Sie sind auf Seite 1von 73

INVESTIGATION INTO THE APPLICATIONS OF WiMAX STANDARDS

DEPLOYED BY TELECOMMUNICATIONS SERVICE PROVIDERS IN

NIGERIA

BY

ADEWOLE ABOSEDE ABOLANLE

(TP08/09/H/2442)

A PROJECT SUBMITTED IN PARTIAL FULFILMENT OF THE

REQUIREMENTS FOR THE AWARD OF THE DEGREE OF MASTER OF

TECHNOLOGY

IN

THE DEPARTMENT OF ELECTRONICS TELECOMMUNICATION

ENGINEERING, FACULTY OF TECHNOLOGY,

OBAFEMI AWOLOWO UNIVERSITY CAMPUS


ILE-IFE, NIGERIA

2010

ACRONYM AND ABBREVIATIONS

AAA Authentication, Authorization, and Accounting

AAS Advanced Antenna Systems

ADSL Asymmetric Digital Subscriber Loop

AES Advanced Encryption Standard

ARQ Automatic Repeat Request

ASN Access Services Network

ASP Application Service Provider

BPSK Binary Phase Shift Keying

BWA Broadband Wireless Access

CCK Complementary Coded Keying

CLEC Competitive Local Exchange Carrier

CSMA/CA Carrier Sense Multiple Access with Collision Avoidance

CSMA/CD Carrier Sense Multiple Access with Collision Detection (Ethernet)

DCF Distributed Control Function

DES Digital Encryption Standard

DS-CDMA Direct Sequence Code Division Multiple Access

DSL Digital Subscriber Line

DSSS Direct Sequence Spread Spectrum

EDCA Enhanced Distributed Control Access

ETSI European Telecommunications Standards Institute


EV-DO Enhanced Version-Data Only (Data Optimized)

FBWA Fixed Broadband Wireless Access

FCC Federal Communications Commission

FDD Frequency Division Duplex

FDX Full Duplex

FEC Forward Error Correction

FHSS Frequency Hopping Spread Spectrum

GPRS General Packet Radio Service

GPS Global Positioning System

3GPP Third generation Partnership Project

GSM Global System for Mobile Communication

Hz Hertz

HARQ Hybrid-ARQ

HFDD- Half-Duplex Frequency Division

HIPERMAN- High-Performance Metropolitan Area Network

HSDPA- High-Speed Downlink Packet Access

HUMAN- High-speed Unlicensed Metropolitan Area Network

IEEE- Institute of Electrical and Electronic Engineers

IETF- Internet Engineering Task Force

ILEC- Incumbent Local Exchange Carrier

ISDN- Integrated Services Digital Network

ISM- Industrial, Scientific, and Medical

ITU- International Telecommunications Union

LAN- Local Area Network

LTE- Long Term Evolution

LR- Location Register

LS- Least Squares


MAC- Media Access Control

MBS- Multicast Broadcast Service

MC- Multiple Carrier

MIMO- Multiple Input-Multiple Output

MMDS- Multi-channel Multipoint Distribution Service

MMS- Multimedia Messaging Service

MPDU- MAC Protocol Data Unit

MS - Mobile Station

NLOS - Non-Line-of-Sight

NWG - Network Working Group

OFDM - Orthogonal Frequency Division Multiplexing

OFDMA- Orthogonal Frequency Division Multiple Access

PAN- Personal Area Network

PCF- Point Control Function

PoP- Point of presence

QoS- Quality of Service

QPSK Quadrature Phase Shift Keying

RC4- Ron.s Code-4

SCDMA- Synchronous Code Division Multiple Access

SAE- System Architecture Evolution

SIM- Subscriber Identity Module

SONET- Synchronous Optical Network Interface

SSID- Service Set Identifier

STC- Space Time Coding

TDD- Time Division Duplex

TKIP- Temporal Key Integrity Protocol

UE- User Equipment


UEA1- UMTS Encryption Algorithm 1

UEA2- UMTS Encryption Algorithm 2

UIA1- UMTS Integrity Algorithm 1

UIA2- UMTS Integrity Algorithm 2

UMTS- Universal Mobile Telecommunication System

U-NII- Unlicensed National Information Infrastructure

VoIP - Voice over IP

VPN - Virtual Private Network

WBA- Wireless Broadband Access

WCDMA Wideband Code Division Multiple Access

WEP - Wired Equivalent Privacy

Wi-Fi- Wireless Fidelity

WiMAX- Worldwide Interoperability for Microwave Access

WISP- Wireless Internet Service Provider

WLAN- Wireless Local Area Network

WMAN- Wireless Metropolitan Area Network

x-QAM x-level Quadrature Amplitude Modulation

ZF- Zero Forcing


ABSTRACT

The world of wireless telecommunication is evolving rapidly. This thesis is on the

“Investigation into the applications of WiMAX Standards deployed by telecommunications Service

Providers in Nigeria”. The Broadband Wireless Access Industry that provides high-rate network

connections to fixed sites had matured to the point that it has Standards for Third-Generation (3G)

Wireless Metropolitan Area Network. The architectures are also suitable for use in a Fourth-

Generation (4G) Standard which is characterised by the support of much higher data rates that are

possible with former cellular solutions.

This work will present the emerging technologies helping wireless communication to grow

from where it was before to what it is today. It will cover the applications, characteristics and

differences of the emerging wireless technologies such as Wireless Local Area Network (WiFi-

802.11n), Wireless Personal Area Networks (ZigBee) and Wireless Metropolitan Area Networks

(WiMAX and LTE).

WiMAX (Worldwide Interoperability for Microwave Access) a set of Wireless Broadband

Standards is a Standard for Wireless Data Transmission covering a range similar to cellular phone

towers which represents a joint effort between traditional standards development, organisation and

industry. This hybrid approach had added significant value to the overall development of WiMAX

technology and services. This thesis describes the process by which WIMAX evolved, explores its

market potential and impact on the telecommunication Industry. WiMAX shows great promise as

an Internet Protocol native, high quality, high throughput, wireless pipe with greater range than

existing competing technologies.


CHAPTER ONE

INTRODUCTION

1.0 By demonstrating a long history of latent expectation, fixed wireless was considered to

have underperformed, which brought about the serious talk of WiMAX. Everybody’s even

talking about WiMAX, the great hope for wireless broadband, the evolution of Wi-Fi, the

answer to backhaul, everything to everybody. All these imply the need for efficient and robust

communication system that led to the introduction of WiMAX technology in services. A broad

range of fixed, mobile and Wide Area Terrestrial Network all used for Communication

System. The introduction of wireless network had facilitated the increase of local service

applications in Telecommunication Network for access and distribution in internal and

external (global) networks. Wireless means transmitting signals using radio waves as the

medium instead of wires.

The wireless communications systems provide the following inherent characteristics

for improvements of communications:-

a. Mobility: it allows users to access information beyond their desks and conduct

business from anywhere without having to connect via wire.

b. Reach-ability: It enables people to be better connected and reachable without any

limitations of location.

c. Simplicity: It is easy and fast to deploy in comparison to cabled network with initial

setup cost a bit on the high side but other advantages overcome the high cost.

d. Maintainability: It does not need to spend too much to maintain a wireless network

setup.

e. Roaming Services: It is possible to provide service anywhere at anytime including on

train, buses, aeroplanes and so on with a wireless communication network system.

f. New Services: It gives rapid deployments of new systems.

This work is about the WiMAX (Standard) an acronym “Worldwide Interoperability for

Microwave Access” that enables the delivery of last mile Wireless Broadband Access, an
alternative to cable and Digital Subscriber Line (DSL). WiMAX is based on wireless

Metropolitan Area Network (WMAN) standards developed by IEEE 802.16 group and adopted

by both IEEE and ETSI HIPERMAN group.

WiMAX technology will provide fixed, Nomadic, Portable and eventually Mobile

wireless broadband connectivity without the need for direct line of sight to a base station.

WiMAX, together with synergetic mesh networking technologies such as QoS- aware routing,

can potentially provide a solution for onboard internet broadband access without using a

backhaul satellite communication system. Such a system could be implemented today even in

areas where there is no fixed infrastructure.

1.1 BACKGROUND

The IEEE 802.16 group was formed in 1998 to develop an air-interface standard for

wireless broadband. The group’s initial focus was the development of a LOS based point-to-

multipoint wireless broadband system for operation in the 10GHz – 66GHz millimetre wave

band. The resulting standard, the original 802.16 standard completed in December 2001 was

based on a single carrier (SC) Physical (PHY) layer with a burst time division multiplexed

(TDM) MAC layer. Many of the concepts related to the MAC layer were adopted for wireless

from the popular cable modem Data over cable service interface Specification (DOCSIS)

standard.

The IEEE group subsequently produced 802.16a and amendment to the standard, to

include NLOS applications in the 2GHz – 11GHz band, using an Orthogonal Frequency

Division Multiplexing (OFDM) based physical layer. Additions to the MAC layer, such as

support for Orthogonal Frequency Division Multiple Access (OFDMA) were also included. It

was published in April 2003. Further revisions resulted in a new standard in 2004, called

IEEE 802.16-2004 that set WiMAX as a wireless broadband technology with high potential by

replacing all prior versions and formed the basis for the first WiMAX solution. These early
WiMAX solution based on IEEE 802.16-2004 targeted fixed applications and will be referred

to as Fixed WiMAX. In December 2005, the IEEE group completed and approved IEEE

802.16e-2005, an amendment to the IEEE 802.16-2004 standard that added mobility support.

It formed the basis for WiMAX solution for nomadic and mobile applications and is often

referred to as mobile WiMAX. These standards were developed to suit a variety of

applications and deployments scenarios and hence offer a large amount of design choices for

system developers. So we could say that IEEE 802.16 is a collection of standards not one single

interoperable standard.

WiMAX technology has evolved through four stages albeit not fully distinct or clearly

sequential:

a.) Narrowband Wireless local-loop system

b.) First-Generation Line-of-Sight (LOS) broadband system

c.) Third-Generation Non-Line-of-Sight broadband system and

d.) Standard-based Wireless system.

1.2 PROBLEM STATEMENT

Despite the promise of WiMAX as an IP-base, high throughput long range fixed/mobile

wireless technology, there are serious challenges to its ultimate success which fall into three (3)

general categories;

i.) Business plans

ii.) Real World performance and

iii.)Competition for growth in international standardization.

These problems could be base on:-

1.) WiMAX Availability problem: Where WiMAX deployments will use licensed Radio

Frequency (RF) Spectrum positively granting them some degree of protection from

unintentional interference. It is reasonably simple however for an attacker to use


readily available tools to jam the spectrum, for all planned WiMAX deployments

which implies that an attacker can use legacy management frames to forcibly

disconnect legitimate stations.

2.) WiMAX Authentication Problem: A primary standard in WiMAX (802.16)

networks is that each subscriber station (SS) must have a X.509 certification that

will exclusively recognise the subscriber. It’s use makes it difficult for an attacker to

spoof the identity of subscriber, adding sufficient protection against theft of service.

A basic problem in the authentication mechanism used by WiMAX is privacy and

key Management (PKM) protocol which lack in authentication of Base Station (BS)

or Service Provider. This makes WiMAX network vulnerable to man-in-the-middle

attack exposing subscribers to various confidentiality and availability attacks.

Some of this dissatisfaction surfaced with the technical performance, include range

and penetration of WiMAX. While WiMAX has been touted as a key standard for 4G

telephony, because of its potential for high quality IP streaming video in addition to high

throughput voice and data, some manufacturer clustering their support around competing

technologies such as Long Term Evolution (LTE) standards based on CDMA technology.

Finally ITU Standardization approval for WiMAX indicates that if not the backbone of

telecommunication, 4G technology is likely to be a major supported standard for WiMAX.

