Beruflich Dokumente
Kultur Dokumente
NIGERIA
BY
(TP08/09/H/2442)
TECHNOLOGY
IN
2010
Hz Hertz
HARQ Hybrid-ARQ
MS - Mobile Station
NLOS - Non-Line-of-Sight
Providers in Nigeria”. The Broadband Wireless Access Industry that provides high-rate network
connections to fixed sites had matured to the point that it has Standards for Third-Generation (3G)
Wireless Metropolitan Area Network. The architectures are also suitable for use in a Fourth-
Generation (4G) Standard which is characterised by the support of much higher data rates that are
This work will present the emerging technologies helping wireless communication to grow
from where it was before to what it is today. It will cover the applications, characteristics and
differences of the emerging wireless technologies such as Wireless Local Area Network (WiFi-
802.11n), Wireless Personal Area Networks (ZigBee) and Wireless Metropolitan Area Networks
Standards is a Standard for Wireless Data Transmission covering a range similar to cellular phone
towers which represents a joint effort between traditional standards development, organisation and
industry. This hybrid approach had added significant value to the overall development of WiMAX
technology and services. This thesis describes the process by which WIMAX evolved, explores its
market potential and impact on the telecommunication Industry. WiMAX shows great promise as
an Internet Protocol native, high quality, high throughput, wireless pipe with greater range than
INTRODUCTION
1.0 By demonstrating a long history of latent expectation, fixed wireless was considered to
have underperformed, which brought about the serious talk of WiMAX. Everybody’s even
talking about WiMAX, the great hope for wireless broadband, the evolution of Wi-Fi, the
answer to backhaul, everything to everybody. All these imply the need for efficient and robust
communication system that led to the introduction of WiMAX technology in services. A broad
range of fixed, mobile and Wide Area Terrestrial Network all used for Communication
System. The introduction of wireless network had facilitated the increase of local service
external (global) networks. Wireless means transmitting signals using radio waves as the
a. Mobility: it allows users to access information beyond their desks and conduct
limitations of location.
c. Simplicity: It is easy and fast to deploy in comparison to cabled network with initial
setup cost a bit on the high side but other advantages overcome the high cost.
d. Maintainability: It does not need to spend too much to maintain a wireless network
setup.
This work is about the WiMAX (Standard) an acronym “Worldwide Interoperability for
Microwave Access” that enables the delivery of last mile Wireless Broadband Access, an
alternative to cable and Digital Subscriber Line (DSL). WiMAX is based on wireless
Metropolitan Area Network (WMAN) standards developed by IEEE 802.16 group and adopted
WiMAX technology will provide fixed, Nomadic, Portable and eventually Mobile
wireless broadband connectivity without the need for direct line of sight to a base station.
WiMAX, together with synergetic mesh networking technologies such as QoS- aware routing,
can potentially provide a solution for onboard internet broadband access without using a
backhaul satellite communication system. Such a system could be implemented today even in
1.1 BACKGROUND
The IEEE 802.16 group was formed in 1998 to develop an air-interface standard for
wireless broadband. The group’s initial focus was the development of a LOS based point-to-
multipoint wireless broadband system for operation in the 10GHz – 66GHz millimetre wave
band. The resulting standard, the original 802.16 standard completed in December 2001 was
based on a single carrier (SC) Physical (PHY) layer with a burst time division multiplexed
(TDM) MAC layer. Many of the concepts related to the MAC layer were adopted for wireless
from the popular cable modem Data over cable service interface Specification (DOCSIS)
standard.
The IEEE group subsequently produced 802.16a and amendment to the standard, to
include NLOS applications in the 2GHz – 11GHz band, using an Orthogonal Frequency
Division Multiplexing (OFDM) based physical layer. Additions to the MAC layer, such as
support for Orthogonal Frequency Division Multiple Access (OFDMA) were also included. It
was published in April 2003. Further revisions resulted in a new standard in 2004, called
IEEE 802.16-2004 that set WiMAX as a wireless broadband technology with high potential by
replacing all prior versions and formed the basis for the first WiMAX solution. These early
WiMAX solution based on IEEE 802.16-2004 targeted fixed applications and will be referred
to as Fixed WiMAX. In December 2005, the IEEE group completed and approved IEEE
802.16e-2005, an amendment to the IEEE 802.16-2004 standard that added mobility support.
It formed the basis for WiMAX solution for nomadic and mobile applications and is often
applications and deployments scenarios and hence offer a large amount of design choices for
system developers. So we could say that IEEE 802.16 is a collection of standards not one single
interoperable standard.
WiMAX technology has evolved through four stages albeit not fully distinct or clearly
sequential:
Despite the promise of WiMAX as an IP-base, high throughput long range fixed/mobile
wireless technology, there are serious challenges to its ultimate success which fall into three (3)
general categories;
1.) WiMAX Availability problem: Where WiMAX deployments will use licensed Radio
Frequency (RF) Spectrum positively granting them some degree of protection from
which implies that an attacker can use legacy management frames to forcibly
networks is that each subscriber station (SS) must have a X.509 certification that
will exclusively recognise the subscriber. It’s use makes it difficult for an attacker to
spoof the identity of subscriber, adding sufficient protection against theft of service.
key Management (PKM) protocol which lack in authentication of Base Station (BS)
Some of this dissatisfaction surfaced with the technical performance, include range
and penetration of WiMAX. While WiMAX has been touted as a key standard for 4G
telephony, because of its potential for high quality IP streaming video in addition to high
throughput voice and data, some manufacturer clustering their support around competing
technologies such as Long Term Evolution (LTE) standards based on CDMA technology.
Finally ITU Standardization approval for WiMAX indicates that if not the backbone of
Since we require detailed information in the form of voice, data, fax and video to be
transmitted quickly and reliably to and from anywhere at anytime, the emergence of 802.16
standards creates complete new area for innovation concerning flexible broadband
connectivity in the internet. Wide adoption of broadband wireless access and mesh
networking can eventually provide ubiquitous connectivity to the internet at anytime. Using a
simple case study of present application, we can show that connectivity to the internet in the
world is possible without using an expensive, low bandwidth and high-latency satellite
backhaul.
The aim of this study is to investigate the application of WiMAX standard in while the
1.5 METHODOLOGY
This thesis is not an economic analysis but a descriptive narrative means to explore the
resulting market creation and projected impacts. To conduct a thorough economic analysis of
WiMAX, is still several years too early. The lack of an available methodology for measuring
1.6 LIMITATIONS
WiMAX is a great technology for next generation with potential applications such as
cellular backhaul, return trip of freight, hotspot, VoIP Mobiles and broadband connection but
Low bit rate over long distance: WiMAX technology offers long distance data range
which is 70 Km and high bit rate which is 70 Mbit/s that is good but both features
does not look together when the distance is increased, the bit rate will decrease and
if the bit rate is increased, then the distance range should be reduced.
Speed connectivity: The WiMAX’s other drawback is that any user closer to the
tower can get high speed which is can be up to 30Mbit/s but if a user exists at the
cell edge from the tower, such can obtain only 14Mbit/s speed.
users in a specified radio sector. Therefore functionality could go down if more than
one user exists in a single sector, resulting to additional radio cards to be added to
WiMAX over Wi-Fi: it is easy for any one to build up a Wi-Fi network but to setup
WiMAX network is really expensive so it very hard for everyone that they pay
large amount for the setup and frequency licenses of WiMAX in any region.
WiMAX technology and different architecture: Because of low bit range on long
distance, speed of connectivity from long range and low bandwidth among users,
the different granular and dispersed network architectures are being unsupported
into WiMAX during the period of making decision about the choice of WiMAX.
