mesh mode.
through multihop
Figure 1. WiMAX network architectures: a) PMP mode; b) mesh mode [5]
paths.
Another important issue is how to support dif- example of the network topology is illustrated in
fixed stationsferent services
usually useandthe
applications in WiMAX and
higher frequencies net- Fig. 1a, where the
multiplexing) andWiMAX-OFDMA network includes frequency-
(orthogonal
works. Since WiMAX is a relatively new one BS and a number of SSs.
antennas with a highly directed beam. The respectively division multiple access). Except the -SC all modulations
standard, very little work has been conducted in On the other hand, mesh mode implies the
effective implementation
the literature. depends
In [2] theon national
authors regulations
provided a sur- are designedofforsupporting
requirement non-line-of-sight
multihop(NLOS) operation.
ad hoc net-
and available vey on the security schemes used in the
frequency bands. Most common areIEEE
the working by SSs. An example of a WiMAX mesh
OFDM offers thereby a very high spectrum efficiency and
licensed bands802.16-2001
of 2.5 andstandard
3.5GHz [1].andThey further analyzed
the unlicensed of 2.4 network
can handleis illustrated in Fig. 1b. Notice
multi-path-reflections and that in
changing channel
and 5.8GHz.the security flaws in the standard. Several this figure, we assume
characteristics. Thisthat BS can
is very provide access
important for mobile appli-
improvements have been proposed since then. to the Internet; a relay station (RS) is a special
cation. In OFDM the bandwidth of the channel can be
Nevertheless, we notice that the security mecha- type of SS that can forward traffic flows to BSs
nism of IEEE 802.16 is mainly focused on secu- configured
or other RSs;toanduse aany bandwidth
mobile station from
(MS)1.25MHz
is an SS to 20MHz.
2.2 Network rity instructure
the MAC layer, which may not be able to that can move in the network.
This bandwidth gets divided into 256 carriers whereby
provide sufficient security in multihop scenarios Compared
only 200 getto used,
PMP mode, mesh modesubcarriers
the remaining is more serve as
and satisfy the requirements of emerging appli- flexible and canDue
guard bands. be used
to thetorelatively
quickly deploy the
long symbol duration,
The WiMAX cationstechnology
in WiMAX supports two operation modes:
networks. infrastructure. In fact, a more general term for
In this
point-to-multipoint article
(PMP) andwemesh.
propose a secure and ser-
which is inverse proportional to the subcarrier spacing, one
mesh mode, wireless mesh network, has attracted
The PMP aims vice-oriented
at providing network control
a broadband framework
access for exam- for symbol
great has a quite
attention long
in the past duration.
few years A [3–5].
longerCur-symbol duration
ple access toWiMAX
a Internetnetworks. The main
service provider or motivation
as a backhaul of our
for rently, different
decreases IEEE standard
the probability of ISIgroups
(Interare work-interference)
symbol
GSM/UMTSstudy baseisstations.
that we need to take into account both
Point-to-multipoint organizes ing
andonICI
providing
(Inter wireless
carrier mesh support in aThis
interference). variety
aspect is very
the security concerns and the requirements of of networks, for
important including wireless
the use personal area net- applications
in non-line-of-sight
the nodes into a cellular structure
potential WiMAX applications.with a baseThe station (BS)
proposed works and wireless local area networks [5].
and several framework consists(SSc).
subscriber stations of twoThe important
channel compo-
get di- where multi-path propagation can lead to the mentioned
It is worth noting that a concept of mobile
vided into anents:
up- and downlink channel which get shared phenomena.
multihop relay (MMR) networking has also been
• A service-aware
among the SScs. All the SSccontrol
have toframework
be within the range introduced for PMP mode in IEEE 802.16e,
• A unified routing scheme which may expand the coverage area and
and in a LOS of the BS. A typical topology is illustrated in
In our study we show that the proposed frame- enhance throughput through multihop paths [5].