1.3 JUSTIFICATION FOR THE STUDY

Since we require detailed information in the form of voice, data, fax and video to be

transmitted quickly and reliably to and from anywhere at anytime, the emergence of 802.16

standards creates complete new area for innovation concerning flexible broadband

connectivity in the internet. Wide adoption of broadband wireless access and mesh

networking can eventually provide ubiquitous connectivity to the internet at anytime. Using a

simple case study of present application, we can show that connectivity to the internet in the
world is possible without using an expensive, low bandwidth and high-latency satellite

backhaul.

1.4 AIM AND OBJECTIVES OF THE STUDY

The aim of this study is to investigate the application of WiMAX standard in while the

objectives of this study is to

i.) Compare WiMAX Standard with existing standards

ii.) Identify the WiMAX features

iii.)Determine the Problems faced by the Telecommunication industry in Nigeria.

1.5 METHODOLOGY

This thesis is not an economic analysis but a descriptive narrative means to explore the

role of WiMAX standardization in Telecommunication Engineering as a new technology and

resulting market creation and projected impacts. To conduct a thorough economic analysis of

WiMAX, is still several years too early. The lack of an available methodology for measuring

impact is also constraining factor.

1.6 LIMITATIONS

WiMAX is a great technology for next generation with potential applications such as

cellular backhaul, return trip of freight, hotspot, VoIP Mobiles and broadband connection but

it has some limitation as explained as follows:

 Low bit rate over long distance: WiMAX technology offers long distance data range

which is 70 Km and high bit rate which is 70 Mbit/s that is good but both features
does not look together when the distance is increased, the bit rate will decrease and

if the bit rate is increased, then the distance range should be reduced.

 Speed connectivity: The WiMAX’s other drawback is that any user closer to the

tower can get high speed which is can be up to 30Mbit/s but if a user exists at the

cell edge from the tower, such can obtain only 14Mbit/s speed.

 Sharing bandwidth: In all wireless technology, the bandwidth is shared between

users in a specified radio sector. Therefore functionality could go down if more than

one user exists in a single sector, resulting to additional radio cards to be added to

the base station, to boost the capability as necessary.

 WiMAX over Wi-Fi: it is easy for any one to build up a Wi-Fi network but to setup

WiMAX network is really expensive so it very hard for everyone that they pay

large amount for the setup and frequency licenses of WiMAX in any region.

 WiMAX technology and different architecture: Because of low bit range on long

distance, speed of connectivity from long range and low bandwidth among users,

the different granular and dispersed network architectures are being unsupported

into WiMAX during the period of making decision about the choice of WiMAX.

1.7 APPLICATIONS

WiMAX technology applications are means by which services providers present data,

video, voice, mobile and internet access. The benefits of WiMAX technology are such as

provision of simple based prospective cost saving and service efficiency but to be capable to

allow VOIP calling, mobile devices, video making and high-speed data transfer. The basic

strength behind the WiMAX technology application are high bandwidth, high quality

services, security, deployment, full duplex including DSL versus cable and its cost.
CHAPTER TWO

LITERATURE REVIEW

2.0 Literatures obtained were reviewed in this chapter. The overview of wireless

communication including its network concept was covered. The concept of Wi-Fi, ZigBee and

WiMAX standards in the telecommunication as the focus was also covered.

2.1 OVERVIEW OF WIRELESS COMMUNICATION.


In telecommunications, Wireless communication is referred to as telecommunication system

such as radio transmitters and receivers, remote controls, computer networks, network terminal and

so on which uses some form of energy such radio frequency (RF), infrared light, laser light, visible

light, acoustic energy and so on to transfer information without the use of wires and cables. The

distances involved may be short, a few meters as in television remote control or long, thousands of

kilometres for radio and telemetry communication (Wikipedia). The term is often shortened to

“WIRELESS”. It encompasses various types of fixed, mobile and portable two-way radios, cellular

telephones, personal digital assistants (PDAs), and wireless networking. Other examples of wireless

technology include GPS units, garage openers and remote controls. Wireless operations permits

services, such as long range communications, that are impossible or impractical to implement with

the use of wires. (Microsoft Student with Encarta Premium 2007).

2.1.1 PRINCIPLES OF WIRELESS COMMUNICATIONS

Wireless communications begin with a message that is converted into an electronic signal by

a device called a transmitter. There are two types of transmitters: analog and digital. An analog

transmitter sends electronic signals as modulated radio waves. The analog transmitter modulates the

radio wave to carry the electronic signal and then sends the modified radio signal through space. A

digital transmitter encodes electronic signals by converting messages into a binary code, the series

of zeros and ones that are the basis of all computer programming. The encoded electronic signal is

then sent as a radio wave. Devices known as receivers decode or demodulate the radio waves and

reproduce the original message over a speaker.

Wireless communications provide more flexibility than wire-based means of

communication. However, there are some drawbacks. Wireless communications are limited by the

range of the transmitter and since radio waves travel through the atmosphere they can be disturbed

by electrical interferences that cause static.

Wireless communications systems involve either one-way transmissions, in which a person

merely receives notice of a message, or two-way transmissions, such as a telephone conversation


between two people. Two-way transmissions require both a transmitter and a receiver for sending

and receiving signals. A device that functions as both a transmitter and a receiver is called a

transceiver. Cellular radio telephones and two-way radios use transceivers, so that back-and-forth

communication between two people can be maintained.

2.1.2 MODES OF WIRELESS COMMUNICATION

Wireless communications systems have grown and changed as technology has improved.

Several different systems are used today, all of which operate on different radio frequencies. New

technologies are being developed to provide greater service and reliability (Microsoft Encarta

2007).

2.1.3 WIRELESS NETWORKS

Wireless networking (i.e. the various types of unlicensed 2.4 GHz Wi-Fi devices) is used to

meet many needs. Perhaps the most common use is to connect laptop users who travel. Another

common use is for mobile networks that connect via satellite. A wireless transmission method is a

logical choice to network a LAN segment that must frequently change locations (Understand

Telecommunications Engineering). The following situations justify the use of wireless technology:

• To span a distance beyond the capabilities of typical cabling,

• To provide a backup communications link in case of normal network failure,

• To link portable or temporary workstations,

• To overcome situations where normal cabling is difficult or financially impractical, or

• To remotely connect mobile users or networks.

2.1.4 WIRELESS NETWORK TOPOLOGY

In computer networking, topology refers to the layout of connected devices. Topology is

taking to be a network's virtual shape or structure which does not necessarily correspond to the

actual physical layout of the devices on the network. For example, the computers on a
home LAN may be arranged in a circle in a family room, but it would be highly unlikely to find a

ring topology there.

Network topologies are categorized as below:

(i) Bus Topology

Bus networks (not to be confused with the system bus of a computer) use a common

backbone to connect all devices that is a single cable. The backbone functions as a shared

communication medium that devices attach or tap into with an interface connector. A device

wanting to communicate with another device on the network sends a broadcast message

onto the wire that all other devices see, but only the intended recipient actually accepts and

processes the message. Ethernet bus topologies are relatively easy to install and don't require

much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5

("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies.

However, bus networks work best with a limited number of devices. If more than a few

dozen computers are added to a network bus, performance problems will likely result. In

addition, if the backbone cable fails, the entire network effectively becomes unusable.

(Bradley Mitchell, 1999)

(ii) Ring Topology

In a ring network, every device has exactly two neighbours for communication purposes.

All messages travel through a ring in the same direction (either "clockwise" or "counter-

clockwise"). A failure in any cable or device breaks the loop and can take down the entire

network. To implement a ring network, one typically uses FDDI, SONET, or Token

Ring technology. Ring topologies are found in some office buildings or school campuses.

(iii) Star Topology

Many home networks use the star topology. A star network features a central connection

point called a "hub" that may be a hub, switch or router. Devices typically connect to the

hub with Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star

network generally requires more cable, but a failure in any star network cable will only take
down one computer's network access and not the entire LAN. (If the hub fails, however, the

entire network also fails.) (Bradley Mitchell, 1999)

(iv)Tree Topology

Tree topologies integrate multiple star topologies together onto a bus. In its simplest

form, only hub devices connect directly to the tree bus and each hub functions as the "root"

of a tree of devices. This bus/star hybrid approach supports future expandability of the

network much better than a bus (limited in the number of devices due to the broadcast traffic

it generates) or a star (limited by the number of hub connection points) alone. (Bradley

Mitchell, 1999)

(v) Mesh Topology

Mesh topologies involve the concept of routes. Unlike each of the previous topologies,

messages sent on a mesh network can take any of several possible paths from source to

destination. (Recall that even in a ring, although two cable paths exist, messages can only

travel in one direction.) Some WANs, most notably the Internet, employ mesh routing. A

mesh network in which every device connects to every other is called a full mesh. A partial

mesh networks also exist in which some devices connect only indirectly to others. (Bradley

Mitchell, 1999)

While more complex networks can be built as hybrids of two or more of the above basic topologies.

2.1.5 WIRELESS NETWORK SETUP

There are basically three (3) ways to setup a wireless network,

i.) Point-to-Point Bridges: - Since a bridge is used to connect two (2) networks. A point-

to-point bridge therefore interconnects two building having different networks. For

example, a wireless LAN bridge can interface with an Ethernet network directly to

a particular access point.

ii.) Point-to-Multiple Bridge: - This topology is used to connect three or more LANs that

may be located on different floors in a building or across buildings.


iii.)Mesh or ad hoc network: - This network is an independent LAN that is not

connected to a wired infrastructure and in which all stations are connected directly

to one another. Since An ad hoc network is a wireless network using peer to peer

communication for network connectivity. (Ranveer Chandra, Christof Fetzer, Karin

H’Ogstedt)

2.1.6 WIRELESS TECHNOLOGIES

Wireless technologies can be classified in different ways depending on their range. Each

wireless technology is designed to serve a specific usage segment. The requirements for each usage

segment are based on a variety of variables, including Bandwidth needs, Distance and Power needs.

i.) Wireless Wide Area Network (WWAN): enables one to access the Internet via a

wireless wide area network (WWAN) access card and a laptop. It provides a very fast data

speed compared with the data rates of mobile telecommunications technology, and their

range is also extensive. Cellular and mobile networks based on CDMA and GSM are good

examples of WWAN.

ii.) Wireless Personal Area Network (WPAN): are very similar to WWAN except

their range is very limited.

iii.) Wireless Local Area Network (WLAN): enables one to access the Internet in

localized hotspots via a wireless local area network (WLAN) access card and a PDA or

laptop. It is a type of local area network that uses high-frequency radio waves rather than

wires to communicate between nodes. These networks provide a very fast data speed

compared with the data rates of mobile telecommunications technology, and their range is

very limited. Wi-Fi is the most widespread and popular example of WLAN technology.
iv.) Wireless Metropolitan Area Network (WMAN): is a network that enables one to

access the Internet and multimedia streaming services via a wireless region area network

(WRAN), provides a very fast data speed compared with the data rates of mobile

telecommunication technology as well as other wireless network, and their range is also

extensive.

2.1.7 ISSUES WITH WIRELESS NETWORKS

There are three major issues with Wireless Networks.

i. Quality of Service (QoS): One of the primary concerns about wireless data

delivery is that, like the Internet over wired services, QoS is inadequate. Lost packets

and atmospheric interference are recurring problems wireless protocols.

ii. Security Risk: This has been another major issue with data transfer over wireless

network. Basic network security mechanisms like the service set identifier

(SSID) and Wireless Equivalency Privacy (WEP). These measures may be adequate for

residences and small businesses but they are inadequate for entities that require stronger

security.

iii. Reachable Range: wireless network offers a range of about one hundred meters or less.

Range is a function of antenna design and power. Nowadays the range of wireless is

extended to tens of kilometres so this should not be an issue any more.

2.1.8 WIRELESS BROADBAND ACCESS (WBA)

Broadband wireless is a technology that promises high-speed connection over the air. It uses

radio waves to transmit and receive data directly to and from the potential users whenever they want

it. 3G, Wi-Fi, WiMAX and UWB technologies works together to meet unique customer needs.

BWA is a point-to-multipoint system which is made up of base station and subscriber equipment.