1.7 APPLICATIONS
WiMAX technology applications are means by which services providers present data,
video, voice, mobile and internet access. The benefits of WiMAX technology are such as
provision of simple based prospective cost saving and service efficiency but to be capable to
allow VOIP calling, mobile devices, video making and high-speed data transfer. The basic
strength behind the WiMAX technology application are high bandwidth, high quality
services, security, deployment, full duplex including DSL versus cable and its cost.
CHAPTER TWO
LITERATURE REVIEW
2.0 Literatures obtained were reviewed in this chapter. The overview of wireless
communication including its network concept was covered. The concept of Wi-Fi, ZigBee and
such as radio transmitters and receivers, remote controls, computer networks, network terminal and
so on which uses some form of energy such radio frequency (RF), infrared light, laser light, visible
light, acoustic energy and so on to transfer information without the use of wires and cables. The
distances involved may be short, a few meters as in television remote control or long, thousands of
kilometres for radio and telemetry communication (Wikipedia). The term is often shortened to
“WIRELESS”. It encompasses various types of fixed, mobile and portable two-way radios, cellular
telephones, personal digital assistants (PDAs), and wireless networking. Other examples of wireless
technology include GPS units, garage openers and remote controls. Wireless operations permits
services, such as long range communications, that are impossible or impractical to implement with
a device called a transmitter. There are two types of transmitters: analog and digital. An analog
transmitter sends electronic signals as modulated radio waves. The analog transmitter modulates the
radio wave to carry the electronic signal and then sends the modified radio signal through space. A
digital transmitter encodes electronic signals by converting messages into a binary code, the series
of zeros and ones that are the basis of all computer programming. The encoded electronic signal is
then sent as a radio wave. Devices known as receivers decode or demodulate the radio waves and
communication. However, there are some drawbacks. Wireless communications are limited by the
range of the transmitter and since radio waves travel through the atmosphere they can be disturbed
and receiving signals. A device that functions as both a transmitter and a receiver is called a
transceiver. Cellular radio telephones and two-way radios use transceivers, so that back-and-forth
Several different systems are used today, all of which operate on different radio frequencies. New
technologies are being developed to provide greater service and reliability (Microsoft Encarta
2007).
Wireless networking (i.e. the various types of unlicensed 2.4 GHz Wi-Fi devices) is used to
meet many needs. Perhaps the most common use is to connect laptop users who travel. Another
common use is for mobile networks that connect via satellite. A wireless transmission method is a
logical choice to network a LAN segment that must frequently change locations (Understand
Telecommunications Engineering). The following situations justify the use of wireless technology:
taking to be a network's virtual shape or structure which does not necessarily correspond to the
actual physical layout of the devices on the network. For example, the computers on a
home LAN may be arranged in a circle in a family room, but it would be highly unlikely to find a
Bus networks (not to be confused with the system bus of a computer) use a common
backbone to connect all devices that is a single cable. The backbone functions as a shared
communication medium that devices attach or tap into with an interface connector. A device
wanting to communicate with another device on the network sends a broadcast message
onto the wire that all other devices see, but only the intended recipient actually accepts and
processes the message. Ethernet bus topologies are relatively easy to install and don't require
("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies.
However, bus networks work best with a limited number of devices. If more than a few
dozen computers are added to a network bus, performance problems will likely result. In
addition, if the backbone cable fails, the entire network effectively becomes unusable.
In a ring network, every device has exactly two neighbours for communication purposes.
All messages travel through a ring in the same direction (either "clockwise" or "counter-
clockwise"). A failure in any cable or device breaks the loop and can take down the entire
Ring technology. Ring topologies are found in some office buildings or school campuses.
Many home networks use the star topology. A star network features a central connection
point called a "hub" that may be a hub, switch or router. Devices typically connect to the
hub with Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star
network generally requires more cable, but a failure in any star network cable will only take
down one computer's network access and not the entire LAN. (If the hub fails, however, the
(iv)Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its simplest
form, only hub devices connect directly to the tree bus and each hub functions as the "root"
of a tree of devices. This bus/star hybrid approach supports future expandability of the
network much better than a bus (limited in the number of devices due to the broadcast traffic
it generates) or a star (limited by the number of hub connection points) alone. (Bradley
Mitchell, 1999)
Mesh topologies involve the concept of routes. Unlike each of the previous topologies,
messages sent on a mesh network can take any of several possible paths from source to
destination. (Recall that even in a ring, although two cable paths exist, messages can only
travel in one direction.) Some WANs, most notably the Internet, employ mesh routing. A
mesh network in which every device connects to every other is called a full mesh. A partial
mesh networks also exist in which some devices connect only indirectly to others. (Bradley
Mitchell, 1999)
While more complex networks can be built as hybrids of two or more of the above basic topologies.
i.) Point-to-Point Bridges: - Since a bridge is used to connect two (2) networks. A point-
to-point bridge therefore interconnects two building having different networks. For
example, a wireless LAN bridge can interface with an Ethernet network directly to
ii.) Point-to-Multiple Bridge: - This topology is used to connect three or more LANs that
connected to a wired infrastructure and in which all stations are connected directly
to one another. Since An ad hoc network is a wireless network using peer to peer
H’Ogstedt)
Wireless technologies can be classified in different ways depending on their range. Each
wireless technology is designed to serve a specific usage segment. The requirements for each usage
segment are based on a variety of variables, including Bandwidth needs, Distance and Power needs.
i.) Wireless Wide Area Network (WWAN): enables one to access the Internet via a
wireless wide area network (WWAN) access card and a laptop. It provides a very fast data
speed compared with the data rates of mobile telecommunications technology, and their
range is also extensive. Cellular and mobile networks based on CDMA and GSM are good
examples of WWAN.
ii.) Wireless Personal Area Network (WPAN): are very similar to WWAN except
iii.) Wireless Local Area Network (WLAN): enables one to access the Internet in
localized hotspots via a wireless local area network (WLAN) access card and a PDA or
laptop. It is a type of local area network that uses high-frequency radio waves rather than
wires to communicate between nodes. These networks provide a very fast data speed
compared with the data rates of mobile telecommunications technology, and their range is
very limited. Wi-Fi is the most widespread and popular example of WLAN technology.
iv.) Wireless Metropolitan Area Network (WMAN): is a network that enables one to
access the Internet and multimedia streaming services via a wireless region area network
(WRAN), provides a very fast data speed compared with the data rates of mobile
telecommunication technology as well as other wireless network, and their range is also
extensive.
delivery is that, like the Internet over wired services, QoS is inadequate. Lost packets
ii. Security Risk: This has been another major issue with data transfer over wireless
residences and small businesses but they are inadequate for entities that require stronger
security.
iii. Reachable Range: wireless network offers a range of about one hundred meters or less.
Range is a function of antenna design and power. Nowadays the range of wireless is
Broadband wireless is a technology that promises high-speed connection over the air. It uses
radio waves to transmit and receive data directly to and from the potential users whenever they want
it. 3G, Wi-Fi, WiMAX and UWB technologies works together to meet unique customer needs.
BWA is a point-to-multipoint system which is made up of base station and subscriber equipment.
