Sie sind auf Seite 1von 6

International Journal of Computer Applications (IJCA) (0975 8887) International Conference on Advances in Computer En ineerin !

! Applications (ICACEA"#0$%) at I&'EC( )*+

Wimax - An Emerging Technology over Wi-Fi


Vidushi Agarwal
Uttar Pradesh Tech. University Student, RKGITW Ghaziabad (U.P.)

Shaifali Agrawal
Uttar Pradesh Tech. University Student, RKGITW Ghaziabad (U.P.)

Anil Kumar Gankotiya


Uttar Pradesh Tech. University Assistant Professor, RKGITW Ghaziabad (U.P.)

vidushiagarwal26@gmail.com shaifaliagrawal21@gmail.com

anilgankotiya@ieee.org

ABSTRACT
The aim behind Wireless Broadband technology is the support of mobile clients within a certain range as well as the provision of a wireless network infrastructure in places where wired networks are not feasible or possible. We have seen that in remote inaccessible areas wired networks are not at all cost effective. Wireless networking has offered us an alternative solution for such problem of information access. They have definitely changed the way people communicate and share information among themselves by overcoming problems nowadays associated with distance and location. This paper presents a description of the existing wireless technology WiFi and WiM !" and tries to compare Wi-Fi #$%%%&'(.))* and WiM ! #$%%% &'(.)+* with a result of WiM ! as an emerging technology over Wi-Fi. The description and emphasis is based on ,uality of -ervice as a factor.

IEEE 802.11 !I"#I$


Wi-Fi stands for Wireless Fidelity and is primarily a local area networking #6 /* technology designed to provide in-building broadband coverage. $t is a popular technology which allows any electronic device to exchange and transfer data wirelessly over the network giving rise to high speed internet connections 375. Wi-Fi enabled devices operate in unlicensed spectrum. They use radio technologies within the range of an access point for data communication. -uch an access point #or hotspot* has a range of about (' meters #+1 feet* indoors and a greater range outdoors. 8otspot coverage can comprise an area as small as a single room with walls that block radio waves" or as large as many s2uare miles achieved by using multiple overlapping access points. Wi-Fi can also be used to create a mesh network. Wi-Fi enables devices to connect directly with each other as it allows peer-to-peer connectivity. complete structure of Wi-Fi network is as shown in fig.)0 #%& 1' !%"#% Ne(wor)

General Terms
.ommunication /etworks" Wireless /etworks.

Keywords
ccess point" M ." ,o-" Triple play" Wi-Fi" WiM !

INTRODUCTION
$%%% has developed various wireless standards aiming the support of mobile clients within a certain range as well as the provision of a wireless network infrastructure in places where wired networks are not feasible or possible. -ome of the deployed wireless standards are0 &'(.)1 #Bluetooth*" &'(.)) #Wi-Fi*" and &'(.)+ #WiM !*. $%%% &'(.)) also known as Wi-Fi standards has had a lot of commercial success" for this reason now the focus of wireless networking shifting to the wide area market. Wi-Fi fulfills the re2uirements for home or office connectivity but since our market is wide enough therefore WiM ! #Worldwide $nteroperability for Microwave ccess*" a low cost wireless has been considered as its solution. Many service providers had adopted this technology as a 2uick and cheap option to provide connectivity between access points or base stations and their backbone network 345. The main goal of WiM ! is to provide cheap and fast connectivity of both voice and data communication to remote and difficult terrain locations. WiM ! #Worldwide $nteroperability for Microwave ccess* is similar to the wireless standard known as Wi-Fi" but on a much larger scale and at faster speeds. WiM ! has a M . layer which is very flexible in nature and can entertain different types of traffic such as voice" video and multimedia which results in high ,uality of -ervice. $t also provides security functions such as strong encryption and mutual authentication 3))5.

IEEE 802.11a
The $%%% &'(.))a operates in 198: band with a maximum data rate of 1;Mbps. $t originally had )(<)7 non-overlapping channels" out of which )( can be used in indoor and ;<1 of the )( can be used in outdoor point to point configurations. &'(.))a is not interoperable with &'(.))b as they operate on separate fre2uency bands. The &'(.))a signals cannot pervade as far as those for &'(.))b because they get absorbed by walls and other solid ob=ects in their path very fast. s the path loss in signal strength is proportional to the s2uare of the signal fre2uency therefore &'(.))b is used.