Instead of using the physical connection between the base station and the subscriber, the base

station uses an outdoor antenna to send and receive high-speed data and voice-to-subscriber
equipment. It offers an effective, complementary solution to wireline broadband, which has become

globally recognized by a high percentage of the population.

2.1.9 CORDLESS

The term “wireless” should not be confused with the term “cordless” which is generally

used to refer to powered electrical or electronics devices that are able to operate from a

portable power source, a battery pack without any cable or cord to limit the mobility of the

cordless device through a connection to the mains power supply.

2.2 OVERVIEW SURVEY OF EMERGING WIRELESS TECHNOLOGY

802.11n is an extension of the popular 802.11a/b/g technology known as WiFi. UWB is

standardized as IEEE 802.15.4 for low power, low-data rate applications. The technology

innovation called ZigBee make it possible to remotely monitor various types of sensors-for air-

conditioning, lighting, smoke alarms, and many more. In effect, most of these wireless technologies

are not islands in themselves, but offer some interconnectivity between each other, which help in

creating a perfectly connected environment. The various wireless network technology options are

shown in Fig. 2.1 WWAN


< 15Km
Wireless Wide Area Network 802.20
(Proposed)

WMAN
<5Km
Wireless Metropolitan 70Mbit/s
Area Network 802.16a/e

WLAN
<100m
Wireless Local Area Network 11-54Mbit/s
802.11a/b, e, g, n

WPAN
Wireless Personal Area Network <10m
~1Mbit/s
802.15.1(Bluetooth)
802.15.3 (UWB)
Fig. 2.1. Types of Wireless Access. 802.15.4 (ZigBee)

2.2.1 Wireless Fidelity (Wi-Fi) – 802.11N


Wi-Fi technology is most commonly found in notebook computers and internet access

devices such as routers and DSL or cable modems. A wireless LAN (WiFi) is a data transmission

system designed to provide location-independent network access between computing devices by

using radio waves rather than a cable infrastructure. Wi-Fi is meant to be used generically when

referring to any type of 802.11 network, whether 802.11b, 802.11a, 802.11g and so on. The 802.11b

networks could move data at up to 11 megabits per second (Mbps). 802.11a followed, shortly after

by 802.11g, each with maximum speeds of 54Mbps and throughput of around 25Mbps. WLAN

hardware built around 802.11g was quickly embraced by consumers and businesses seeking higher

bandwidth. The Wi-Fi speed standard, 802.11n, offers a bandwidth of around 108Mbps and it is an

industry standard, n-compliant devices will be interoperable. (Broadcom, 2006)

2.2.1.1 Characteristics of 802.11n

The emerging 802.11n specification differs from the predecessors in that it provides for a

variety of optional modes and configurations that dictate different maximum raw data rates. This

enables the standard to provide baseline performance parameters for all 802.11n devices, while

allowing manufacturers to enhance or tune capabilities to accommodate different applications and

price points. With every possible option enabled, 802.11n could offer raw data rates up to 600

Mbps. But WLAN hardware does not need to support every option to be compliant with the

standard. (Broadcom, 2006)

2.2.1.2 MAJOR COMPONENTS OF 802.11N

1) Better OFDM

In the 802.11n draft, the first requirement is to support an OFDM implementation

that improves upon the one employed in the 802.11a/g standards, using a higher maximum

code rate and slightly wider bandwidth. This change improves the highest attainable raw

data rate to 65 Mbps from 54 Mbps in the existing standards. (Broadcom, 2006)

2) MIMO Improves Performance


One of the most widely known components of the specification is known as Multiple

Input Multiple Output, or MIMO (Broadcom, 2006). MIMO exploits a radio-wave

phenomenon called multipath. Transmitted information bounces off walls, doors, and other

objects, reaching the receiving antenna multiple times via different routes and at slightly

different times. Uncontrolled, multipath distorts the original signal, making it more difficult

to decipher and degrading Wi-Fi performance. MIMO harnesses multipath with a technique

known as space division multiplexing. The transmitting WLAN device actually splits data

stream into multiple parts, called spatial streams, and transmits each spatial stream through

separate antennas to corresponding antennas on the receiving end. The 802.11n provides for

up to four spatial streams, even though compliant hardware is not required to support that

many (Broadcom, 2006). Doubling the number of spatial streams from one to two

effectively doubles the raw data rate. There are trade-offs, however, such as increased power

consumption and to a lesser extent, cost. The specification includes a MIMO power-save

mode, which mitigates power consumption by using multiple paths only when

communication would benefit from the additional performance. The MIMO power save

mode is a required feature in the specification.

3) Improved Throughput and Higher Data Rates

Another optional mode in the 802.11n effectively doubles data rates by doubling the

width of a WLAN communications channel from 20 MHz to 40 MHz. The primary trade-off

here is fewer channels available for other devices. In the case of the 2.4-GHz band, there is

enough room for three non-overlapping 20-MHz channels. Meaning, a 40-MHz channel

does not leave much room for other devices to join the network or transmit in the same

airspace. It implies that intelligent, dynamic management is critical to ensuring that the 40-

MHz channel option improves overall WLAN performance by balancing the high-

bandwidth demands of some clients with the needs of other clients to remain connected to

the network.

2.2.1.3 Applications of 802.11n


Because it promises far greater bandwidth, better range, and reliability, 802.11n is

advantageous in a variety of network configurations. And as emerging networked applications take

hold in the home, a growing number of consumers will come to view 802.11n not just as an

enhancement to their existing network, but also as a necessity. Some of the current and emerging

applications that are driving the need for 802.11n are listed as follows:

i. Voice over Internet Protocol (VoIP): It is realized that VOIP can save money on

long distance phone calls by using the Internet instead of traditional phone services. An

increasingly popular way to make Internet calls is with VoIP phones, which are battery-

powered handsets that typically connect to the Internet with built-in 802.11b or 802.11g.

Telephony does not demand high bandwidth, although it does require a reliable network

connection to be usable. Both 802.11b and 802.11g consume less power than 802.11n in

MIMO modes, but single-stream 802.11n may be prevalent in VoIP phones. VoIP phones

can benefit today from the increased range and reliability of a 802.11n access point.

ii. Streaming video and music: As with voice, streaming music is an application that

requires a highly reliable connection that can reach throughout the home. Growing numbers

of consumers are streaming music directly from the Internet. Though higher bandwidth is

not absolutely necessary, the additional range and reliability that 802.11n offers may be

better suited to streaming music than older generation WLAN hardware.

iii. Gaming: Gaming is an application that increasingly is making use of home WLANs,

whether users connect wirelessly to the Internet from their computers and portable gaming

devices or use the network to compete with others in the home.

iv. Network attached storage: A growing application that demands all that 802.11n has

to offer high data rates as well as range and reliability is Network-Attached Storage, or

NAS. NAS has become popular in the enterprise as an inexpensive, easy-to-install

alternative for data backup.


v. Transferring large files such as pre-recorded TV shows from a personal video

recorder onto a notebook computer or portable media player for viewing outside the home

takes planning and patience on an older WLAN.

Fig. 2.2 compares the time it would take to transfer a 30-minute video file. At the best data transfer

rate, it would take 42 minutes to copy the file using 802.11b, and less than a minute with a two

antenna 802.11n client.

802.11n

802.11g

802.11b

Fig. 2. 2 Time (Best case) to Transfer 30-Minute Video

2.2.2 ZIGBEE – 802.15.4

ZigBee is one of the technologies that enable Wireless Personal Area Networks (WPAN).

ZigBee is the name of a specification for a suite of high level communication protocols using small,

low-power digital radios based on the IEEE 802.15.4 standard. The technology is intended to be

simpler and cheaper than other WPANs such as Bluetooth. ZigBee protocols are intended for use in

embedded applications requiring low data rates and low power consumption. WPAN implies a

reach of only a few meters, 9.5m in the case of ZigBee, the network will have several layers, so

designed as to enable intrapersonal communication within the network, connection to a network of

higher level and ultimately an uplink to the Web.

The ZigBee Standard has evolved standardized sets of solutions, called ‘layers' (P. Kinney,

2003). These layers facilitate the features that make ZigBee very attractive, low cost, easy

implementation, reliable data transfer, short-range operations, very low power consumption and

adequate security features.


i. Network and Application Support layer: The network layer has been designed to allow

the network to spatially grow without requiring high power transmitters. The network

layer also handle large amounts of nodes with relatively low latencies.

ii. Physical layer: The IEEE 802.15.4 physical layer accommodates high levels of

integration by using direct sequence to permit simplicity in the analog circuitry and enable

cheaper implementations.

iii. Media access control layer: The IEEE 802.15.4 Media Access Control (MAC) layer

permits the use of several topologies without introducing complexity and is meant to work

with large numbers of devices.

User-defines Application Profiles


ZigBee Defined Object Layer

Network and Application Support Layer

IEEE Media Access Control Layer

IEEE Physical Layer

Fig.2.3 IEEE 802.15.4 / ZigBee Stack Architecture

2.2.2.1 CHARACTERISTICS OF ZIGBEE

ZigBee is poised to become the global control/sensor network standard. It has been designed

to provide the following features: (TG4)

1) Low power consumption, with battery life ranging from months to years.

2) Maximum data rates allowed for each of the frequency bands are fixed as 250kbps

@2.4GHz, 40kbps @ 915MHz, and 20kbps @868MHz.

3) High throughput and low latency for low duty-cycle applications (<0.1%).

4) Channel access using Carrier Sense Multiple Access with Collision Avoidance (CSMA -

CA).
5) Addressing space of up to 64 bit IEEE address devices, 65,535 networks.

6) 70-100m range.

7) ZigBee’s simplicity allows for inherent configuration and redundancy of network devices

provides low maintenance. It has low cost (device, installation, maintenance).

8) High density of nodes per network: ZigBee’s use of the IEEE 802.15.4 PHY and MAC

allows networks to handle any number of devices. This attribute is critical for massive

sensor arrays and control networks.

9) Fully reliable “hand-shake” data transfer protocols.

10) Different topologies like: star, peer-to-peer and mesh

2.2.2.2 APPLICATIONS OF ZIGBEE

ZigBee networks consist of multiple traffic types with their own unique characteristics,

including periodic data, intermittent data, and repetitive low latency data. The characteristics of

each are as follows:

• Periodic data – usually defined by the application such as a wireless sensor or meter. Data

typically is handled using a beaconing system whereby the sensor activates at a set time and

checks for the beacon, exchanges data, and switches off.

• Intermittent data – either application or external stimulus defined such as a wireless light

switch. Data can be handled in a beaconless system or disconnected. In disconnected

operation, the device will only attach to the network when communication is required, saving

significant energy.

• Repetitive low latency data – uses time slot allocations such as a security system. These

applications may use the guaranteed time slot (GTS) capability. GTS is a method of QoS that

allows each device a specific duration of time as defined by the PAN coordinator in the Super-

frame to do whatever it requires without contention or latency. In all applications, the smaller

packet sizes of ZigBee devices results in higher effective throughput values compared to other

standards. ZigBee networks are primarily intended for low duty cycle sensor networks (<1%).
2.2.3 WiMAX

Worldwide Interoperability for Microwave Access (WiMAX) is currently one of the hottest

technologies in wireless. The Institute of Electrical and Electronics Engineers (IEEE) 802

committee, which sets networking standards such as Ethernet (802.3) and Wi-Fi (802.11), has

published a set of standards that define WiMAX. IEEE 802.16-2004 (also known as Revision D)

was published in 2004 for fixed applications; 802.16 Revision E (which adds mobility) is publicised

in July 2005. The WiMAX Forum is an industry body formed to promote the IEEE 802.16 standard

and perform interoperability testing. The WiMAX Forum has adopted certain profiles based on the

802.16 standards for interoperability testing and “WiMAX certification”. These operate in the

2.5GHz, 3.5GHz and 5.8GHz frequency bands, which typically are licensed by various government

authorities. WiMAX, is based on an RF technology called Orthogonal Frequency Division

Multiplexing (OFDM), which is a very effective means of transferring data when carriers of width

of 5MHz or greater can be used. Below 5MHz carrier width, current CDMA based 3G systems are

comparable to OFDM in terms of performance.