Instead of using the physical connection between the base station and the subscriber, the base
station uses an outdoor antenna to send and receive high-speed data and voice-to-subscriber
equipment. It offers an effective, complementary solution to wireline broadband, which has become
2.1.9 CORDLESS
The term “wireless” should not be confused with the term “cordless” which is generally
used to refer to powered electrical or electronics devices that are able to operate from a
portable power source, a battery pack without any cable or cord to limit the mobility of the
standardized as IEEE 802.15.4 for low power, low-data rate applications. The technology
innovation called ZigBee make it possible to remotely monitor various types of sensors-for air-
conditioning, lighting, smoke alarms, and many more. In effect, most of these wireless technologies
are not islands in themselves, but offer some interconnectivity between each other, which help in
creating a perfectly connected environment. The various wireless network technology options are
WMAN
<5Km
Wireless Metropolitan 70Mbit/s
Area Network 802.16a/e
WLAN
<100m
Wireless Local Area Network 11-54Mbit/s
802.11a/b, e, g, n
WPAN
Wireless Personal Area Network <10m
~1Mbit/s
802.15.1(Bluetooth)
802.15.3 (UWB)
Fig. 2.1. Types of Wireless Access. 802.15.4 (ZigBee)
devices such as routers and DSL or cable modems. A wireless LAN (WiFi) is a data transmission
using radio waves rather than a cable infrastructure. Wi-Fi is meant to be used generically when
referring to any type of 802.11 network, whether 802.11b, 802.11a, 802.11g and so on. The 802.11b
networks could move data at up to 11 megabits per second (Mbps). 802.11a followed, shortly after
by 802.11g, each with maximum speeds of 54Mbps and throughput of around 25Mbps. WLAN
hardware built around 802.11g was quickly embraced by consumers and businesses seeking higher
bandwidth. The Wi-Fi speed standard, 802.11n, offers a bandwidth of around 108Mbps and it is an
The emerging 802.11n specification differs from the predecessors in that it provides for a
variety of optional modes and configurations that dictate different maximum raw data rates. This
enables the standard to provide baseline performance parameters for all 802.11n devices, while
price points. With every possible option enabled, 802.11n could offer raw data rates up to 600
Mbps. But WLAN hardware does not need to support every option to be compliant with the
1) Better OFDM
that improves upon the one employed in the 802.11a/g standards, using a higher maximum
code rate and slightly wider bandwidth. This change improves the highest attainable raw
data rate to 65 Mbps from 54 Mbps in the existing standards. (Broadcom, 2006)
phenomenon called multipath. Transmitted information bounces off walls, doors, and other
objects, reaching the receiving antenna multiple times via different routes and at slightly
different times. Uncontrolled, multipath distorts the original signal, making it more difficult
to decipher and degrading Wi-Fi performance. MIMO harnesses multipath with a technique
known as space division multiplexing. The transmitting WLAN device actually splits data
stream into multiple parts, called spatial streams, and transmits each spatial stream through
separate antennas to corresponding antennas on the receiving end. The 802.11n provides for
up to four spatial streams, even though compliant hardware is not required to support that
many (Broadcom, 2006). Doubling the number of spatial streams from one to two
effectively doubles the raw data rate. There are trade-offs, however, such as increased power
consumption and to a lesser extent, cost. The specification includes a MIMO power-save
mode, which mitigates power consumption by using multiple paths only when
communication would benefit from the additional performance. The MIMO power save
Another optional mode in the 802.11n effectively doubles data rates by doubling the
width of a WLAN communications channel from 20 MHz to 40 MHz. The primary trade-off
here is fewer channels available for other devices. In the case of the 2.4-GHz band, there is
enough room for three non-overlapping 20-MHz channels. Meaning, a 40-MHz channel
does not leave much room for other devices to join the network or transmit in the same
airspace. It implies that intelligent, dynamic management is critical to ensuring that the 40-
MHz channel option improves overall WLAN performance by balancing the high-
bandwidth demands of some clients with the needs of other clients to remain connected to
the network.
hold in the home, a growing number of consumers will come to view 802.11n not just as an
enhancement to their existing network, but also as a necessity. Some of the current and emerging
applications that are driving the need for 802.11n are listed as follows:
i. Voice over Internet Protocol (VoIP): It is realized that VOIP can save money on
long distance phone calls by using the Internet instead of traditional phone services. An
increasingly popular way to make Internet calls is with VoIP phones, which are battery-
powered handsets that typically connect to the Internet with built-in 802.11b or 802.11g.
Telephony does not demand high bandwidth, although it does require a reliable network
connection to be usable. Both 802.11b and 802.11g consume less power than 802.11n in
MIMO modes, but single-stream 802.11n may be prevalent in VoIP phones. VoIP phones
can benefit today from the increased range and reliability of a 802.11n access point.
ii. Streaming video and music: As with voice, streaming music is an application that
requires a highly reliable connection that can reach throughout the home. Growing numbers
of consumers are streaming music directly from the Internet. Though higher bandwidth is
not absolutely necessary, the additional range and reliability that 802.11n offers may be
iii. Gaming: Gaming is an application that increasingly is making use of home WLANs,
whether users connect wirelessly to the Internet from their computers and portable gaming
iv. Network attached storage: A growing application that demands all that 802.11n has
to offer high data rates as well as range and reliability is Network-Attached Storage, or
recorder onto a notebook computer or portable media player for viewing outside the home
Fig. 2.2 compares the time it would take to transfer a 30-minute video file. At the best data transfer
rate, it would take 42 minutes to copy the file using 802.11b, and less than a minute with a two
802.11n
802.11g
802.11b
ZigBee is one of the technologies that enable Wireless Personal Area Networks (WPAN).
ZigBee is the name of a specification for a suite of high level communication protocols using small,
low-power digital radios based on the IEEE 802.15.4 standard. The technology is intended to be
simpler and cheaper than other WPANs such as Bluetooth. ZigBee protocols are intended for use in
embedded applications requiring low data rates and low power consumption. WPAN implies a
reach of only a few meters, 9.5m in the case of ZigBee, the network will have several layers, so
The ZigBee Standard has evolved standardized sets of solutions, called ‘layers' (P. Kinney,
2003). These layers facilitate the features that make ZigBee very attractive, low cost, easy
implementation, reliable data transfer, short-range operations, very low power consumption and
the network to spatially grow without requiring high power transmitters. The network
layer also handle large amounts of nodes with relatively low latencies.
ii. Physical layer: The IEEE 802.15.4 physical layer accommodates high levels of
integration by using direct sequence to permit simplicity in the analog circuitry and enable
cheaper implementations.
iii. Media access control layer: The IEEE 802.15.4 Media Access Control (MAC) layer
permits the use of several topologies without introducing complexity and is meant to work
ZigBee is poised to become the global control/sensor network standard. It has been designed
1) Low power consumption, with battery life ranging from months to years.
2) Maximum data rates allowed for each of the frequency bands are fixed as 250kbps
3) High throughput and low latency for low duty-cycle applications (<0.1%).
4) Channel access using Carrier Sense Multiple Access with Collision Avoidance (CSMA -
CA).
5) Addressing space of up to 64 bit IEEE address devices, 65,535 networks.
6) 70-100m range.
7) ZigBee’s simplicity allows for inherent configuration and redundancy of network devices
8) High density of nodes per network: ZigBee’s use of the IEEE 802.15.4 PHY and MAC
allows networks to handle any number of devices. This attribute is critical for massive
ZigBee networks consist of multiple traffic types with their own unique characteristics,
including periodic data, intermittent data, and repetitive low latency data. The characteristics of
• Periodic data – usually defined by the application such as a wireless sensor or meter. Data
typically is handled using a beaconing system whereby the sensor activates at a set time and
• Intermittent data – either application or external stimulus defined such as a wireless light
operation, the device will only attach to the network when communication is required, saving
significant energy.
• Repetitive low latency data – uses time slot allocations such as a security system. These
applications may use the guaranteed time slot (GTS) capability. GTS is a method of QoS that
allows each device a specific duration of time as defined by the PAN coordinator in the Super-
frame to do whatever it requires without contention or latency. In all applications, the smaller
packet sizes of ZigBee devices results in higher effective throughput values compared to other
standards. ZigBee networks are primarily intended for low duty cycle sensor networks (<1%).