Fig. 1 (a). work is suitable for various application scenarios One of the motivations for the MMR scheme is
and canmode
In mesh operation provide sufficient
an ad securitycan
hoc topology from
be the net-
formed to overcome the problem that mesh mode is not
as illustratedwork perspective.
in Fig. 1 (b). AllIn the
addition
nodestoacttheasdesign
relaying of compatible with PMP mode.
the framework,
routers additionally we also
to the normal study amode.
operation number of key
Some of To summarize the existing architectures of
enabling technologies that are very important to WiMAX networks, we observe that multihop
these nodes the
can framework.
thereby act Ouras BSs and provide traffic for-
study can provide a guide- communications will become a basic feature in
warding to aline
different network. Mesh
to the design of a more mode is more
secure flexible
and practical the near future.
then PMP and WiMAX
can benetwork.
used to quickly establish the infras-
tructure. The rest of the article is organized as follows. Figure 2. OFDM Spectrum [9]
We firstbriefly review the architectures of CHALLENGES AND REQUIREMENTS IN
WiMAX networks. We then study the challenges
3. Layers and requirements in the design of the network NETWORK LAYER DESIGN
layer for WiMAX networks. Based on the analy- In the previous section we provide a brief review
sis, we propose and elaborate on a secure and Among the
of existing and200 subcarriers
proposed 192 are usedfor
architectures for data trans-
3.1 Physical Layer
service-oriented control framework. Within the WiMAX networks. In reality, to successfullyfor synchro-
mission and 8 as pilots. The pilots are used
proposed framework, we identify a number of deploy
nizationWiMAX
and fornetworks, a number ofThey
channel estimation. challeng-
are always mod-
The IEEEimportant technologies,
802.16 standards followed
supports fourbyspecifications
conclusions. ing issues
ulated must
with the be addressed.
relatively In this
robust BPSK.article
Thewe
data itself can
focus on two major issues in network layer
for the WiMAX air interface: Wireless-MAN-SC (single be modulated optionally with BPSK, QPSK,
design: security, and support of existing and
16 QAM or 64
WIMAX
carrier), -SCa, -OFDMN(orthogonal
ETWORK Afrequency-division
RCHITECTURES QAM. [3]
future applications.
According to the IEEE 802.16 standard [1], In the rest of this section we first discuss the
WiMAX technology supports two operation common requirements of security in WiMAX
modes: PMP and mesh. A WiMAX PMP net- networks and possible attacks to WiMAX net-
work aims at providing last-mile access to a works. We then address the current and poten-
broadband Internet service provider (ISP). An tial application scenarios of WiMAX networks.
3.2 MAC Layer up- and download.
But because FDD is not efficiently occupying the band-
The specification allows several possibilities to divide width in case of asymmetric data exchange, most WiMAX
the channel in down- and uplink: TDD, FDD and half- applications implement TDD. Additionally the complexity
duplex FDD. of TDD is lower as the one of FDD which also leads to a
cheaper implementation of the first mentioned.
4 Features of WiMAX
The downlink starts with a long preamble followed 4.2 High Security
by a header and the data bursts. The preamble is used
to synchronize and to estimate the channel. It’s made up WiMAX supports AES (Advanced Encryption Standard)
of two symbols of QPSK modulation. The first symbol and 3DES (Triple DES, where DES is the Data Encryp-
uses 50, the second 100 of the subcarriers. The header tion Standard). By encrypting the links between the BS and
contains information about the system and burst profile to the SS, WiMAX provides subscribers with privacy (against
help correct decoding. And finally contains the data bursts eavesdropping) and security across the broadband wireless
control messages and 12 to 108 bytes payload. Within interface. Security also provides operators with strong pro-
each data burst the same modulation is used but can change tection against theft of service. WiMAX also has built-in
from burst to burst. Thereby the one with the most robust VLAN support, which provides protection for data that is
modulation gets sent first followed by the next less robust being transmitted by different users on the same BS.
one.