WiMAX is a standard-based wireless technology that provides high throughput broadband

connections over long distance. WiMAX can be used for a number of applications, including “last

mile” broadband connections, hotspots and high-speed connectivity for business customers. It

provides wireless metropolitan area network (MAN) connectivity at speeds up to 70 Mbps and the

WiMAX base station on the average can cover up to 5 to 10 km. The WiMAX Overview is given in

Figure 2.4 (Sanida Omerovic, 2008) and table 1 give the differentiation between the Fixed and

Mobile WiMAX.

Figure 2.4. WiMAX Overview (Sanida Omerovic, 2008)


Fixed or mobile WiMAX

Fixed WiMAX Mobile WiMAX


Standard 802.16-2004 802.16e-2005
Access Fixed Fixed, portable and mobile

Modulation and OFDM TDD, FDD SOFDMA TDD, possibly FDD

duplexing
Handoffs No Yes
Service providers DSL and cable modem Mobile operators, DSL and cable

targeted service providers, modem service providers, wireless and

wireless and wired ISPs wired ISPs


Subscriber unit Outdoor or indoor CPE, Indoor CPE, PCMCIA card, mini-card

eventually PCMCIA built in laptops, mobile devices, phones

card
Spectrum bands 3.5 GHz, 5.8 GHz 2.3-2.4 GHz, 2.5-2.7 GHz, 3.3-3.4 GHz,

3.4-3.8 GHz
Certified products January 2006 2007
Table 2.1. Comparison of Fixed and mobile WiMAX (Monica Paolini, 2006)

2.2.3.1 CONCEPT OF WIMAX

WiMAX, or Worldwide Interoperability for Microwave Access, is a form of broadband

wireless access which is based on the IEEE 802.16 standard for wireless metropolitan-area

networks (MANs). Unlike many technologies in the broadband wireless access domain that provide

only line of sight (LOS) coverage, the technology behind WiMAX has been optimized to provide

excellent non line of sight (NLOS) coverage. As a result, WiMAX products are able to support

downlink data rates of 65 Mbits/s at close range to 16 Mbits/s at distances of 9 to 10 km, which is

enough bandwidth and transmission range to deliver high-speed simultaneous access to voice, data,

and video services (multimedia) to hundreds of businesses or thousands of residences. (Darcy

Poulin, 2005, SR Telecom Inc., 2004, C. Eklund et al., 2002).

WiMAX is able to overcome the impediments found in NLOS propagation and deliver such

high speed access using the following technologies and techniques:

 OFDM technology.
 Sub-Channelization.

 Directional antennas.

 Transmit and receive diversity.

 Adaptive modulation.

 Error correction techniques.

 Power control.

1.) Orthogonal Frequency Division Multiplexing (OFDM)

OFDM is a multi-carrier transmission technology that provides superior means of

transmitting wireless information in high multi-path environments in 2-11 GHz frequency range.

OFDM works by dividing the data stream into several parallel bit streams. Each bit stream is

carried by a separate subcarrier and all subcarriers transmit in unison and simultaneously. Figure

2.4 depicts exactly how OFDM works in WiMAX. (C. Y. Wong et al, 1999)

Fig.2.5 OFDM Technology

Advantages of OFDM: (Z. Shen, J. G. Andrews, and B. L. Evans, 2003)

i. Multi-carrier multiplexing and transmission technique

ii. Achieves high spectral efficiency and data rates

iii. Has high resilience to RF interference

iv. Eliminates multi-path distortion effectively

v. Minimizes frequency selective fading (FSF)

vi. Eliminates Inter Symbol Interference (ISI)

2.) Sub-Channelization
WiMAX supports sub-channelization which means that instead of transmitting on all

192 data subcarriers, one can transmit on just a subset. As a result, the system achieves greater

range by using the same amount of power over fewer carriers. Since the power limitation in the

CPE, balancing the power in the uplink and downlink can be done by concentrating the power

over fewer subcarriers in the uplink (Darcy Poulin, 2005). The mechanism of Sub-channelization

is very well depicted in the figure below;

Figure 2.6 The Effect of Sub-channelization.

3.) DIRECTIONAL ANTENNAS

The effectiveness of using directional antennas over omni-directional antennas have

been proven and successfully deployed in several systems that operate under significant NLOS

fading. This is due to several advantages found in directional antennas.

Advantages of Directional Antennas

i. Increase of link availability compared to omni-directional antennas

ii. Decrease of the delay spread at both the Base Station and the CPE

iii. Suppression of any multi-path signals that arrive in the side-lobes and back-lobes.

4.) TRANSMIT AND RECEIVE DIVERSITY

Diversity schemes are used to take advantage of multi-path and reflections signals

that occur in NLOS conditions. In transmit diversity, several antennas are placed at the transmitter

side with a separation between them that guarantees independent fading between the transmitted

signals across the wireless channel. This reduces the fade margin requirement and combats

interference. The same scheme applies for receive diversity where several antennas are placed at
the receiver side instead of being placed at the transmitter side which helps in overcome fading

and reduce pathloss (Alamouti, S. M., 1998).

5.) ADAPTIVE MODULATION

Adaptive modulation allows the WiMAX system to adjust the signal modulation

scheme depending on the signal to noise ratio (SNR) condition of the radio link. The highest

modulation scheme is used when the radio link is high in quality. This gives more capacity for the

system. During a deep signal fade, the WiMAX system can transfer to a lower modulation scheme

to maintain the connection quality and link stability. “This feature allows the system to overcome

time-selective fading.” The main feature of adaptive modulation is that it allows one to transmit at

higher data rates during best case conditions as opposed to having a fixed scheme which transmits

always at low data rates to account for the worst case conditions. As illustrated in fig. 2.6

Figure 2.7 Relative Cell Radii for Adaptive Modulation

6.) ERROR CORRECTION TECHNIQUES

WiMAX utilizes several error correction techniques in its receiver structure to reduce the signal to

noise ratio requirements and significantly improve the bit error rate (BER) performance of the

system. These techniques, such as the Strong Reed Solomon FEC and convolution coding, are

used to recover frames in error which may have been lost due to deep fades in the channel (] D.

M. Mandelbaum, 1974, S. Lin and P. Yu., 1982)

7.) POWER CONTROL

WiMAX incorporates several power control algorithms to reduce the overall power consumption

of the CPE, thus decreasing potential interference with other co-located units. This improves the

overall performance of the system dramatically. It is implemented by the base station sending

power control information to each of the CPEs to regulate the transmit power level to a fixed
threshold. Concerning a LOS system, the transmit power of the CPE is approximately

proportional to its distance from the base station. However in the NLOS system, this level

depends on many other factors such as the obstructions lying in the path between the CPE and the

base station.

After presenting a general introduction about the WiMAX wireless system and shedding

light on its different attributes, there is need to discuss the physical properties of the

electromagnetic waves which are the main carriers of data in wireless communication systems.

2.2.3.2 CHARACTERISTICS OF WIMAX

Technical aspects of 802.16a that are instrumental in powering robust performance include

the following characteristics:

• Power varies with band, Profiles from 100 Mw up to 2W.

• Configuration is P-P and P-MP Cellular.

• Spectrum initially 3.5 GHz licensed and 5.8 GHz unlicensed bands.

• Radio interface is OFDM, using 256 tones.

• Access Protocols is downstream - TDM (Broadcast), upstream - TDMA with access

contention.

• Security via station authentication and encryption.

• Data rates variable with channel bandwidth 3.5 MHz in 3.5 GHz band, 20 MHz in 5.8 GHz

band.

• Actual realizable data rates are ~ 2b/Hz.

• Maximum range ~2Km for indoor Non-LOS cellular service at 3.5 GHz.

2.2.3.3 Applications of WiMAX


WiMAX will allow people to go from their homes to their cars, and then travel to their

offices or anywhere in the world, all seamlessly. WiMAX can serve the business, residential and

mobile segments. The applications in these areas are listed as follows:

Residential users

• Basic voice services, low cost domestic & international calls

• Basic (dialup speed) to advanced (over 1Mbps)

• Bundled voice and data services

Business users

• Basic data connectivity for small businesses

• Advanced data services to medium and large businesses

• Feature-rich, low cost voice services (VoIP)

Mobile users (mobile WiMAX only)

• Data connectivity for mobile workforce

• Data connectivity for international visitors

2.2.3.4 WIMAX WORKING PRINCIPLE

WiMAX make possible the broadband access to conservative cable or DSL lines. The working

method of WiMAX is little different from Wifi network, because Wifi computer can be connected via

LAN card, router, or hotspot, while the connectivity of WiMAX network constitutes of two parts in

which one is WiMAX Tower or booster also known as WiMAX base station and second is WiMAX

receiver (WiMAX CPE) or Customer Premise Equipment.

Figure 2.8 WiMAX Working Principle (How stuff works)


The WiMAX network is just like a cell phone, where a user send data from a subscriber’s device

to a base station, the wireless signal is broadcasted into channel known as uplink by the base station.

The base station transmits to the same or another user known as downlink. The WiMAX base station

has higher broadcasting power, antennas and enhanced additional algorithms. WiMAX technology

providers build a network with the help of towers that enable communication access over many miles.

The broadband service of WiMAX technology is available in coverage areas. The coverage areas of

WiMAX technology separated in series of over lied areas called channel.

The orthogonal frequency division multiplexed access (OFDMA) in WiMAX technology, is a

great technique used to professionally take advantage from the frequency bands. The transmission

frequencies of WiMAX technology from 2.3MHz to 3.5 GHz make it low price wireless network. Each

spectral profile of WiMAX technology may need different hardware infrastructure. Each spectrum

contain its bandwidth profile which resolved channel bandwidth. The bandwidth signal is separated in

OFDMA (Orthogonal Frequency Division Multiplexed Access) is used to carry data called sub carrier.

Transmitted data is divided into numerous data stream where every one belongs to another sub carrier

and then transmitted at the same broadcast interval. At the downlink path the base station broadcast the

data for different user professionally over uninterrupted sub-carriers.

The independency of data is a great feature of OFDMA (Orthogonal Frequency Division

Multiplexed Access) that prohibit interfering and is been multiplexed. It also makes possible power

prioritization for various sub carriers according to the link quality. The sub carrier having good quality

carry more data since the bandwidth is narrow. But those that have low quality carry nun data.

WiMAX is providing quality of service (WiMAX QoS) which enables high quality of data like

VoIP or TV broadcasts. The data communication protocol from base station is an alternative of quality

of service (WiMAX QoS) application and offers video streaming. This type of data is translated into

parameters or sub carriers per user. All type of technique is carrying out together to speed up coverage,

bandwidth, efficiency and number of users. The base station of WiMAX has ability to cover up 50 Km.

WiMAX technology supports various protocols such as VLAN, ATM, IPv4 Ethernet etc.
2.2.4 LONG TERM EVOLUTION (LTE)

The LTE evolves from the Third-Generation technology which is based on Wideband Code

Division Multiple Access (WCDMA) and defines the LTE of the 3-GPP UMTS/HSPA cellular

technology. The specifications of these efforts are formally known as the Evolved UMTS

Terrestrial Radio Access (E-UTRA) and Evolved UMTS Terrestrial Radio Access Network (E-

UTRAN), commonly referred to by the 3-GPP Project LTE. The first version of LTE is documented

in Release 8 of the 3-GPP specifications. It defines a new physical layer radio access technology

based on Orthogonal Frequency Division Multiple Access (OFDMA) for downlink, Similar in

concept to the PHY layer of Mobile WiMAX and uses Single carrier FDMA (SC-FDMA) for the

uplink.