IEEE 802.11*
$t is the most widely deployed wireless network within the &'(.)) wireless families and successful due to its high data

34

International Journal of Computer Applications (IJCA) (0975 8887) International Conference on Advances in Computer En ineerin ! Applications (ICACEA"#0$%) at I&'EC( )*+ rates of )) Mb<s - range of )'' m to a maximum of a few hundred meters" operates on (.; 98: unlicensed band. $t is a direct extension of the >--- #>irect-se2uence spread spectrum* modulation techni2ue 3+5. subscriber" in )' M8: of spectrum" but typical data rates will be 7 - 1 Mbps.

Bene.%(s
8ere are some benefits of using WiM !0 $t enables operators to offer triple-play services such as voice" data and video. $t enables high speed voice and data transfer over long distances in remote and scarcely populated areas as well as in densely populated areas 3(5. $t is the technology of choice to offer both fixed and mobile applications. $t is a combination of low cost and flexibility by installing few wireless base stations providing coverage to the surrounding area. $t offers uploading of large files.

IEEE 802.11&
$t works in the (.; 98: band #like &'(.))b* but operates at a maximum raw data rate of 1; Mbit<s and has similar range and characteristics as the &'(.))b. The &'(.))g has backward compatibility with &'(.))b and differs only on the modulation techni2ue i.e." it uses ?rthogonal Fre2uency >ivision Multiplexing #?F>M* 3@5.%ven though &'(.))g operates in the same fre2uency band as &'(.))b" it can achieve higher data rates because of its heritage to &'(.))a.

IEEE 802.1+ !I,A-$


WiM ! stands for AWorld $nteroperability for Microwave ccessB. $t was created by the WiM ! Forum which describes it as a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and >-6 3)(5. WiM ! is gaining popularity as a technology which delivers carrier-class" high speed wireless broadband at a much lower cost while covering large distance than Wi-Fi. $t delivers high speed data communication" and also has the ability to maintain dedicated links and Co$D services at a reliable and high 2uality speed. $t allows a subscriber to connect to a wireless $nternet service provider even when they are outside their offices or homes. The basic model of WiM ! is shown in fig. (0

Uses
Following are some of the applications of WiM !0 $t can be deployed in any terrain across all geographical areas. $t provides a wireless alternative to cable and >-6 as it is used to connect Wi-Fi hotspots with each other and to other parts of the $nternet. $t can be used as a backup links where the traditional wired links breaks. WiM ! antenna can also be directly connected to an internet backbone using a fibre optic cable. $t can be used in disaster recovery scenes where the wired networks have broken down.

#%& 2' !%,A- Ne(wor) WiM ! mainly operates in two fre2uency ranges0 8igh Fre2uency Eange #6ine of -ight #6?-**0)'-++ 98: at a range up to 1' km #7' miles*. 6ow Fre2uency Eange #/on 6ine of -ight #/6?-**0(-)) 98: at a range up to + - )' km #; - + miles* for fixed customer premises e2uipment #.D%*.

/UA0IT1 O# SER2ICE
The word ,uality is always defined as the degree to which a set of inherent characteristics fulfills a particular re2uirement. $n the field of networking it could be termed as the probability of a packet successfully passing between two points in the network 3);5. $t is an ability of a network element #e.g. an application" host or router* to have some level of assurance that its service and traffic re2uirements would always be satisfied. %very transmission can be negotiated between the server and the client" based on parameters like bandwidth" throughput" delay" =itter and loss 3)'5. $f the parameters provided by the server do not meet the re2uirements of the client" the connection may be refused.

Both the fixed and mobile standards of WiM ! include the licensed #(.1" 7.1" and )'.1 98:* and unlicensed #(.; and 1.& 98:* fre2uency spectrum. 8owever" the fre2uency range for the fixed standard covers ( to )) 98: while the mobile standard covers below + 98:. >epending on the fre2uency band" it can be Fre2uency >ivision >uplex #F>>* or Time >ivision >uplex #T>>* configuration. The data rates for the fixed standard will support up to @1 Mbps per subscriber in (' M8: of spectrum" but typical data rates will be (' to 7' Mbps. The mobile applications will support 7' Mbps per

35

International Journal of Computer Applications (IJCA) (0975 8887) International Conference on Advances in Computer En ineerin ! Applications (ICACEA"#0$%) at I&'EC( )*+

3arame(ers

-ome of the important parameters related to ,o- are0 To use this option" devices must first send a traffic profile describing bandwidth" latency" and =itter re2uirements. $f the access point does not have sufficient resources to meet the traffic profile" it will return a busy signal. True consistent delay services can be provided with the optional Wi-Fi -cheduled Multimedia #W-M*.