2.2.3 WiMAX
Worldwide Interoperability for Microwave Access (WiMAX) is currently one of the hottest
technologies in wireless. The Institute of Electrical and Electronics Engineers (IEEE) 802
committee, which sets networking standards such as Ethernet (802.3) and Wi-Fi (802.11), has
published a set of standards that define WiMAX. IEEE 802.16-2004 (also known as Revision D)
was published in 2004 for fixed applications; 802.16 Revision E (which adds mobility) is publicised
in July 2005. The WiMAX Forum is an industry body formed to promote the IEEE 802.16 standard
and perform interoperability testing. The WiMAX Forum has adopted certain profiles based on the
802.16 standards for interoperability testing and “WiMAX certification”. These operate in the
2.5GHz, 3.5GHz and 5.8GHz frequency bands, which typically are licensed by various government
Multiplexing (OFDM), which is a very effective means of transferring data when carriers of width
of 5MHz or greater can be used. Below 5MHz carrier width, current CDMA based 3G systems are
connections over long distance. WiMAX can be used for a number of applications, including “last
mile” broadband connections, hotspots and high-speed connectivity for business customers. It
provides wireless metropolitan area network (MAN) connectivity at speeds up to 70 Mbps and the
WiMAX base station on the average can cover up to 5 to 10 km. The WiMAX Overview is given in
Figure 2.4 (Sanida Omerovic, 2008) and table 1 give the differentiation between the Fixed and
Mobile WiMAX.
duplexing
Handoffs No Yes
Service providers DSL and cable modem Mobile operators, DSL and cable
card
Spectrum bands 3.5 GHz, 5.8 GHz 2.3-2.4 GHz, 2.5-2.7 GHz, 3.3-3.4 GHz,
3.4-3.8 GHz
Certified products January 2006 2007
Table 2.1. Comparison of Fixed and mobile WiMAX (Monica Paolini, 2006)
wireless access which is based on the IEEE 802.16 standard for wireless metropolitan-area
networks (MANs). Unlike many technologies in the broadband wireless access domain that provide
only line of sight (LOS) coverage, the technology behind WiMAX has been optimized to provide
excellent non line of sight (NLOS) coverage. As a result, WiMAX products are able to support
downlink data rates of 65 Mbits/s at close range to 16 Mbits/s at distances of 9 to 10 km, which is
enough bandwidth and transmission range to deliver high-speed simultaneous access to voice, data,
WiMAX is able to overcome the impediments found in NLOS propagation and deliver such
OFDM technology.
Sub-Channelization.
Directional antennas.
Adaptive modulation.
Power control.
transmitting wireless information in high multi-path environments in 2-11 GHz frequency range.
OFDM works by dividing the data stream into several parallel bit streams. Each bit stream is
carried by a separate subcarrier and all subcarriers transmit in unison and simultaneously. Figure
2.4 depicts exactly how OFDM works in WiMAX. (C. Y. Wong et al, 1999)
2.) Sub-Channelization
WiMAX supports sub-channelization which means that instead of transmitting on all
192 data subcarriers, one can transmit on just a subset. As a result, the system achieves greater
range by using the same amount of power over fewer carriers. Since the power limitation in the
CPE, balancing the power in the uplink and downlink can be done by concentrating the power
over fewer subcarriers in the uplink (Darcy Poulin, 2005). The mechanism of Sub-channelization
been proven and successfully deployed in several systems that operate under significant NLOS
ii. Decrease of the delay spread at both the Base Station and the CPE
iii. Suppression of any multi-path signals that arrive in the side-lobes and back-lobes.
Diversity schemes are used to take advantage of multi-path and reflections signals
that occur in NLOS conditions. In transmit diversity, several antennas are placed at the transmitter
side with a separation between them that guarantees independent fading between the transmitted
signals across the wireless channel. This reduces the fade margin requirement and combats
interference. The same scheme applies for receive diversity where several antennas are placed at
the receiver side instead of being placed at the transmitter side which helps in overcome fading
Adaptive modulation allows the WiMAX system to adjust the signal modulation
scheme depending on the signal to noise ratio (SNR) condition of the radio link. The highest
modulation scheme is used when the radio link is high in quality. This gives more capacity for the
system. During a deep signal fade, the WiMAX system can transfer to a lower modulation scheme
to maintain the connection quality and link stability. “This feature allows the system to overcome
time-selective fading.” The main feature of adaptive modulation is that it allows one to transmit at
higher data rates during best case conditions as opposed to having a fixed scheme which transmits
always at low data rates to account for the worst case conditions. As illustrated in fig. 2.6
WiMAX utilizes several error correction techniques in its receiver structure to reduce the signal to
noise ratio requirements and significantly improve the bit error rate (BER) performance of the
system. These techniques, such as the Strong Reed Solomon FEC and convolution coding, are
used to recover frames in error which may have been lost due to deep fades in the channel (] D.
WiMAX incorporates several power control algorithms to reduce the overall power consumption
of the CPE, thus decreasing potential interference with other co-located units. This improves the
overall performance of the system dramatically. It is implemented by the base station sending
power control information to each of the CPEs to regulate the transmit power level to a fixed
threshold. Concerning a LOS system, the transmit power of the CPE is approximately
proportional to its distance from the base station. However in the NLOS system, this level
depends on many other factors such as the obstructions lying in the path between the CPE and the
base station.
After presenting a general introduction about the WiMAX wireless system and shedding
light on its different attributes, there is need to discuss the physical properties of the
electromagnetic waves which are the main carriers of data in wireless communication systems.
Technical aspects of 802.16a that are instrumental in powering robust performance include
• Spectrum initially 3.5 GHz licensed and 5.8 GHz unlicensed bands.
contention.
• Data rates variable with channel bandwidth 3.5 MHz in 3.5 GHz band, 20 MHz in 5.8 GHz
band.
• Maximum range ~2Km for indoor Non-LOS cellular service at 3.5 GHz.
offices or anywhere in the world, all seamlessly. WiMAX can serve the business, residential and
Residential users
Business users
WiMAX make possible the broadband access to conservative cable or DSL lines. The working
method of WiMAX is little different from Wifi network, because Wifi computer can be connected via
LAN card, router, or hotspot, while the connectivity of WiMAX network constitutes of two parts in
which one is WiMAX Tower or booster also known as WiMAX base station and second is WiMAX
to a base station, the wireless signal is broadcasted into channel known as uplink by the base station.
The base station transmits to the same or another user known as downlink. The WiMAX base station
has higher broadcasting power, antennas and enhanced additional algorithms. WiMAX technology
providers build a network with the help of towers that enable communication access over many miles.
The broadband service of WiMAX technology is available in coverage areas. The coverage areas of
great technique used to professionally take advantage from the frequency bands. The transmission
frequencies of WiMAX technology from 2.3MHz to 3.5 GHz make it low price wireless network. Each
spectral profile of WiMAX technology may need different hardware infrastructure. Each spectrum
contain its bandwidth profile which resolved channel bandwidth. The bandwidth signal is separated in
OFDMA (Orthogonal Frequency Division Multiplexed Access) is used to carry data called sub carrier.
Transmitted data is divided into numerous data stream where every one belongs to another sub carrier
and then transmitted at the same broadcast interval. At the downlink path the base station broadcast the
Multiplexed Access) that prohibit interfering and is been multiplexed. It also makes possible power
prioritization for various sub carriers according to the link quality. The sub carrier having good quality
carry more data since the bandwidth is narrow. But those that have low quality carry nun data.
WiMAX is providing quality of service (WiMAX QoS) which enables high quality of data like
VoIP or TV broadcasts. The data communication protocol from base station is an alternative of quality
of service (WiMAX QoS) application and offers video streaming. This type of data is translated into
parameters or sub carriers per user. All type of technique is carrying out together to speed up coverage,
bandwidth, efficiency and number of users. The base station of WiMAX has ability to cover up 50 Km.