LTE supports high performance mobile access functional up to 350 Km/h with 500Km/h

under consideration peak data rates range from 100 to 326.4 Mbps on the downlink and 50 to 86.4

Mbps on the uplink depending on the antenna configuration and modulation depth. The LTE target

is to achieve the data rates set by the 4G ‘IMT-Advanced’ standard. The development of the LTE

interface is linked closely with the 3GPP system architecture evolution (SAE) which defines the

overall system architecture and Evolved Packet Core (EPC). The LTE aim is to provide an all IP

backbone with reduction in cost per bit, better service provisioning, flexibilyt in user of new and

existing frequency bands, simple network architecture with open interfaces and lower power

consumption.

2.3 ELECTROMAGNETIC WAVE PROPAGATION

In wireless communications, the information that is transmitted propagates in the form of

electromagnetic (EM) waves. The amplitude, phase, or frequency (wavelength) of a wave can all be

modified to represent the information. As a result, it is very fundamental to understand EM waves

and how information is propagated from one place to another in order determine the performance of

a wireless link (Anderson, Harry R., 2003).


2.3.1 FREE SPACE PROPAGATION

Free-space transmission is a principal consideration in basically all fixed broadband wireless

communication systems. Although free space primarily means in vacuum, it can be practically

implemented in short-range space-wave paths between elevated terminals. In free space, the signal

gets attenuated as it travels from the transmitter to the receiver.

This attenuation factor is characterized by the free space pathloss given by:
2
  
Freespacepathloss  PLF  PR  GTGR  (Anderson, Harry R., 2003)
PT  4r 

The free space pathloss is characterized by the following:

i. Inversely proportional to square the distance

ii. Proportional to the wave length (λ)

iii. Proportional to the antenna gains (GT and GR)

However, free space propagation alone cannot depict what will exactly happen to the signal

as it travels from the transmitter to the receiver as there are many effects that can substantially

impact the communication link performance (Anderson, Harry R., 2003).

2.3.2 REFLECTION

Reflection is one of the most important wave propagation phenomena involved in almost

every type of fixed wireless systems (Anderson, Harry R., 2003)

There are two basic reflection types:

i. Specular reflection from smooth surfaces.

ii. Reflections (scattering) from rough surfaces.

2.3.2.1 SPECULAR REFLECTION


This occurs when a signal intersects the ground, a wall or any other surface that that does

not have any edges or discontinuities. Reflection takes place on the “specular point” where the

angle of incidence of the transmitted wave equals the angle of reflection of the reflected wave,

(Anderson, Harry R., 2003) as illustrated in fig.2.7

Pi Pr

 
Ground Specular Reflection
Fig. 2.9 Two dimensional geometry showing specular reflection (Anderson, Harry R., 2003)

2.3.2.2 REFLECTIONS FROM ROUGH SURFACES

In the real world, seldom do we encounter reflections along a smooth surface. However,

most of the times, we encounter surfaces that have random variations as in the earth’s surface or

have systematic variations such as in the walls and roofs of artificial structures. In severe scenarios,

the surface may appear to be a pure scatterer. The degree of roughness is given by the Rayliegh


criterion: hR  (Anderson, Harry R., 2003)
8 sin y 0

where hR is the difference in the maximum and minimum surface variations; y 0 is the angle between

the incident ray and the surface as illustrated in fig. 2.8

Fig. 2.10 Reflection and Scattering from a rough surface


2.3.3 DIFFRACTION

Diffraction is an important wave propagation mechanism which can occur to any

propagating wave in wireless communications. Diffraction only happens when an object partially

blocks the path of a propagating wave. Since our environment deals with a non-line of sight

scenario, we will be heavily relying on diffraction in our study, there are typically two models used

in a wireless system design to model diffraction (Anderson, Harry R., 2003)

2.3.3.1 WEDGE DIFFRACTION

It occurs at the corner of buildings, at the edge of walls where they intersect roofs, and at the

junction of walls with the ground or street and it is considered very important features. The wedge

diffraction scheme is used to find the diffraction attenuation for an obstructed interference path over

a rooftop edge or the parapet of a building but it is highly computational (Anderson, Harry R.,

2003).

2.3.3.2 KNIFE-EDGE DIFFRACTION

It is a special case of the wedge diffraction that is when the interior angle of the wedge is

assumed to be zero. Because of its resulting simplicity and speed of calculation efficiency, knife-

edge diffraction is used in many propagation models. The knife-edge diffraction scheme is used as a

model for many obstructed path circumstances including paths with terrain obstructions such as

gently rolling hills that have very little resemblance to a knife-edge (Anderson, Harry R., 2003).

2.3.4 FRESNEL ZONE AND PATH CLEARANCE

A crucial design objective in a fixed wireless design is to achieve adequate path clearance

for the link, which means that any point along the path between the transmitter and the receiver

should have a certain distance from any obstacle along the path.
As a result, a wireless link could fall to one of three categories, which are determined by the

obstacles’ positions with respect to the Fresnel zone. Fresnel zone is the locus of the points where

the diffracted path length is multiples of 180 degrees different from the direct path length. As

shown in Figure 2.9, the fresnel zones form elliptically shaped solids of revolution around the

transmit-receive propagation path. In concept, the first fresnel zone is the zone where the significant

power is transmitted, meaning that the power available at the receiver will be diminished if the first

fresnel zone is significantly obstructed or blocked. A general criterion for link system design is to

set the path clearance so that a radius equal to 60% of the first fresnel zone is unobstructed. This is

so called the 0.6 first fresnel zone criterion (Anderson, Harry R., 2003, Erceg, V. et al.).

The first fresnel zone with the 0.6 criterion is depicted in the Fig. 2.9 (a)

Fig. 2.11 (a)RF Propagation and Fresnel Zone (Mirza M Wahaj, 2004)

2.4 LINE OF SIGHT (LOS)

Fig. 2.11b LOS (Line of Sight) Demonstration

LOS Attributes:

 Requires 60% Fresnel (1st) zone clearance

 Diffraction losses are negligible

 Free space signal attenuation determines coverage


2.5 OLOS (OBSTRUCTED LINE OF SIGHT)

Figure 2.12. OLOS demonstration

OLOS Attributes :

 Fresnel zone obstruction- above the 60% mark

 Diffraction Losses are from 0-6dB

 Requires higher tower heights

 Seasonal effects due to the nature of the obstruction

2.6 NLOS (NON LINE OF SIGHT)

Figure 2.13 NLOS demonstration (Mirza M Wahaj, 2004)

NLOS Attributes:

 More propagation loss

 Higher delay spread

 Higher ISI (Inter Symbol Interference)

 Pronounced multipath distortion

 Higher Tx power required to meet SNR/BER limits


2.7 COMPARISON OF EMERGING WIRELESS TECHNOLOGIES

The use of wireless technologies is beginning to appear similar to the initial

development of the railways. Each technology seems to have a different “gauge” and

compatibility issues seem to confuse the novice. The main points of comparison of Wi-Fi,

ZigBee and WiMAX are listed in table 2.2 while the key highlights of the comparison between

the two next generation broadband wireless access technologies: 3GPP LTE and WiMAX

IEEE 802.16e is presented in Table 2.3

Table 2.2 Comparison of Emerging Wireless Technologies (Bhavneet Sidhu, Hardeep Singh, and

Amit Chhabra)

Technology WiFi -802.11n ZigBee WiMAX


Application Wireless LAN Internet Sensor Networks Metro Area Broadband

Internet connectivity
Typical Range 100m 70-100m 50 km
Frequency Range 2.4 GHz 2.4 GHz 2-11GHz
Data Rate 108 - 600Mbps 250Kbps 75Mbps
Modulation DSSS DSSS QAM
Network IP & P2P Mesh IP
IT Network Yes No Yes

Connectivity
Network Topology Infrastructure (Ad-hoc also possible) Ad-hoc Infrastructure
Access Protocol CSMA/CA CSMA/CA Request/Grant
Key Attributes Wider Bandwidth, Flexibility Cost, Power Throughput, Coverage
Table 2.3 Highlights of LTE and WiMAX

comparison
Aspect 3GPP LTE Mobile WiMAX IEEE 802.16e
Legacy GSM/GPRS/EDGE/UMTS/HSPA IEEE 802.16 a through d
Core Network UTRAn moving towards ALL-IP, WiMAX Forum All-IP Network

Evolved-UTRA (EUTRA) core

network with IMS with Sae

Architecture
Access Technology:

Downlink (DL)

Uplink (UL) OFDMA OFDMA

SC-FDMA OFDMA
FFT Size 64, 128, 256, 512, 1024, 2048 128, 256, 512, 1024, 2048
Radio Access TDD and FDD TDD and FDD

modes
Frequency Band Existing (800, 900, 1800, 1900

MHz) and new Frequency bands

(Range 800 MHz – 2.62 GHz) NLOS 2 – 11 GHz


Peak date rate

DL

UL 100 to 326.4 Mbps 75 Mbps

50 to 86.4 Mbps 25 Mbps


Channel Scalable from 1.25 to 20 MHz with Scalable from 1.25 to 20 MHz

bandwidth system profiles 1.25, 1.4, 2.5, 3, 5, with System Profiles 1.25, 2.5, 5,

10, 15 and 20 MHz 10, 20 MHz


Cell radius 5 Km ~ 20.7 Km for 3.5 or 7 MHz BW

~ 8.4 Km for 5 to 10 MHz BW


Cell capacity >200 Users at 8 MHz
>400 Users for larger BW 100 – 200 Users
Mobility:

Speed

Handover Up to 350 Km/h Up to 120 Km/h

Inter-cell soft handovers supported Optimised hard handovers

supported
Antenna Scheme MIMO MIMO

DL 2 Tx X 2 Rx 2 Tx X 2 Rx

UL 2 Tx X 2 Rx 1 Tx X NRx (collaborative)
Number of Code

words

2 1
Roaming New Auto through existing

GSM/UMTS
Security UEA1, U1A1, UEA2 (Snow PKMV1 RSA, HMAC, AES-

Algorithms Algorithms supporting 256 bits of CCM and PKMV2-EAP,

keys) and U1A2 CMAC, AES-CTR, MBS

Security
CHAPTER THREE

WIMAX STANDARD PRINCIPLES

3.0 The following is the investigative methodologies that would be use for this work;

 Study and investigation of the technical features of WiMAX network

 Investigate the requirement for the deployment of the WiMAX Networks.

 Investigate the basic security requirement for the WiMAX technology.

 Discuss about the security functions of WiMAX technology.

 Study the recent developments in the WiMAX technology security.


3.1 TECHNICAL FEATURES OF WIMAX NETWORK

WiMAX is a great invention in wireless technology providing 70Km broadband access to

mobile users. WiMAX technology is based on IEEE 802.16 Standard and it is a

telecommunication protocol offering full access to mobile internet across cities and countries with a

wide range of devices. WiMAX technology has salient features namely:

3.1.1 WiMAX support multipath 

WiMAX technology is offering OFDM-based physical layer which is based on orthogonal

frequency distribution. The WiMAX technology provides confrontation to multipath. Due to its

good architecture it allows the user to operate in NLOS conditions. Now WiMAX is familiar as a

technique of multi path for wireless network.

3.1.2 WiMAX broadband access

WiMAX technology is offering very high speed broadband access to mobile internet. When

using 20MHz, the data rate can be high up to 74Mbps. Generally 10MHz with the TDD scheme

provides 3:1 up and down link ratio. WiMAX providing very good signals therefore higher data

rates can be achieved with multiple antennas. Antennas are used for beam forming, space time

coding and so on.

3.1.3 WiMAX offer high speed data rate

Higher speed data rates are offered by the scalable architecture of physical layer. WiMAX

technology provides easy scaling of data with possible bandwidth of channel. If the bandwidth of

channels may be from 1.25MHz to 10MHz then a system can use 128, 512, 1024, 2048 bit FFTs

which provide dynamically roaming across numerous networks having dissimilar bandwidth.

3.1.4 WiMAX offer modulation and error correction


The use of WiMAX technology increased rapidly because it supports lots of modulation and

error correction facilities to users. It also allows a user to change the scheme according to channel

condition. Adaptive Modulation and Coding (AMC) is a valuable method to exploit throughput in a

varying channel.