,ela-.
The time taken by the packets to reach from source to destination is termed as delay. $nteractive applications such as video conferencing" web cast and telephony are particularly sensitive to delay. $f the delay is not constant for a given stream across the network" the receiver not only experiences delay but also =itter in the delay.

/oS Ser5%6e Classes %n !%,AThe ,o- is granted on the basis of type of application and service under consideration. For example" a user sending an email needs no real-time data stream like another user having a Coice over $D #Co$D* application. To provide the service parameters respectively" the traffic management is necessary. There are four main service classes named as F9-" rtD-" nrtD-" B% but a fifth type ,o- service class is added in &'(.)+e standard" named as0 extended real-time Dolling -ervice #ertD-*3;5. These services are prioriti:ed in decreasing order. Within all these classes of services resources are allocated to manage and satisfy the ,o- of higher priority services. $n general" $%%% &'(.)+ has five ,o- classes 315. Table ) broadly classifies various service classes defined in WiM ! and its applications. Ta*le 1. /oS Ser5%6e Classes %n !%,A-

Jitter.
$t is termed as the variation in delay. Measuring =itter is critical element to determine the performance of network and the ,o- the network offers. $t is the variation in the time between packets arriving.

&ean data rate.


This specifies the average data rate" i.e. the amount of data that will be normally sent through the network per unit time" specifying the traffic communication needs in terms of the bandwidth re2uired.

/ea0 data rate.


This specifies the maximum allowable data rate.

12rou 2put.
$t is the measure of number of packets successfully delivered in a network which is measured in terms of packets<second. The value of throughput should be high or else it affects every service class defined in WiM !.

O4era(%n& ,odes (o Im4ro5e Ser5%6e o. 2o%6e


The &'(.))e standard includes two operating modes" either of which can be used to improve service for voice0

3i"4i &ultimedia E5tensions (3&E).


This uses a protocol called %nhanced Multimedia >istributed .ontrol ccess #%>. *" which is an enhanced version of the >istributed .ontrol Function #>.F* defined in the original &'(.)) M .. The enhanced part is that %>. will define eight levels of access priority to the shared wireless channel. 6ike the original >.F" the %>. access is a contention-based protocol that employs a set of waiting intervals and back-off timers designed to avoid collisions. ll stations use the same values in >.F and hence have the same priority for transmitting on the channel. While with %>. " each of the different access priorities is assigned a different range of waiting intervals and back-off counters. Transmissions with higher access priority are assigned shorter intervals. $t also includes a packet-bursting mode that allows an access point or a mobile station to reserve the channel and send 7- 1 packets in se2uence.

!I"#I AND !I,A-' CO,3ARISON


Wi-Fi is basically an implementation of wireless local area network within a short range like a small building" a college or an institutional campus. WiM ! on the other hand is a metropolitan technology whose ob=ective is to interconnect houses" buildings or even hot spots to allow communication between them and with other networks. Wi-Fi has problems with interference and throughput and that is why triple play #voice" data" and video* technologies cannot be hosted on traditional Wi-Fi while &'(.)+ uses a scheduling algorithm which allows the user to only compete once for the access point. This gives WiM ! inherent advantages in throughput" latency" spectral efficiency" and advanced antenna support.

3i"4i 'c2eduled &ultimedia (3'&).


W-M operates like the Doint .ontrol Function #D.F* defined with the original &'(.)) M .. $n W-M" the access point periodically broadcasts a control message that forces all stations to treat the channel as busy and not attempt to transmit. >uring that period" the access point polls each station that is defined for time sensitive service 6

36

International Journal of Computer Applications (IJCA) (0975 8887) International Conference on Advances in Computer En ineerin ! Applications (ICACEA"#0$%) at I&'EC( )*+

3arame(ers o. Com4ar%son
-ome parameters on the basis of which Wi-Fi and WiM ! are compared are listed below.

feasible solution. -o markets of wireless $-D are in a threat now days.

3i"4i &es2 ;et<or0.