WiMAX technology supports various protocols such as VLAN, ATM, IPv4 Ethernet etc.
2.2.4 LONG TERM EVOLUTION (LTE)
The LTE evolves from the Third-Generation technology which is based on Wideband Code
Division Multiple Access (WCDMA) and defines the LTE of the 3-GPP UMTS/HSPA cellular
technology. The specifications of these efforts are formally known as the Evolved UMTS
Terrestrial Radio Access (E-UTRA) and Evolved UMTS Terrestrial Radio Access Network (E-
UTRAN), commonly referred to by the 3-GPP Project LTE. The first version of LTE is documented
in Release 8 of the 3-GPP specifications. It defines a new physical layer radio access technology
based on Orthogonal Frequency Division Multiple Access (OFDMA) for downlink, Similar in
concept to the PHY layer of Mobile WiMAX and uses Single carrier FDMA (SC-FDMA) for the
uplink.
LTE supports high performance mobile access functional up to 350 Km/h with 500Km/h
under consideration peak data rates range from 100 to 326.4 Mbps on the downlink and 50 to 86.4
Mbps on the uplink depending on the antenna configuration and modulation depth. The LTE target
is to achieve the data rates set by the 4G ‘IMT-Advanced’ standard. The development of the LTE
interface is linked closely with the 3GPP system architecture evolution (SAE) which defines the
overall system architecture and Evolved Packet Core (EPC). The LTE aim is to provide an all IP
backbone with reduction in cost per bit, better service provisioning, flexibilyt in user of new and
existing frequency bands, simple network architecture with open interfaces and lower power
consumption.
electromagnetic (EM) waves. The amplitude, phase, or frequency (wavelength) of a wave can all be
and how information is propagated from one place to another in order determine the performance of
communication systems. Although free space primarily means in vacuum, it can be practically
implemented in short-range space-wave paths between elevated terminals. In free space, the signal
This attenuation factor is characterized by the free space pathloss given by:
2
Freespacepathloss PLF PR GTGR (Anderson, Harry R., 2003)
PT 4r
However, free space propagation alone cannot depict what will exactly happen to the signal
as it travels from the transmitter to the receiver as there are many effects that can substantially
2.3.2 REFLECTION
Reflection is one of the most important wave propagation phenomena involved in almost
not have any edges or discontinuities. Reflection takes place on the “specular point” where the
angle of incidence of the transmitted wave equals the angle of reflection of the reflected wave,
Pi Pr
Ground Specular Reflection
Fig. 2.9 Two dimensional geometry showing specular reflection (Anderson, Harry R., 2003)
In the real world, seldom do we encounter reflections along a smooth surface. However,
most of the times, we encounter surfaces that have random variations as in the earth’s surface or
have systematic variations such as in the walls and roofs of artificial structures. In severe scenarios,
the surface may appear to be a pure scatterer. The degree of roughness is given by the Rayliegh
criterion: hR (Anderson, Harry R., 2003)
8 sin y 0
where hR is the difference in the maximum and minimum surface variations; y 0 is the angle between
propagating wave in wireless communications. Diffraction only happens when an object partially
blocks the path of a propagating wave. Since our environment deals with a non-line of sight
scenario, we will be heavily relying on diffraction in our study, there are typically two models used
It occurs at the corner of buildings, at the edge of walls where they intersect roofs, and at the
junction of walls with the ground or street and it is considered very important features. The wedge
diffraction scheme is used to find the diffraction attenuation for an obstructed interference path over
a rooftop edge or the parapet of a building but it is highly computational (Anderson, Harry R.,
2003).
It is a special case of the wedge diffraction that is when the interior angle of the wedge is
assumed to be zero. Because of its resulting simplicity and speed of calculation efficiency, knife-
edge diffraction is used in many propagation models. The knife-edge diffraction scheme is used as a
model for many obstructed path circumstances including paths with terrain obstructions such as
gently rolling hills that have very little resemblance to a knife-edge (Anderson, Harry R., 2003).
A crucial design objective in a fixed wireless design is to achieve adequate path clearance
for the link, which means that any point along the path between the transmitter and the receiver
should have a certain distance from any obstacle along the path.
As a result, a wireless link could fall to one of three categories, which are determined by the
obstacles’ positions with respect to the Fresnel zone. Fresnel zone is the locus of the points where
the diffracted path length is multiples of 180 degrees different from the direct path length. As
shown in Figure 2.9, the fresnel zones form elliptically shaped solids of revolution around the
transmit-receive propagation path. In concept, the first fresnel zone is the zone where the significant
power is transmitted, meaning that the power available at the receiver will be diminished if the first
fresnel zone is significantly obstructed or blocked. A general criterion for link system design is to
set the path clearance so that a radius equal to 60% of the first fresnel zone is unobstructed. This is
so called the 0.6 first fresnel zone criterion (Anderson, Harry R., 2003, Erceg, V. et al.).
The first fresnel zone with the 0.6 criterion is depicted in the Fig. 2.9 (a)
Fig. 2.11 (a)RF Propagation and Fresnel Zone (Mirza M Wahaj, 2004)
LOS Attributes:
OLOS Attributes :
NLOS Attributes:
development of the railways. Each technology seems to have a different “gauge” and
compatibility issues seem to confuse the novice. The main points of comparison of Wi-Fi,
ZigBee and WiMAX are listed in table 2.2 while the key highlights of the comparison between
the two next generation broadband wireless access technologies: 3GPP LTE and WiMAX
Table 2.2 Comparison of Emerging Wireless Technologies (Bhavneet Sidhu, Hardeep Singh, and
Amit Chhabra)
Internet connectivity
Typical Range 100m 70-100m 50 km
Frequency Range 2.4 GHz 2.4 GHz 2-11GHz
Data Rate 108 - 600Mbps 250Kbps 75Mbps
Modulation DSSS DSSS QAM
Network IP & P2P Mesh IP
IT Network Yes No Yes
Connectivity
Network Topology Infrastructure (Ad-hoc also possible) Ad-hoc Infrastructure
Access Protocol CSMA/CA CSMA/CA Request/Grant
Key Attributes Wider Bandwidth, Flexibility Cost, Power Throughput, Coverage
Table 2.3 Highlights of LTE and WiMAX
comparison
Aspect 3GPP LTE Mobile WiMAX IEEE 802.16e
Legacy GSM/GPRS/EDGE/UMTS/HSPA IEEE 802.16 a through d
Core Network UTRAn moving towards ALL-IP, WiMAX Forum All-IP Network
Architecture
Access Technology:
Downlink (DL)
SC-FDMA OFDMA
FFT Size 64, 128, 256, 512, 1024, 2048 128, 256, 512, 1024, 2048
Radio Access TDD and FDD TDD and FDD
modes
Frequency Band Existing (800, 900, 1800, 1900
DL
bandwidth system profiles 1.25, 1.4, 2.5, 3, 5, with System Profiles 1.25, 2.5, 5,
Speed
supported
Antenna Scheme MIMO MIMO
DL 2 Tx X 2 Rx 2 Tx X 2 Rx
UL 2 Tx X 2 Rx 1 Tx X NRx (collaborative)
Number of Code
words
2 1
Roaming New Auto through existing
GSM/UMTS
Security UEA1, U1A1, UEA2 (Snow PKMV1 RSA, HMAC, AES-
Security
CHAPTER THREE
3.0 The following is the investigative methodologies that would be use for this work;
telecommunication protocol offering full access to mobile internet across cities and countries with a
frequency distribution. The WiMAX technology provides confrontation to multipath. Due to its
good architecture it allows the user to operate in NLOS conditions. Now WiMAX is familiar as a
WiMAX technology is offering very high speed broadband access to mobile internet. When
using 20MHz, the data rate can be high up to 74Mbps. Generally 10MHz with the TDD scheme
provides 3:1 up and down link ratio. WiMAX providing very good signals therefore higher data
rates can be achieved with multiple antennas. Antennas are used for beam forming, space time
Higher speed data rates are offered by the scalable architecture of physical layer. WiMAX
technology provides easy scaling of data with possible bandwidth of channel. If the bandwidth of
channels may be from 1.25MHz to 10MHz then a system can use 128, 512, 1024, 2048 bit FFTs
which provide dynamically roaming across numerous networks having dissimilar bandwidth.
error correction facilities to users. It also allows a user to change the scheme according to channel
condition. Adaptive Modulation and Coding (AMC) is a valuable method to exploit throughput in a
varying channel.