3.1.5 WiMAX support reliability of data 

Automatic retransmission of data supported by WiMAX at data link layer for links is a great

feature. It does not only improve reliability but also enabled ARQ which necessitates each

broadcast packet to be recognized by the receiver, and if any unacknowledged data packets are

unspecified, to be misplaced and retransmitted.

3.1.6 WiMAX support TDD and FDD

WiMAX technology supports Time Division Duplexing (TDD) and Frequency Division

Duplexing (FDD). They both offer low cost system accomplishments.

3.1.7 WiMAX TDM scheme

The WiMAX technology holds all systems therefore any data may be in form of uplink or

downlink, checked by scheduler from the base station. The total capacities are shared between

several users according to their demand. And it is done by WiMAX Time Division

Multiplexing (TDM) scheme.

3.1.8 WiMAX MAC layer

The architecture of WiMAX technology based on MAC layer is a connection oriented layer.

Through MAC layer a user can perform a variety of functions such as voice including multimedia.

It supports best efforts for data traffic as bit, real time, traffic flows and so on. The aim of WiMAX

technology design is to facilitate large number of users with variety of connections per terminal.

3.1.9 WiMAX strong encryption


WiMAX technology also facilitates the user with strong encryption, using Advanced

Encryption standard (AES). A user can get strong privacy and administration. The EAP

protocol offer flexible authentication architecture which enable a user to get access to username,

password, certificates, and smart card.

3.1.10 WiMAX mobility

The basic and most important feature of WiMAX technology is to support mobility

applications as VoIP. The power saving mechanism of WiMAX technology is used to extend the

battery life of handheld devices. It supports mobile applications including channel estimation, sub-

channelization, power control and so on.

  To get access to WiMAX base station is not a huge task now because the wide range of

connectivity of WiMAX provides access to base station from home. Installation of hardware is very

easy with WiMAX technology. With the growth of WiMAX technology there are more feature

coming up.

3.2 TYPES OF WIMAX TECHNOLOGY (802.16)

The WiMAX family of standards (802.16) concentrate on two types of usage models; fixed

WiMAX usage model and mobile WiMAX usage model. The basic element that differentiates

these systems is the ground speed at which the systems are designed to manage. Based on mobility,

wireless access systems are designed to operate on the move without any disruption of service;

wireless access can be divided into three classes; stationary, pedestrian and vehicular. A mobile

WiMAX network access system is one that can address the vehicular class, whereas the fixed

WiMAX serves the stationary and pedestrian classes. While the nomadic wireless access system is

referred to as a system that works as a fixed WiMAX network access system but can change its

location.

Fixed WiMAX: Broadband service and consumer usage of fixed WiMAX access is

expected to reflect that of fixed wire-line service, with many of the standards-based requirements
being confined to the air interface. Because communications takes place via wireless links

from WiMAX Customer Premise Equipment (WiMAX CPE) to a remote Non Line-of-sight

(NLOS) WiMAX base station, requirements for link security are greater than those needed for a

wireless service. The security mechanisms within the IEEE 802.16 standards are sufficient for fixed

WiMAX access service.

  Another challenge for the fixed WiMAX access air interface is the need to set up high

performance radio links capable of data rates comparable to wired broadband services, using

equipment that can be self installed indoors by users, as is the case for Digital Subscriber Line

(DSL) and cable modems. IEEE 802.16 standards provide advanced physical (PHY) layer

techniques to achieve link margins capable of supporting high throughput in NLOS environments. 

Mobile WiMAX: The 802.16a extension, refined in January 2003, uses a lower frequency

of 2 to 11 GHz, enabling NLOS connections to be made. The 802.16e task group was capitalized on

the capabilities that this provided by working on developing a specification to enable mobile

WiMAX clients. These clients were able to hand off between WiMAX base stations, enabling users

to roam between service areas.

WiMAX backhaul: It is actually a connection system from the Access Point (AP) back to

the provider and to the connection from the provider to the network. A WiMAX backhaul can set

out any technology and media provided. It connects the system to the backbone. In most of the

WiMAX deployments situation, it is possible to connect several WiMAX base stations by using

high speed WiMAX backhaul microware links thereby allowing roaming between WiMAX

subscribers within or outside base stations. This is similar to roaming enabled by cellular phone

companies.  

There can be two cases of portability namely, full mobility or limited mobility. The

effortless case of portable service involves a user transporting a WiMAX modem to a different

location. Provided this visited location is served by wireless broadband service, in this scenario the

user re-authenticates and manually re-establishes new IP connections. Broadband service at the

visited location is afforded.  In the fully mobile scenario, user expectations for connectivity are
comparable to facilities available in third generation (3G) voice/data systems. Users may move

around while engaging in a broadband data access or multimedia streaming session. Mobile

wireless systems need to be robust against rapid channel variations to support vehicular speeds.

There are significant implications of mobility on the IP layer owing to the need to maintain

rout-ability of the host IP address to preserve in-flight packets during IP handoff. This may require

authentication and handoffs for uplink and downlink IP packets and Medium Access Control

(MAC) frames. The need to support low latency and low packet loss handovers of data streams as

users transition from one base station to another is clearly a challenging task. For mobile data

services, users will not easily adapt their service expectations because of environmental limitations

that are technically but not directly relevant to the mode of use. For these reasons, the network and

air interface must be designed to anticipate these users’ expectations and deliver accordingly.

3.3.0 WIMAX DEPLOYMENTS

WiMAX Technology is a great development in wireless technology offering long distance

broadband access. After viewing the rapid growth of WiMAX technology in large business

companies, multimedia project software and hardware manufacturers started to develop and test the

compulsory components to deploy WiMAX Technology network.

In 2004, cables and DSL technologies used to fetch wireless broadband access to rural areas

advanced quickly and in 2009 WiMAX technology has widely spread to everywhere. Fixed

WiMAX technology was introduced in 2008. The rapid developments of both WiMAX

technologies are rolling out now. The WiMAX Technology will take over the mobile industries.

The WiMAX deployment skill set to overcome the digital divide because of easiness and efficiency.

Along with traditional factors such as link budgets and signal-to-noise ratio (SNR), deployment

considerations for WiMAX systems should include the cost saving opportunities offered by the

802.16 standard.
3.3.1 Designing a WiMAX Network: A wide variety of technical points need to be addressed

when designing WiMAX networks. A significant consideration is the efficiency, cost and

performance involved in providing coverage and capacity, while avoiding the build-out of a large

number of new cell sites. The first item to be considered is the link budget, the loss and gain sum of

signal strength through the varying medium of the transmission path. The link budget determines

the maximum cell radius for an adequate service-level agreement (SLA). Additionally a good SNR

is critical for the system to perform at the optimum level. The ability to scale while maintaining

constant symbol duration provides more flexibility in equipment components. Most importantly,

operators can deploy systems today and develop system bandwidth in the future at lower cost

without impact to earlier deployments.

3.3.2 Environmental Factors: Wireless design criteria vary across four types of environments:

i. Dense Urban: A city centred with many businesses and high-density residential units

represents a challenge due to multipath effects among the multi-story buildings.

ii. Urban: Surrounding a city center, average building heights may be lower than the

mast of a base station, but the propagation environment remains equally challenging.

iii. Suburban: With lower-density housing (primarily single-family dwellings) and fewer

businesses, average building heights are much lower than base station towers and

structures are more spread out, thus creating a more favourable propagation

environment.

iv. Rural: Where homes are far apart and businesses widely scattered, this environment

offers no obstruction to wireless propagation so long as the terrain is flat.

3.3.3 Determining Coverage Boundaries: To take full advantage of WiMAX scalability, system

operators need to use the right software tools to predetermine coverage boundaries. These tools

perform propagation simulations and drive tests. Careful deployment planning is critical in order to

have room to scale, anticipating growing customer demands while ensuring a quality user
experience. This planning is important in urban areas, where deployments are most likely to be

driven by capacity requirements.

3.3.4 Sector and Frequency Reuse: A 3-sector base station is standard for cellular, and it also

suits WiMAX systems (Figure 3.1). To make the best use of available wireless spectrum, WiMAX

systems can utilize both sector and frequency reuse. Sector reuse is using one sector to cover

multiple areas, at least one of which is closer to another base station. Frequency reuse is using a

frequency to serve multiple sectors that do not mutually interfere.

Fig . 3.1 Sector Wireless System with Frequency (Channel) Reuse

With a frequency reuse of fig.1, each of a base station’s three sectors uses the same channel

(thus effectively combining the three sectors into a single sector). A frequency reuse of three

eliminates co-channel interference at the sector boundaries. This reuse also significantly decreases

co-channel interference between neighbouring cells due to the increased spatial separation for

channels operating at the same frequency provided that the cell sector boundaries are properly

aligned. Getting the right alignment involves down-tilting antennas and performing drive tests to

see if each sector covers the proposed azimuths. The inherent properties of WiMAX’s Orthogonal

Frequency Division Multiple Access (OFDMA) scheme controls adjacent channel interference

(ACI) at the sector boundaries.


3.3.5 Frequency Band and Other Considerations: Calculations for link margins and SNR must

include a number of factors, mostly related to the deployment environments and quality of service

goals. The chosen WiMAX implementation technology strongly influences these tradeoffs. Because

of the importance of good reception inside buildings and vehicles, penetration loss must be taken

into account by utilizing the normalization factor (n-factor) for a given medium. The n-factor

depends on the modulation and is used to achieve the same average power for all mappings. The

modulation is based on Quadrature Amplitude Modulation (QAM) with 2M points constellation,

where M is the number of bits transmitted per modulated symbol.

Another factor is antenna gain, which can be used to increase coverage with the tradeoffs

that an increase in antenna gain decreases the carrier-to-interference-plus-noise ratio (CINR). A

CINR of 25 dB or better is normal. Other link parameters including fade margins and interference

margins are assumed to be the same for each of the frequency bands — 2.5 GHz, 3.5 GHz and

eventually 5.8 GHz bands.

3.3.6 Beam-forming Benefits: Beam-forming improves both the range and capacity of a

WiMAX network at a relatively low implementation cost. Beam-forming reduces capital and

operating expenses for WiMAX implementations by minimizing the number of base stations needed

in a network. This technique is especially useful for Mobile WiMAX systems, which must

minimize interference while providing good coverage in all parts of the environment for mobile

subscribers.

Beam-forming uses an Advanced Antenna System (AAS) and multi-signal processing

techniques to direct transmission power where it is needed towards specific Mobile WiMAX

receivers. Rather than send one high-powered signal, the system sends multiple small signals such

that they combine at the end-user terminal, but cancel each other out in other places. To do beam-

forming well, the system needs to take “sounding” measurements on the uplink and apply

corrections to the downlink based on these measurements.


Beam-forming thus addresses the fundamental power problem encountered in delivering

personal broadband with high data rates. With beam-forming, a base station does not need enough

RF power to broadcast high data rates to every part of the coverage area simultaneously. Base

stations can apply their power selectively, thus providing excellent coverage at lower costs. All

customer devices must support beam-forming as part of the WiMAX Forum Wave2 certification for

PHY and MAC features. However, the quality of the beam-forming implementation varies

considerably from one vendor to another.

3.4.0 SECURITY IN WIMAX TECHNOLOGY

Security is a broad and complex subject, and this section provides only a brief introduction

to it. However, basic security issues are being covered, introducing some terminology, and

providing a brief overview of some of the security mechanism of WiMAX Technology.