The idea of a radio mesh network is that messages can be relayed through a number of access points to a central network control station. $t is mainly used to support public safety applications and also to provide $nternet access to end users. 8owever" mesh technologies are not within the range of the Wi-Fi standards.

7an e.
Wi-Fi provides local network access for around a few hundred feet with speeds of upto 1; Mbps while a single WiM ! antenna has a range of upto ;' miles with speeds of @' Mbps or more 3)75.

'cala8ilit-.
Wi-Fi supports one to tens with one subscriber for each .D% device and has a fixed channel si:e of (' M8: while WiM ! supports from one to hundreds of .D% with unlimited subscribers and has a flexible channel si:e from ).1 M8: to (' M8:.

3i&A= &ar0et.
t this moment the market goals of WiM ! are not clear. But the ma=or goal will be broadband wireless access or Wireless >-6. But it will succeed only if it provides lower cost service and also provide some extra features which the other broadband like >-6 do not provide. Wi-Fi has problems with interference and throughput and that is why triple play #voice" data" and video* technologies cannot be hosted on traditional Wi-Fi while &'(.)+ uses a scheduling algorithm which allows the user to only compete once for the access point. This gives WiM ! inherent advantages in throughput" latency" spectral efficiency" and advanced antenna support. Wi-Fi is basically an implementation of wireless local area network within a short range like a small building" a college or an institutional campus. WiM ! on the other hand is a metropolitan technology whose ob=ective is to interconnect houses" buildings or even hot spots to allow communication between them and with other networks. The WiM ! standard goal is not to replace Wi-Fi in its applications but rather to supplement it in order to form a wireless network web. >espite the similarity in e2uipment cost" WiM ! technology re2uires a costly infrastructure in contrast to Wi-Fi which can easily be installed using low cost access points. Table ( describes the differences between Wi-Fi and WiM ! based on certain features 3)5. Ta*le 2. Com4ar%son *e(ween !%"#% 7 !%,A-

7adio 1ec2nolo -.
The $%%% &'(.)) W6 / standards describe four radio link interfaces that operate mainly in unlicensed radio band having range from (.; 98: to 1 98: while WiM ! can operate in both licensed and unlicensed spectrum and operate between ( 98: and )) 98:.

Efficienc-.
For $%%% &'(.))b maximum channel bandwidth is (1 Mh: and for $%%%&'(.))a<g it is (' Mh:. Wi-Fi works at (.@ bps<8: and can peak upto 1; Mbps in ('Mh: channel while WiM ! works at 1bps<8: and can peak upto )'' Mbps in a (' Mh: channel.

&a5imum Covera e 7an e.


Wi-Fi supports very limited range of coverage and is mainly designed for indoor use. ?ptimi:e range of this technology is around )'' meters while WiM ! ranges & km #/6?-* to 1' km #6?-*.

'ecurit-.
-ome encryption techni2ues used in Wifi are-

3ired E9uivalent /rivac- (3E/).


n E.;-based ;'- or )';-bit encryption techni2ue and is easy to break 3&5.

3i"4i /rotected Access (3/A).


new standard from Wi-Fi alliance that uses ;' or )'; bit W%D key.

IEEE 80#6$$i:3/A#.
$t is an $%%% standard which will be based on a more robust encryption techni2ue called the dvanced %ncryption -tandard. ll the data that is transmitted in WiM ! network is virtually encrypted. The main encryption techni2ue that is used here is )+&-bit >igital %ncryption -tandard #7>%-* and %- # dvanced %ncryption -tandard*.

&ar0et Comparison.
-ome market oriented works which have been established for Wi-Fi service are Wireless $-Ds and Wi-Fi mesh networks.

3ireless I'/s (3I'/s).


The idea behind Wireless $-D #W$-D* is to provide an $nternet access service using W6 / technology and a shared $nternet connection in a public location designated a hot spot. TMobile and Wayport are currently providing this type of service. From a technical viewpoint" to access the internet you have to be within the hot spot. From a business viewpoint" users have to pay monthly basis for the internet then the users have to be in the hot spot always to access the internet which is not a

CONC0USION
This paper has presented a precise description of two of the most prominent developing wireless access networks &'(.))