4.3 WiMAX QoS
The uplink frame consists of several Uplink subframes
where each one starts with a short preamble of the length The characteristics of the wireless channel which are
of a single OFDM symbol which again is needed to very variable on a time-dependent basis and a location-
synchronize transmitter and receiver. dependent basis cause a challenge for Quality of Service
QoS support in IEEE 802.16 networks, the solution is
To reduce the requirements for the transmitter and to deal with QoS in wireless networks at the medium
receiver all symbols are transmitted with the same power. access control MAC layer, which still has a problem in
The preamble symbols are transmitted with 3dB more its analysis in the research literature, however, the MAC
power then the other symbols to make it easier for the protocol is connection-oriented, in other words, all data
receiver to demodulate and decode correctly. Therefor a communications for transport and control, are in the context
transmit power level control is needed due to the variation of a unidirectional connection, at the start of each frame,
in needed power for the different modulations. the BS schedules the uplink and downlink grants in order
to meet the QoS requirements.
WiMAX also offers to use of frequency division mul- As mentioned above, the basic MAC mechanisms defined
tiplexing (FDD) and half-duplex FDD. The difference be- by 802.16 are related to QoS support in IEEE 802.16, to
tween these two is, that in full duplex a terminal can receive share the wireless medium; two modes for sharing are
and transmit simultaneously while in half duplex FDD only defined by IEEE 802.16; point-to-multipoint PMP mode
one of the two transmission is allowed at a given time. In and mesh mode.
the case of FDD to different frequency bands get used for
Figure 4. frame structure with FDD and TDD
In PMP mode, the base station BS serves a set of DIUC and uplink IUC UIUC transmissions, any SS can
subscriber stations SSs within the same antenna sector, so adapt over time the IUC in use.
all SSs receive the same data transmitted, transmissions
from SSs are directed to and centrally oriented by the BS.
PMP mode is very good for fixed BWA applications, for By decoding UL-MAP message each SS will learn
example the Internet and Digital Video Broadcasting DVB its boundaries in the uplink subframe, for the expected
where multi SSs can be served by one centralized service downlink subframe the DL-MAP message contains the
provider. In the mesh mode, traffic is routed through other timetable of the downlink grants. For both FDD and TDD
SSs. methods, DL-MAP and UL-MAP are transmitted by the
Data transmissions in PMP mode occur in separate time BS at the beginning of each downlink subframe.
frames for both uplink (SS to BS) and downlink (BS to SS), The following figure shows the downlink queues that
BS transmits a burst of MAC protocol data units PDUs in contain downlink service data units to be transmitted to
the downlink subframe and the transmission is broadcast so SSs, the downlink scheduler selects the next SDUs on a
all SSs listen to the data transmitted by the BS. However, frame basis depending on the status of the queues and QoS
PDUs are processed only in the addressed SS or all of SSs parameters.
if they are transmitted for all addresses. Time Division The 802.16 document states that the definition of the
Multiple Access method is used in transmitting a burst of scheduling algorithm for both BS and SS is not related to
MAC PDUs to the BS. the standards but to the manufactures, the 802.16 MAC
By considering the Interval Usage Code IUC (A term used specifies four different scheduling services in order to meet
in IEEE 802.16 networks to identify a particular burst the QoS requirements:
profile that can be used by both a downlink and uplink Unsolicited Grant Service UGS: which is designed to sup-
transmission interval.), which is related to modulation, port real time applications such as T1/E1 and VoIP, these
rate, and forward error correction FEC (Forward Error applications generate fixed size data packets at periodic
Correction (FEC) is a type of error correction which intervals, this design considers exact delay requirements.
improves on simple error detection schemes by enabling real-time-Polling-Service rtPS: which is designed to
the receiver to correct errors once they are detected. This support real time applications such as Moving Pictures
reduces the need for retransmissions.), in downlink IUC Expert Group MPEG video and VoIP, these applications
generate variable size data packets at periodic intervals,
Figure 5. QoS functions within the BS and SSs
this design does not consider exact delay requirements. 4.5 Interoperability
non-real-time-Polling-Service nrtPS: like rtPS, it does
not require exact delay requirements, the main difference
between the rtPS and nrtPS is that nrtPS can reserve a WiMAX is based on international, vendor-neutral stan-
minimum amount of bandwidth so it can be used for dards, which make it easier for end-users to transport and
bandwidth intensive applications such as a File Transfer use their SS at different locations, or with different service
Protocol (FTP). providers. Interoperability protects the early investment of
Best Effort BE: refers to a network service that attempts an operator since it can select equipment from different
to deliver messages to their intended destinations but equipment vendors, and it will continue to drive the costs
which does not provide any special features that retransmit of equipment down as a result of mass adoption.