Well designed security architecture for a WiMAX and other wireless communication

networks should support the following essential requirements:

i. Privacy: Provides protection from eavesdropping as the user data traverses the network

from source to sink.

ii. Data integrity: This ensures that user data and control/management messages are

protected from being tampered with while in transit.

iii. Authentication: Have a mechanism to ensure that a given user/device is the one it claims

to be. Conversely, the user/device should also be able to verify the authenticity of the

network that it is connecting to. Together, the two are referred to as “mutual

authentication”.

iv. Authorization: Has a mechanism in place to verify that a given user is authorized to

receive a particular service.

v. Access control: Ensures that only authorized users are allowed to get access to the offered

services.
vi. WiMAX security is typically handled at multiple layers within a system. Each layer

handles different aspects of security, though in some cases, there may be redundant

mechanisms. As a general principle of security, it is considered good to have more than

one mechanism providing protection so that security is not compromised in case one of the

mechanisms is broken. At the link layer, strong encryption is used for wireless systems to

prevent over-the-air eavesdropping. Also needed at the link layer is access control to

prevent unauthorized users from using network resources: precious over-the-air resources. 

vii. Link layer encryptions are not often used in wired links, where eavesdropping is

considered more difficult to do. In those cases, privacy is ensured by the comprehensive

security mechanisms used at the higher layers. At the network layer, a number of methods

provide security. The network itself may be protected from virus attacks through the use of

“firewalls”. Authentication and authorization services are typically done through the use

of Authentication, Authorization, and Accounting (AAA) protocols, such

as RADIUS (Remote Access Dial-In User Service). At the transport layer (TLS) its

precedent was called Secure Sockets layer (SSL) may be used to add security to transport

layer protocols and packets. At the application layer, digital signatures, certificates, digital

rights management, and so on are implemented, depending on the sensitivity of the

application. 

3.5.0 WIMAX SECURITY FUNCTIONS

Unlike Wi-Fi, WiMAX technology system was designed at the beginning with

robust security in mind. The standard includes state of the art methods for ensuring user data

privacy and preventing unauthorized access, with additional protocol optimization for mobility.

Security is handheld by a privacy sub layer within the WiMAX Medium Access Control (MAC).

The key aspects of WiMAX security are as follows:-

i. Support for Privacy: User data is encrypted using cryptographic schemes of proven

robustness to provide privacy. Both Advanced Encryption standard (AES) and Triple


data Encryption Standard (3DES) are supported. Most system implementation will likely

uses Advanced Encryption standard (AES), as it is the new encryption standard

approved as compliant with Federal Information Processing Standard (FIPS) and is easier

to implement. The 128-bit or 256-bit key used for deriving the cipher is generated during

the authentication phase and is periodically refreshed for additional protection.

ii. Authentication in WiMAX Technology: WiMAX offers a flexible means for authenticating

subscriber stations and users to prevent from unauthorized use. The authentication

structure is based on the Internet Engineering Task Force (IETF) EAP, which supports a

variety of identifications, such as username/password, digital certificates, and smart cards.

WiMAX terminal devices come with built-in X.509 digital certificates that contain their

public key and MAC address. WiMAX operators can apply the certificates for device

authentication and use username/password or smart card authentication on top of it for

authentication of users. 

iii. Flexible Key Management Protocol in WiMAX: The Privacy and Key Management

Protocol Version 2 (PKMv2) is used for transmitting keying material securely from the

base station to the mobile station. PKM protocols are also used to periodically reauthorize

and refresh the keys. PKM protocol is a client-server protocol where the mobile station

acts as the client and the base station, the server. The PKM protocol uses X.509 digital

certificates and Rivest Shamer Adleman (RSA) public-key encryption algorithms to

securely perform key exchanges between the base station and the mobile station. 

iv. Protection of Control Messages in WiMAX: The integrity of over the air control

messages is protected by using message digest schemes, such as Advance Encryption

Standard (AES) based Cipher-based Message Authentication Code (CMAS) or Message

Digest 5 based Hash-based Message Authentication (HMAC).

v. Support for Fast Handover in WiMAX: To support fast handovers, WiMAX

technology allows the mobile station to use pre-authentication with a particular target base

station to assist accelerated re-entry. A three-way handshake scheme is supported to


optimize the re-authentication mechanisms for supporting fast handovers, while at the

same time preventing any “man-in-the-middle” attacks. 

3.6.0 WiMAX - Reference Network Model

The IEEE 802.16e-2005 standard provides the air interface for WiMAX but does not define

the full end-to-end WiMAX network. The WiMAX Forum's Network Working Group (NWG), is

responsible for developing the end-to-end network requirements, architecture, and protocols for

WiMAX, using IEEE 802.16e-2005 as the air interface.

The WiMAX NWG has developed a network reference model to serve as an architecture

framework for WiMAX deployments and to ensure interoperability among various WiMAX

equipment and operators. The network reference model envisions unified network architecture for

supporting fixed, nomadic, and mobile deployments and is based on an IP service model. Below is

simplified illustration of an IP-based WiMAX network architecture. The overall network may be

logically divided into three parts:

1. Mobile Stations (MS) used by the end user to access the network.

2. The access service network (ASN), which comprises one or more base stations and

one or more ASN gateways that form the radio access network at the edge.

3. Connectivity service network (CSN), which provides IP connectivity and all the IP

core network functions.

The network reference model developed by the WiMAX Forum NWG defines a number of

functional entities and interfaces between those entities. Fig below shows some of the more

important functional entities.

 Base station (BS): The BS is responsible for providing the air interface to the MS.

Additional functions that may be part of the BS are micromobility management functions,

such as handoff triggering and tunnel establishment, radio resource management, QoS

policy enforcement, traffic classification, DHCP (Dynamic Host Control Protocol) proxy,

key management, session management, and multicast group management.


 Access service network gateway (ASN-GW): The ASN gateway typically acts as a layer

2 traffic aggregation point within an ASN. Additional functions that may be part of the

ASN gateway include intra-ASN location management and paging, radio resource

management and admission control, caching of subscriber profiles and encryption keys,

AAA client functionality, establishment and management of mobility tunnel with base

stations, QoS and policy enforcement, foreign agent functionality for mobile IP, and

routing to the selected CSN.

 Connectivity service network (CSN): The CSN provides connectivity to the Internet,

ASP, other public networks, and corporate networks. The CSN is owned by the NSP and

includes AAA servers that support authentication for the devices, users, and specific

services. The CSN also provides per user policy management of QoS and security. The

CSN is also responsible for IP address management, support for roaming between

different NSPs, location management between ASNs, and mobility and roaming between

ASNs.

Fig. 3.2 IP-Base WiMAX Network Architecture

The WiMAX architecture framework allows for the flexible decomposition and/or

combination of functional entities when building the physical entities. For example, the ASN may

be decomposed into base station transceivers (BST), base station controllers (BSC), and an

ASNGW analogous to the GSM model of BTS, BSC, and Serving GPRS Support Node (SGSN).
CHAPTER FOUR

RESULT AND DISCUSSION

4.0 Introduction

This chapter reveals the responses of 12 respondents considered for this study, 10 males and

2 females respondents. Due to the nature of the work and the different attributes of the respondents,

the findings are treated as their percentage on group basis. The findings are discussed in line with

the objective of the study as follows;

4.1 Distribution of Respondents by Company Year of Existence

As indicated by the respondents, greater numbers of the respondents interviewed had been in

existence above 6 years with distribution 6 (50%) while those with less than 5 years and above 10

years share equal distribution of 25% each respectively as shown in Table 4.1 and Fig. 4.1.

Table 4.1 Distribution of Respondents by Company Year of Existence

How long have the company Frequency Percent


been in existence

less than 5 years 3 25.00

6-10 years 6 50.00

above 10 years 3 25.00

Total 12 100.00
Source: Field Survey, 2010

Fig.4.1 Distribution of Respondents by Company Year of Existence

4.2 Abnormal Experience form Operation Commencement

It was revealed from the Table 4.2 that 50% of respondents in the study area indicated that they had

abnormal experience while 50% did not indicate.

Table 4.2 Distribution of Respondents by Abnormal Experience form Operation Commencement

Has the company had any

abnormal experience

since beginning of

operation Frequency Percent

Yes 6 50.00
No 6 50.00

Total 12 100.00
Source: Field Survey, 2010

Fig. 4.2 Distribution of Respondents by Abnormal Experience form Operation Commencement

(Source: Field Survey, 2010)

4.3 Distribution of Respondents by Service Render to the Client

In relation to the types of service rendered to the client, majority of the respondents 50% rendered

Internet services, 16.67% rendered GSM services, 25% rendered CDMA/PSTN while 8.33% rendered

VPN services as shown in Table 4.3 and Fig. 4.3.

Table 4.3 Distribution of Respondents by Service Render to the Client

What services does the Company render

to its clients Frequency Percent


Internet 6 50.00
GSM 2 16.67
CDMA/PSTN 3 25.00
VPN 1 8.33
Total 12 100.00
Source: Field Survey, 2010

Fig. 4.3 Distribution of Respondents by Service Render to the Client (Source: Field Survey, 2010)

4.4 Distribution of Respondents by the type of Topology in Use

As indicated by the respondents, greater numbers of the respondents interviewed made use of Ring

Topology with distribution 6 (50%), 30% used Star Topology while Mesh Topology is used by only

20% of the respondents.

Table 4.4 Distribution of Respondents by the type of Topology in Use

topology in Use Frequency Percent

Star 4 30.00

Ring 6 50.00

Mesh 2 20.00

Total 12 100.00
Source: Field Survey, 2010
Fig 4.4 Distribution of Respondents by the type of Topology in Use (Source: Field Survey, 2010)

4.5 Types of Technologies and Transmission Media in Use

From the finding of this study, 58.33% respondents made use of LAN technology while 41.67% of

the same group did not. Similarly, 88.33% of the respondents made use of WLAN technology while

16.67% of them did not. However, 33.33 of the respondents made use of WMAN while 66.67% did

not. Also, 50%% of the entire interview respondents in the study area used WWAN.

With regards to transmission media in use, 75.00% of the respondents use (Coper Cable pair) in

transmitting, 25% did not, 66.67% of them used Optical fibre cable. Similarly, 66.67% of them

made use of Radio for transmission while only 33.33% of the same group used Satellite for

transmission.

Table 4.5 Distribution of Respondents by the types of Technologies and Transmission Media in Use

Yes No
Freq % Freq %

LAN 7 58.33 5 41.67

WLAN 10 83.33 2 16.67

WMAN 6 50.00 6 50.00

WWAN 4 33.33 8 66.67

Transmission media is in use

Copper Cable pair 9 75.00 3 25.00

Optical fibre cable 8 66.67 4 33.33

Coaxial cable 3 25.00 9 75.00

Radio 8 66.67 4 33.33

Satellite 4 33.33 8 66.67


Source: Field Survey, 2010
Fig. 4.5 Distribution of Respondents by the types of Technologies and Transmission Media in Use

(Source: Field Survey, 2010)

4.6 Types of Wireless Radio Used by the Company

With regards to type of wireless radio used by the company , 41.67%, majority of the respondents used

WiMAX, 33.33% used Wi-Fi, 16.67% of them used LTE while 8.335 used none of the wireless radio

at all..

Table 4.6 Distribution of Respondents by the types of Wireless Radio Used by the Company

What type of Wireless

radio does the company

use Frequency Percent


Wi-Fi 4 33.33
WiMAX 5 41.67
LTE 2 16.67
None 1 8.33
Total 12 100.00
Source: Field Survey, 2010
Fig. 4.6 Distribution of Respondents by the types of Wireless Radio Used by the Company (Source:

Field Survey, 2010)

4.7 TYPES OF MODULATION USED BY THE COMPANY

With regards to type Modulation used by the company, 58.33%, majority of the respondents used

QAM, 33.33% used OFDM, while 8.33 used DSSS.

Table 4.7 Distribution of Respondents by the types of Modulation Used by the Company

What is the type of

Modulation in use Frequency Percent

OFDM 4 33.33

DSSS 1 8.33

QAM 7 58.33

Total 12 100.00
Source: Field Survey, 2010

Fig. 4.7 Distribution of Respondents by the types of Modulation Used by the Company (Source: Field

Survey, 2010)
4.8 Types of Duplex Used by the Company

With regards to type of duplex used by the company, 75.00%, majority of the respondents used Full

duplex FDD while 25.00% used TDD

Table 4.8 Distribution of Respondents by the types of Duplex Used by the Company

What is type of duplex is used Frequency Percent


Full duplex FDD 9 75.00
TDD 3 25.00
Total 12 100.00
Source: Field Survey, 2010

Fig. 4.8 Distribution of Respondents by the types of Duplex Used by the Company (Source: Field

Survey, 2010)

4.9 Types of Access Protocol Used by the Company

With regards to type of duplex used by the company, 83.83%, majority of the respondents used Full

CSMA/CA while 16.67% used TDM/TDMA.