Automatic retransmission of data supported by WiMAX at data link layer for links is a great
feature. It does not only improve reliability but also enabled ARQ which necessitates each
broadcast packet to be recognized by the receiver, and if any unacknowledged data packets are
The WiMAX technology holds all systems therefore any data may be in form of uplink or
downlink, checked by scheduler from the base station. The total capacities are shared between
several users according to their demand. And it is done by WiMAX Time Division
Multiplexing (TDM) scheme.
Through MAC layer a user can perform a variety of functions such as voice including multimedia.
It supports best efforts for data traffic as bit, real time, traffic flows and so on. The aim of WiMAX
technology design is to facilitate large number of users with variety of connections per terminal.
Encryption standard (AES). A user can get strong privacy and administration. The EAP
protocol offer flexible authentication architecture which enable a user to get access to username,
The basic and most important feature of WiMAX technology is to support mobility
applications as VoIP. The power saving mechanism of WiMAX technology is used to extend the
battery life of handheld devices. It supports mobile applications including channel estimation, sub-
To get access to WiMAX base station is not a huge task now because the wide range of
connectivity of WiMAX provides access to base station from home. Installation of hardware is very
easy with WiMAX technology. With the growth of WiMAX technology there are more feature
coming up.
WiMAX usage model and mobile WiMAX usage model. The basic element that differentiates
these systems is the ground speed at which the systems are designed to manage. Based on mobility,
wireless access systems are designed to operate on the move without any disruption of service;
wireless access can be divided into three classes; stationary, pedestrian and vehicular. A mobile
WiMAX network access system is one that can address the vehicular class, whereas the fixed
WiMAX serves the stationary and pedestrian classes. While the nomadic wireless access system is
referred to as a system that works as a fixed WiMAX network access system but can change its
location.
expected to reflect that of fixed wire-line service, with many of the standards-based requirements
being confined to the air interface. Because communications takes place via wireless links
(NLOS) WiMAX base station, requirements for link security are greater than those needed for a
wireless service. The security mechanisms within the IEEE 802.16 standards are sufficient for fixed
Another challenge for the fixed WiMAX access air interface is the need to set up high
performance radio links capable of data rates comparable to wired broadband services, using
equipment that can be self installed indoors by users, as is the case for Digital Subscriber Line
(DSL) and cable modems. IEEE 802.16 standards provide advanced physical (PHY) layer
techniques to achieve link margins capable of supporting high throughput in NLOS environments.
Mobile WiMAX: The 802.16a extension, refined in January 2003, uses a lower frequency
of 2 to 11 GHz, enabling NLOS connections to be made. The 802.16e task group was capitalized on
WiMAX clients. These clients were able to hand off between WiMAX base stations, enabling users
WiMAX backhaul: It is actually a connection system from the Access Point (AP) back to
the provider and to the connection from the provider to the network. A WiMAX backhaul can set
out any technology and media provided. It connects the system to the backbone. In most of the
WiMAX deployments situation, it is possible to connect several WiMAX base stations by using
high speed WiMAX backhaul microware links thereby allowing roaming between WiMAX
subscribers within or outside base stations. This is similar to roaming enabled by cellular phone
companies.
There can be two cases of portability namely, full mobility or limited mobility. The
effortless case of portable service involves a user transporting a WiMAX modem to a different
location. Provided this visited location is served by wireless broadband service, in this scenario the
user re-authenticates and manually re-establishes new IP connections. Broadband service at the
visited location is afforded. In the fully mobile scenario, user expectations for connectivity are
comparable to facilities available in third generation (3G) voice/data systems. Users may move
around while engaging in a broadband data access or multimedia streaming session. Mobile
wireless systems need to be robust against rapid channel variations to support vehicular speeds.
There are significant implications of mobility on the IP layer owing to the need to maintain
rout-ability of the host IP address to preserve in-flight packets during IP handoff. This may require
authentication and handoffs for uplink and downlink IP packets and Medium Access Control
(MAC) frames. The need to support low latency and low packet loss handovers of data streams as
users transition from one base station to another is clearly a challenging task. For mobile data
services, users will not easily adapt their service expectations because of environmental limitations
that are technically but not directly relevant to the mode of use. For these reasons, the network and
air interface must be designed to anticipate these users’ expectations and deliver accordingly.
broadband access. After viewing the rapid growth of WiMAX technology in large business
companies, multimedia project software and hardware manufacturers started to develop and test the
In 2004, cables and DSL technologies used to fetch wireless broadband access to rural areas
advanced quickly and in 2009 WiMAX technology has widely spread to everywhere. Fixed
WiMAX technology was introduced in 2008. The rapid developments of both WiMAX
technologies are rolling out now. The WiMAX Technology will take over the mobile industries.
The WiMAX deployment skill set to overcome the digital divide because of easiness and efficiency.
Along with traditional factors such as link budgets and signal-to-noise ratio (SNR), deployment
considerations for WiMAX systems should include the cost saving opportunities offered by the
802.16 standard.
3.3.1 Designing a WiMAX Network: A wide variety of technical points need to be addressed
when designing WiMAX networks. A significant consideration is the efficiency, cost and
performance involved in providing coverage and capacity, while avoiding the build-out of a large
number of new cell sites. The first item to be considered is the link budget, the loss and gain sum of
signal strength through the varying medium of the transmission path. The link budget determines
the maximum cell radius for an adequate service-level agreement (SLA). Additionally a good SNR
is critical for the system to perform at the optimum level. The ability to scale while maintaining
constant symbol duration provides more flexibility in equipment components. Most importantly,
operators can deploy systems today and develop system bandwidth in the future at lower cost
3.3.2 Environmental Factors: Wireless design criteria vary across four types of environments:
i. Dense Urban: A city centred with many businesses and high-density residential units
ii. Urban: Surrounding a city center, average building heights may be lower than the
mast of a base station, but the propagation environment remains equally challenging.
iii. Suburban: With lower-density housing (primarily single-family dwellings) and fewer
businesses, average building heights are much lower than base station towers and
structures are more spread out, thus creating a more favourable propagation
environment.