corrupted or lost packets. Thus, there are no guarantees
regarding delivery. Also it does not require exact delay
requirments. 4.6 Portability
WiMAX is based on an open, international standard. Since WiMAX networks can cover a relatively large
Mass adoption of the standard, and the use of low-cost, area, it is natural to imagine that many group communi-
mass-produced chipsets, will drive costs down dramatically, cations, such as video conferences, will be important ap-
and the resultant competitive pricing will provide consider- plications in WiMAX networks. To support such commu-
able cost savings for service providers and end-users. nication scenarios, multicast is the key technology. In the
past, Internet multicast has not been successful due to its
4.9 Wider Coverage complexity and, more important, because Internet multicast
requires global deployment, which is virtually impossible.
In a WiMAX network, however, since all nodes are located
WiMAX dynamically supports multiple modulation lev- inside, implementing such group communication becomes
els, including BPSK, QPSK, 16-QAM, and 64-QAM. When possible.
equipped with a high-power amplifier and operating with
a low-level modulation (BPSK or QPSK, for example),
WiMAX systems are able to cover a large geographic area 5.3 Metropolitan Area Distributed Service
when the path between the BS and the SS is unobstructed.
With the deployment of WiMAX networks, more and
4.10 Non-Line-of-Sight Operation more value-added services can be provided in a metropoli-
tan area. To efficiently support a large number of customers,
NLOS usually refers to a radio path with its first Fresnel distributed services can be enabled. In other words, a cus-
zone completely blocked. WiMAX is based on OFDM tech- tomer can access the service from any of the servers in
nology, which has the inherent capability of handling NLOS the network in which these servers are distributed to serve
environments. This capability helps WiMAX products de- the entire metropolitan area. To enable distributed service,
liver broad bandwidth in a NLOS environment, which other there is a novel routing framework in the network layer,
wireless product cannot do. multicast routing. In this scheme the customer does not
need to specify the exact address of a server in the net-
work. Instead, it only needs to indicate the service it wants
4.11 High Capacity to access. Moreover, in such a communication scenario, the
client can communicate with a subset of all the servers in
Using higher modulation (64-QAM) and channel band- order to achieve better reliability and security.
width (currently 7 MHz, with planned evolution towards the
full bandwidth specified in the associated IEEE and ETSI 5.4 Military Applications
standards), WiMAX systems can provide significant band-
width to end-users.
As WiMAX uses higher frequencies than current mili-
tary and commercial communication systems, existing an-
5 Applications tennas towers can ”share” a WiMAX cell tower without
compromising the current communications services. Such
In this section we study the existing applications and sev- implementation can be used to deploy WiMAX to increase
eral potential scenarios that have been proposed in the lit- bandwidth for specific data-intensive applications within
erature. It is important to note that to fulfill the require- an existing network. Furthermore, integration of WiMAX
ments of these applications, study and functionality of net- waveforms are already developed for Software Defined Ra-
work layers is necessory. dios (SDR), this radio is planned to support Soldier Ra-
dio Waveforms covering the Wi-Fi at 2.4 GHz. WiMAX
can also be used to support training areas, providing an in-
5.1 Internet Access frastructure for realistic integration of live training and war
games simulation. An initial deployment of WiMAX has
Internet access will still be the major demand in WiMAX already been constructed by the US Army Fort Dix. The
networks, especially when they are newly deployed. To sup- U.S. Army is testing pre-standard WiMAX gear and Xacta
port Internet access, a straight forward method is to provide Secure Wireless system from Telos Corp. in Fort Carson
a unicast connection between SSs and the BS, which has the in Colorado for point-to-point and point-to-multipoint com-
link toward the Internet. munications.
Figure 6. WiBro network architecture
References