Table 4.9 Distribution of Respondents by the types of Access Protocol Used by the Company

What is the access protocol in

use Frequency Percent

CSMA/CA 10 83.33

TDM/TDMA 2 16.67

Total 12 100.00
Source: Field Survey, 2010
Fig. 4.9 Distribution of Respondents by the types of Access Protocol Used by the Company (Source:

Field Survey, 2010)

4.10 Identified Feature of WiMAX in Nigeria

The respondents’ decisions towards the identified WiMAX in Nigeria are shown in the table below.

The opinion of respondents as far as the issue of WiMAX ‘supports for lots of modulation and error

correction facility to use.’ is concerned; it was identified as a feature. This can be supported by the

fact that a large number of the respondents in the study area ‘agreed’ and ‘strongly agreed’ with

41.67% and 50% respectively. The study also confirmed ‘offering of very high speed data rate’ as

another identified features of WiMAX. The reason is that over 60% of the respondents ‘agreed’ and

‘strongly agreed’ to it respectively while only 33.33% of the same group ‘strongly disagree’.

Similarly, 50% of interviewed respondents ‘strongly agreed’ that ‘WiMAX supports automatic

retransmission of data link layer.’

Furthermore, ‘offering of very high speed broadband access to mobile internet’ is also another

feature of WiMAX identified in the study areas; this can be explained by the result since 58.33%

and 38.33% of the study respondents ‘agree’ and ‘strongly agree’ respectively. Also, it was

identified that WiMAX ‘Facilitate the user with strong encryption’ this is supported by the fact that

41.47% and 33.33% ‘strongly agree’ and ‘agree’ respectively.


Table 4.10 Identified Feature of WiMAX in Nigeria

Strongly Strongly
Agree Agree Disagree Disagree
Freq % Freq % Freq % Freq %
It supports lots of modulation
and error correction facility to
use. 6 50.00 5 41.67 1 8.33
It offers very high speed data
rate 6 50.00 2 16.67 4 33.33
It supports automatic
retransmission of data link layer 6 50.00 1 8.33 5 41.67
It offers very high speed
broadband access to mobile
internet 7 58.33 4 33.33 1 8.33
It facilitate the user with strong
encryption 5 41.67 4 33.33 9 8.33 2 16.67
Source: Field Survey, 2010

Table 4.10 Identified Feature of WiMAX in Nigeria (Source: Field Survey, 2010)

4.11 Problem believed to be encountered by the use of WiMAX in Nigeria

The position held by the respondents in relation to the problem encountered by the use of WiMAX

in Nigeria. The outcome of the study as to ‘Encryption’ is that majority of the respondents 58.33%

strongly disagree to encryption to be a problem of WiMAX use in Nigeria. Similarly, Licensing of

WiMAX was also not seen as a major problem in Nigeria, then reason is that 41.67% and 8.33% of

the respondents ‘strongly disagree’ and ‘disagree’ respectively.. Another factor believed not
constitutes problem in Nigeria is ‘WiMAX Authentication’ with over 50% of the respondents

interviewed disagreeing to the fact.

However, most of the respondents were of the opinion that ‘Installation and Operational Cost’

constitute a problem as over 90% of the entire respondents ‘agreed’ to the fact.

Table 4.11 Problem believed to be encountered by the use of WiMAX in Nigeria

Strongly
Strongly Agree Agree Disagree Disagree
Freq % Freq % Freq % Freq %

Encryption 4 33.33 1 8.33 7 58.33

Licensing 4 33.33 2 16.67 1 8.33 5 41.67

Authentication 4 33.33 1 8.33 1 8.33 6 50.00

Availability 4 33.33 1 8.33 7 58.33


Installation and
Operational Cost 5 41.67 6 50.00 1 8.33
Source: Field Survey, 2010

Fig. 4.11 Problem believed to be encountered by the use of WiMAX in Nigeria (Source: Field

Survey, 2010)
CHAPTER FIVE

CONCLUSION AND RECOMMENDATION

5.1 CONCLUSIONS

The increasing demand for high speed broadband wireless access supporting high data rate

delivering capabilities for triple play (Video, Voice, data) with mobility has created an interest in

the telecommunication circles to formulate new technologies and architecture to offer such services

at low cost and high efficiency to the operators and end users.

802.11 is views as the most likely contender for the home network backbone, while ZigBee

is likely to make the best use of its low-power and high-speed operation in short-range equipment

interconnects, such as personal computers and portable equipment. 802.11 is viewed as being

superior in maintaining compatibility with existing wireless LAN, while ZigBee is generally

thought more likely to achieve lower levels of power consumption.

The ITU defined 4G under the “MT Advance” tag, two Technologies; WiMAX and 3GPP

Long Term Evolution (LTE) as the major contenders for attaining the ‘4G’ crown. This study

revealed that WiMAX and LTE are technically very alike providing similar access technologies,

radio access modes, FFT sizes, channel bandwidth, cell radius, antenna configurations, QoS,

mobility in an All-IP network. WiMAX and LTE deployments have already begun throughout the

world and here in Nigeria. Most companies deploy WiMAX as their core broadband access while

some deploy it as their backhaul. Those that deploy it as their backhaul are already using Wi-Fi as

their core access so they deploy both Wi-Fi and WiMAX to coexist with one another.

5.2 RECOMMENDATIONS

It is recommended that this work is extended into achieving a balance of transmission on the

WiMAX and LTE technologies. The feasibility of the security in the WiMAX technology should be

investigated.
REFERENCES

1. Abhayawardhana, V.S.; Wassell, I.J.; Crosby, D.; Sellars, M.P.; Brown, M.G.; Comparison of

empirical propagation path loss models for fixed wireless access systems. Vehicular

Technology Conference, 2005. VTC 2005-Spring. 2005 IEEE 61st Volume 1, 30 May-1 June

2005 Page(s):73 - 77 Vol. 1

2. Alamouti, S. M., “A Simple Transmit Diversity Technique for Wireless Communications,”

IEEE Journal on Select Areas in Communications, vol. 16, no. 8, pp. 1451–1458, Oct. 1998.

3. Anderson, Harry R. FIXED BROADBAND WIRELESS SYSTEM DESIGN. Wiley, England

2003.

4. ATDI, “Radio Propagation in ICS Telecom” July 13, 2004.

5. Bhavneet Sidhu, Hardeep Singh, and Amit Chhabra “Emerging Wireless Standards - WiFi,

ZigBee

6. and WiMAX” World Academy of Science, Engineering and Technology 25 2007

7. Broadcom, 802.11n: Next-Generation Wireless LAN Technology, White Paper dated April

2006

8. C. Eklund et al., “IEEE Standard 802.16: A Technical Overview of the WirelessMAN™ Air

Interface for Broadband Wireless Access,” IEEE Commun. Mag., June 2002, pp. 98–107.

9. C. Y. Wong et al., “Multicarrier OFDM with Adaptive Subcarrier, Bit, and Power

Allocation,” IEEE JSAC, vol. 17, no. 10, Oct. 1999.

10. Darcy Poulin. “WiMAX advantages bring about new challenges” Aug 25, 2005

11. D. M. Mandelbaum, “An Adaptive-Feedback Coding Scheme Using Incremental

Redundancy,” IEEE Trans. Info. Theory, vol. 20, no. 3, 1974, pp. 388–89.

12. Erceg, V., et al., “Channel models for fixed wireless access applications,”

http://www.wirelessman.org/tg3/contrib/802163c-01_29r4.pdf.

13. Homepage of 802.15 WPAN Task Group 4 (TG4),

http://grouper.ieee.org/groups/802/15/pub/TG4.html IEEE 802.16 and WiMAX: Broadband


Wireless Access for Everyone, Intel Corporation, 2003.

http://www.intel.com/ebusiness/pdf/wireless/intel/80216_WiMAX.pdf

14. Intel Technology Journal, Volume 8, Issue 3, 2004.

15. Introduction to Wi-Fi technology, Retrieved on September 24, 2006 from www.wi-

fitechnology.com

16. ITU, “ITU Overview”, Dec 25, 2005, http://www.itu.int/aboutitu/overview/itursg.html.

17. J. P. Pugliese, A. Hammoudeh, and M. O. Al-Nuaimi, “Reflection and transmission

characteristics of building materials at 62 GHz,” in Inst. Elect. Eng. Colloq. Radio

Communications Microwave

18. L. M. Correia and P. O. Frances, “Estimation of materials characteristics from power

measurements,” in Proc. 5th IEEE Int. Symp. Personal, Indoor, Mobile Radio Commun.,

Hague, The Netherlands, Sept. 1994, pp. 510–513.

19. Millimeter Wave Frequencies, 1996, pp. 6/1–6/6.

20. Mirza M Wahaj, “RCE Certification Course Redline’s TDM Over Packet Solution: Module-

4” (August 28, 2004).

21. M. Hata, “Empirical formula for propagation loss in land mobile radio services,” IEEE

Transactions on Vehicular Technology, vol. vol. VT-29, pp. 317–325, September 1981.

22. M. Iskander, Z. Yun, and Z. Zhang, “Outdoor/indoor propagation modelling for wireless

communications systems,” IEEE Antennas and Propagation Society International Symposium,

vol. 2, pp. 150–153, July 2001.

23. Monica Paolini “WiMAX and Cellular: Competitive or Complementary?” Senza Fili

Consulting, WCA Meeting, Tuesday, July 18, 2006

24. P. Kinney, ZigBee Technology: Wireless Control that Simply Works, White Paper dated 2

October 2003.

25. Ranveer Chandra, Christof Fetzer, Karin H¨Ogstedt “Adaptive Topology Discovery in Hybrid

Wireless Networks” http://research.microsoft.com/en-us/um/people/ranveer/docs/topology.pdf


26. Redline Communications Inc., “RCE Certification Course Module-2 AN-50 System

Overview, Configuration and Deployment”, v1.6 (2004).

27. Redline Communications Inc., “RCE Certification Course Module-3 AN-50 PMP System

Overview and Configuration”, v1.6 (2004).

28. Rhim, H. C., and Buyukozturk, O., 1998, Electromagnetic properties of concrete at

microwave frequency range: ACI Materials Journal, v. 95, p. 262-271

29. Sanida Omerovic “WiMAX Overview” Faculty of Electrical Engineering University of

Ljubljana, Slovenia, 2006

30. S. Lin and P. Yu, “A Hybrid ARQ Scheme with Parity Retransmission for Error Control of

Satellite Channels,” IEEE Trans. Commun., vol. 30, no. 7, July 1982, pp 1701–19.

Specifications of WiMAX. Retrieved on October 10, 2006 from http://WiMAX.com

31. SR Telecom Inc. “WiMAX Technology LOS and NLOS Environments” Aug 30, 2004

32. S. T. Peng, T. Tamir and H. L. Bertoni, “Theory of Periodic Dielectric Waveguides,” IEEE

Transactions on Microwaves Theory and Technologies, vol. MlT-23, no. 1, pp. 123-133,

January 1975.

33. V. Erceg, L. J. Greenstein, et al., “An empirically based path loss model for wireless channels

in suburban environments,” IEEE Journal on Selected Areas of Communications, vol. 17, pp.

1205–1211, July 1999.

34. Westech Communications Inc. on behalf of the WiMAX Forum, “Can WiMAX Address Your

Applications” White paper dated October 24, 2005.

35. Z. Shen, J. G. Andrews, and B. L. Evans, “Optimal Power Allocation for Multiuser OFDM,”

IEEE GLOBECOM, San Francisco, CA, Dec. 2003, pp. 337– 41.

Das könnte Ihnen auch gefallen