iv. Rural: Where homes are far apart and businesses widely scattered, this environment
3.3.3 Determining Coverage Boundaries: To take full advantage of WiMAX scalability, system
operators need to use the right software tools to predetermine coverage boundaries. These tools
perform propagation simulations and drive tests. Careful deployment planning is critical in order to
have room to scale, anticipating growing customer demands while ensuring a quality user
experience. This planning is important in urban areas, where deployments are most likely to be
3.3.4 Sector and Frequency Reuse: A 3-sector base station is standard for cellular, and it also
suits WiMAX systems (Figure 3.1). To make the best use of available wireless spectrum, WiMAX
systems can utilize both sector and frequency reuse. Sector reuse is using one sector to cover
multiple areas, at least one of which is closer to another base station. Frequency reuse is using a
With a frequency reuse of fig.1, each of a base station’s three sectors uses the same channel
(thus effectively combining the three sectors into a single sector). A frequency reuse of three
eliminates co-channel interference at the sector boundaries. This reuse also significantly decreases
co-channel interference between neighbouring cells due to the increased spatial separation for
channels operating at the same frequency provided that the cell sector boundaries are properly
aligned. Getting the right alignment involves down-tilting antennas and performing drive tests to
see if each sector covers the proposed azimuths. The inherent properties of WiMAX’s Orthogonal
Frequency Division Multiple Access (OFDMA) scheme controls adjacent channel interference
include a number of factors, mostly related to the deployment environments and quality of service
goals. The chosen WiMAX implementation technology strongly influences these tradeoffs. Because
of the importance of good reception inside buildings and vehicles, penetration loss must be taken
into account by utilizing the normalization factor (n-factor) for a given medium. The n-factor
depends on the modulation and is used to achieve the same average power for all mappings. The
Another factor is antenna gain, which can be used to increase coverage with the tradeoffs
CINR of 25 dB or better is normal. Other link parameters including fade margins and interference
margins are assumed to be the same for each of the frequency bands — 2.5 GHz, 3.5 GHz and
3.3.6 Beam-forming Benefits: Beam-forming improves both the range and capacity of a
WiMAX network at a relatively low implementation cost. Beam-forming reduces capital and
operating expenses for WiMAX implementations by minimizing the number of base stations needed
in a network. This technique is especially useful for Mobile WiMAX systems, which must
minimize interference while providing good coverage in all parts of the environment for mobile
subscribers.
techniques to direct transmission power where it is needed towards specific Mobile WiMAX
receivers. Rather than send one high-powered signal, the system sends multiple small signals such
that they combine at the end-user terminal, but cancel each other out in other places. To do beam-
forming well, the system needs to take “sounding” measurements on the uplink and apply
personal broadband with high data rates. With beam-forming, a base station does not need enough
RF power to broadcast high data rates to every part of the coverage area simultaneously. Base
stations can apply their power selectively, thus providing excellent coverage at lower costs. All
customer devices must support beam-forming as part of the WiMAX Forum Wave2 certification for
PHY and MAC features. However, the quality of the beam-forming implementation varies
Security is a broad and complex subject, and this section provides only a brief introduction
to it. However, basic security issues are being covered, introducing some terminology, and
Well designed security architecture for a WiMAX and other wireless communication
i. Privacy: Provides protection from eavesdropping as the user data traverses the network
ii. Data integrity: This ensures that user data and control/management messages are
iii. Authentication: Have a mechanism to ensure that a given user/device is the one it claims
to be. Conversely, the user/device should also be able to verify the authenticity of the
network that it is connecting to. Together, the two are referred to as “mutual
authentication”.
v. Access control: Ensures that only authorized users are allowed to get access to the offered
services.
vi. WiMAX security is typically handled at multiple layers within a system. Each layer
handles different aspects of security, though in some cases, there may be redundant
one mechanism providing protection so that security is not compromised in case one of the
mechanisms is broken. At the link layer, strong encryption is used for wireless systems to
prevent over-the-air eavesdropping. Also needed at the link layer is access control to
prevent unauthorized users from using network resources: precious over-the-air resources.
vii. Link layer encryptions are not often used in wired links, where eavesdropping is
considered more difficult to do. In those cases, privacy is ensured by the comprehensive
security mechanisms used at the higher layers. At the network layer, a number of methods
provide security. The network itself may be protected from virus attacks through the use of
“firewalls”. Authentication and authorization services are typically done through the use
as RADIUS (Remote Access Dial-In User Service). At the transport layer (TLS) its
precedent was called Secure Sockets layer (SSL) may be used to add security to transport
layer protocols and packets. At the application layer, digital signatures, certificates, digital
application.
robust security in mind. The standard includes state of the art methods for ensuring user data
privacy and preventing unauthorized access, with additional protocol optimization for mobility.
Security is handheld by a privacy sub layer within the WiMAX Medium Access Control (MAC).
i. Support for Privacy: User data is encrypted using cryptographic schemes of proven
approved as compliant with Federal Information Processing Standard (FIPS) and is easier
to implement. The 128-bit or 256-bit key used for deriving the cipher is generated during
ii. Authentication in WiMAX Technology: WiMAX offers a flexible means for authenticating
subscriber stations and users to prevent from unauthorized use. The authentication
structure is based on the Internet Engineering Task Force (IETF) EAP, which supports a
WiMAX terminal devices come with built-in X.509 digital certificates that contain their
public key and MAC address. WiMAX operators can apply the certificates for device
authentication of users.
iii. Flexible Key Management Protocol in WiMAX: The Privacy and Key Management
Protocol Version 2 (PKMv2) is used for transmitting keying material securely from the
base station to the mobile station. PKM protocols are also used to periodically reauthorize
and refresh the keys. PKM protocol is a client-server protocol where the mobile station
acts as the client and the base station, the server. The PKM protocol uses X.509 digital
securely perform key exchanges between the base station and the mobile station.
iv. Protection of Control Messages in WiMAX: The integrity of over the air control
technology allows the mobile station to use pre-authentication with a particular target base
The IEEE 802.16e-2005 standard provides the air interface for WiMAX but does not define
the full end-to-end WiMAX network. The WiMAX Forum's Network Working Group (NWG), is
responsible for developing the end-to-end network requirements, architecture, and protocols for
The WiMAX NWG has developed a network reference model to serve as an architecture
framework for WiMAX deployments and to ensure interoperability among various WiMAX
equipment and operators. The network reference model envisions unified network architecture for
supporting fixed, nomadic, and mobile deployments and is based on an IP service model. Below is
simplified illustration of an IP-based WiMAX network architecture. The overall network may be
1. Mobile Stations (MS) used by the end user to access the network.
2. The access service network (ASN), which comprises one or more base stations and
one or more ASN gateways that form the radio access network at the edge.
3. Connectivity service network (CSN), which provides IP connectivity and all the IP
The network reference model developed by the WiMAX Forum NWG defines a number of
functional entities and interfaces between those entities. Fig below shows some of the more
Base station (BS): The BS is responsible for providing the air interface to the MS.
Additional functions that may be part of the BS are micromobility management functions,
such as handoff triggering and tunnel establishment, radio resource management, QoS
policy enforcement, traffic classification, DHCP (Dynamic Host Control Protocol) proxy,
2 traffic aggregation point within an ASN. Additional functions that may be part of the
ASN gateway include intra-ASN location management and paging, radio resource
management and admission control, caching of subscriber profiles and encryption keys,
AAA client functionality, establishment and management of mobility tunnel with base
stations, QoS and policy enforcement, foreign agent functionality for mobile IP, and
ASP, other public networks, and corporate networks. The CSN is owned by the NSP and
includes AAA servers that support authentication for the devices, users, and specific
services. The CSN also provides per user policy management of QoS and security. The
CSN is also responsible for IP address management, support for roaming between
different NSPs, location management between ASNs, and mobility and roaming between
ASNs.
The WiMAX architecture framework allows for the flexible decomposition and/or
combination of functional entities when building the physical entities. For example, the ASN may
be decomposed into base station transceivers (BST), base station controllers (BSC), and an
ASNGW analogous to the GSM model of BTS, BSC, and Serving GPRS Support Node (SGSN).
CHAPTER FOUR
4.0 Introduction
This chapter reveals the responses of 12 respondents considered for this study, 10 males and
2 females respondents. Due to the nature of the work and the different attributes of the respondents,
the findings are treated as their percentage on group basis. The findings are discussed in line with
As indicated by the respondents, greater numbers of the respondents interviewed had been in
existence above 6 years with distribution 6 (50%) while those with less than 5 years and above 10
years share equal distribution of 25% each respectively as shown in Table 4.1 and Fig. 4.1.