37

International Journal of Computer Applications (IJCA) (0975 8887) International Conference on Advances in Computer En ineerin ! Applications (ICACEA"#0$%) at I&'EC( )*+ #Wi-Fi* and &'(.)+ #WiM !* that provide alternative solution to the problem of information access in remote inaccessible areas where wired networks are not cost effective. 6imited range and data capability of Wi-Fi helps WiM ! to make a promise of taking high speed wireless out of the coffee shop to the road and everywhere. The main advantage of the WiM ! technology is that it is flexible. Measurement of ,o- is essential for any WiM !<broadband wireless communication. Today in broadband wireless access #BW * the perception is that as adoption grows" so does the need for guaranteeing a good ,o-. This work has proved that the WiM ! standard goal is not to replace Wi-Fi in its applications but rather to supplement it in order to form a wireless network web. /icolas Fourty" Thierry Cal" Dhilippe Fraisse" Hean-Hac2ues Mercier" L.omparative analysis of new high data rate wireless communication technologies LFrom Wi-Fi to WiM !L"L icasicns" p. ++" Hoint $nternational .onference on utonomic and utonomous -ystems and $nternational .onference on /etworking and -ervices - #icas-icnsM'1*" (''1.B Michael F. Finneran" AWiM ! versus Wi-Fi comparison of Technologies" Markets and Business DlanB" dBrn ssociates" $nc"http0<<www.searchnetworking.techtarget.com<search /etworking<downloads<Finneran.pdf" last visited February ('" (''@. Eensburg" H.H" A$nvestigation of the >eployment of &'(.)) Wireless /etworksB" M.-c Thesis. Fniversity of Ehodes0 9hramstown" -outh frica #(''+*. 3)'5 Eohit . Talwalkar" Mohammad $lyas " A nalysis of ,uality of -ervice #,o-* in WiM ! networksB" $.?/ $%%% (''&" )(-); >ec. (''&" pp. )-&. 3))5 >.C. .handra -hekar" C. H." LWireless security0 comparative analysis for the next generation networksL" Hournal of Theoretical and pplied $nformation Technology #(''1-(''&*" pp. &((-&7). 3)(5 Mr. -an=eev Iumar .houdhary" Mr. -an=ay Iumar >ubey" Mr. Eamesh 9upta"BWiM ! Technology0 -ecure Broadband .onnectivity for 9overnments" Military -ervices in Eural<-trategic $solated 6ocationsB" $nternational Hournal of dvanced Eesearch in .omputer -cience and -oftware %ngineering Colume 7 $ssue +" Hune (')7. 3);5 Ming-.hieh Wu"B comparison of Wi-Fi and WiM !B with case studies" MasterMs thesis" Florida state Fniversity" (''@. 3)15 8ou" H." 8u" .." Iim" 8." and 9e" K" B,o- provisioning in $%%% &'(.))- compliant networks Dast" present and futureB" Fniversity of $llinois" ?ctober (''+.

RE#ERENCES
-ourangsu Baner=i" Eahul -ingha .howdhury"BWi-Fi G WiM !0 .omparative. -tudyB" $ndian Hournal of %ngineering" Col.(" $ssue. 1" (')7. Cikas -olomon bel" Eodney Eambally"B WiM ! and Wi-Fi in .urrent WorldB. .F.M -ultanul Iabir" Md.Ea:ib 8ayat Ihan" bul hsan Md.Mahmudul 8a2ue and Mohammad -aiful $slam Mamun"B WiM ! or Wi-Fi0 The Best -uited .andidate Technology for Building Wireless ccess $nfrastructureB. Cikram Mehta" >r. /eena 9upta"BDerformance nalysis of ,o- Darameters for WiM ! /etworksB" $nternational Hournal of %ngineering and $nnovative Technology #$H%$T* Colume )" $ssue 1" May (')(. Jakhia bichar" Kanlin Deng" and H. Morris .hang"BWiM !0 The %mergence of Wireless BroadbandB" $T Dro maga:ine $%%% computer society" Huly- ug. (''+" pp. ;;-;&. $ntel" AWhite Daper0 Fnderstanding Wi-Fi and WiM ! as Metro- ccess -olutionsB" http0<<www.intel.com<netcomms<technologies<wimax<7';;@). pdf"last visited February (;" (''@.

38

International Journal of Computer Applications (IJCA) (0975 8887) International Conference on Advances in Computer En ineerin ! Applications (ICACEA"#0$%) at I&'EC( )*+

39

Das könnte Ihnen auch gefallen