Total 12 100.00
Source: Field Survey, 2010
It was revealed from the Table 4.2 that 50% of respondents in the study area indicated that they had
abnormal experience
since beginning of
Yes 6 50.00
No 6 50.00
Total 12 100.00
Source: Field Survey, 2010
In relation to the types of service rendered to the client, majority of the respondents 50% rendered
Internet services, 16.67% rendered GSM services, 25% rendered CDMA/PSTN while 8.33% rendered
Fig. 4.3 Distribution of Respondents by Service Render to the Client (Source: Field Survey, 2010)
As indicated by the respondents, greater numbers of the respondents interviewed made use of Ring
Topology with distribution 6 (50%), 30% used Star Topology while Mesh Topology is used by only
Star 4 30.00
Ring 6 50.00
Mesh 2 20.00
Total 12 100.00
Source: Field Survey, 2010
Fig 4.4 Distribution of Respondents by the type of Topology in Use (Source: Field Survey, 2010)
From the finding of this study, 58.33% respondents made use of LAN technology while 41.67% of
the same group did not. Similarly, 88.33% of the respondents made use of WLAN technology while
16.67% of them did not. However, 33.33 of the respondents made use of WMAN while 66.67% did
not. Also, 50%% of the entire interview respondents in the study area used WWAN.
With regards to transmission media in use, 75.00% of the respondents use (Coper Cable pair) in
transmitting, 25% did not, 66.67% of them used Optical fibre cable. Similarly, 66.67% of them
made use of Radio for transmission while only 33.33% of the same group used Satellite for
transmission.
Table 4.5 Distribution of Respondents by the types of Technologies and Transmission Media in Use
Yes No
Freq % Freq %
With regards to type of wireless radio used by the company , 41.67%, majority of the respondents used
WiMAX, 33.33% used Wi-Fi, 16.67% of them used LTE while 8.335 used none of the wireless radio
at all..
Table 4.6 Distribution of Respondents by the types of Wireless Radio Used by the Company
With regards to type Modulation used by the company, 58.33%, majority of the respondents used
Table 4.7 Distribution of Respondents by the types of Modulation Used by the Company
OFDM 4 33.33
DSSS 1 8.33
QAM 7 58.33
Total 12 100.00
Source: Field Survey, 2010
Fig. 4.7 Distribution of Respondents by the types of Modulation Used by the Company (Source: Field
Survey, 2010)
4.8 Types of Duplex Used by the Company
With regards to type of duplex used by the company, 75.00%, majority of the respondents used Full
Table 4.8 Distribution of Respondents by the types of Duplex Used by the Company
Fig. 4.8 Distribution of Respondents by the types of Duplex Used by the Company (Source: Field
Survey, 2010)
With regards to type of duplex used by the company, 83.83%, majority of the respondents used Full
Table 4.9 Distribution of Respondents by the types of Access Protocol Used by the Company
CSMA/CA 10 83.33
TDM/TDMA 2 16.67
Total 12 100.00
Source: Field Survey, 2010
Fig. 4.9 Distribution of Respondents by the types of Access Protocol Used by the Company (Source:
The respondents’ decisions towards the identified WiMAX in Nigeria are shown in the table below.
The opinion of respondents as far as the issue of WiMAX ‘supports for lots of modulation and error
correction facility to use.’ is concerned; it was identified as a feature. This can be supported by the
fact that a large number of the respondents in the study area ‘agreed’ and ‘strongly agreed’ with
41.67% and 50% respectively. The study also confirmed ‘offering of very high speed data rate’ as
another identified features of WiMAX. The reason is that over 60% of the respondents ‘agreed’ and
‘strongly agreed’ to it respectively while only 33.33% of the same group ‘strongly disagree’.
Similarly, 50% of interviewed respondents ‘strongly agreed’ that ‘WiMAX supports automatic
Furthermore, ‘offering of very high speed broadband access to mobile internet’ is also another
feature of WiMAX identified in the study areas; this can be explained by the result since 58.33%
and 38.33% of the study respondents ‘agree’ and ‘strongly agree’ respectively. Also, it was
identified that WiMAX ‘Facilitate the user with strong encryption’ this is supported by the fact that
Strongly Strongly
Agree Agree Disagree Disagree
Freq % Freq % Freq % Freq %
It supports lots of modulation
and error correction facility to
use. 6 50.00 5 41.67 1 8.33
It offers very high speed data
rate 6 50.00 2 16.67 4 33.33
It supports automatic
retransmission of data link layer 6 50.00 1 8.33 5 41.67
It offers very high speed
broadband access to mobile
internet 7 58.33 4 33.33 1 8.33
It facilitate the user with strong
encryption 5 41.67 4 33.33 9 8.33 2 16.67
Source: Field Survey, 2010
Table 4.10 Identified Feature of WiMAX in Nigeria (Source: Field Survey, 2010)
The position held by the respondents in relation to the problem encountered by the use of WiMAX
in Nigeria. The outcome of the study as to ‘Encryption’ is that majority of the respondents 58.33%
WiMAX was also not seen as a major problem in Nigeria, then reason is that 41.67% and 8.33% of
the respondents ‘strongly disagree’ and ‘disagree’ respectively.. Another factor believed not
constitutes problem in Nigeria is ‘WiMAX Authentication’ with over 50% of the respondents
However, most of the respondents were of the opinion that ‘Installation and Operational Cost’
constitute a problem as over 90% of the entire respondents ‘agreed’ to the fact.
Strongly
Strongly Agree Agree Disagree Disagree
Freq % Freq % Freq % Freq %
Fig. 4.11 Problem believed to be encountered by the use of WiMAX in Nigeria (Source: Field
Survey, 2010)
CHAPTER FIVE
5.1 CONCLUSIONS
The increasing demand for high speed broadband wireless access supporting high data rate
delivering capabilities for triple play (Video, Voice, data) with mobility has created an interest in
the telecommunication circles to formulate new technologies and architecture to offer such services
at low cost and high efficiency to the operators and end users.
802.11 is views as the most likely contender for the home network backbone, while ZigBee
is likely to make the best use of its low-power and high-speed operation in short-range equipment
interconnects, such as personal computers and portable equipment. 802.11 is viewed as being
superior in maintaining compatibility with existing wireless LAN, while ZigBee is generally
The ITU defined 4G under the “MT Advance” tag, two Technologies; WiMAX and 3GPP
Long Term Evolution (LTE) as the major contenders for attaining the ‘4G’ crown. This study
revealed that WiMAX and LTE are technically very alike providing similar access technologies,
radio access modes, FFT sizes, channel bandwidth, cell radius, antenna configurations, QoS,
mobility in an All-IP network. WiMAX and LTE deployments have already begun throughout the
world and here in Nigeria. Most companies deploy WiMAX as their core broadband access while
some deploy it as their backhaul. Those that deploy it as their backhaul are already using Wi-Fi as
their core access so they deploy both Wi-Fi and WiMAX to coexist with one another.
5.2 RECOMMENDATIONS
It is recommended that this work is extended into achieving a balance of transmission on the
WiMAX and LTE technologies. The feasibility of the security in the WiMAX technology should be
investigated.
REFERENCES
1. Abhayawardhana, V.S.; Wassell, I.J.; Crosby, D.; Sellars, M.P.; Brown, M.G.; Comparison of
empirical propagation path loss models for fixed wireless access systems. Vehicular
Technology Conference, 2005. VTC 2005-Spring. 2005 IEEE 61st Volume 1, 30 May-1 June
IEEE Journal on Select Areas in Communications, vol. 16, no. 8, pp. 1451–1458, Oct. 1998.
2003.
5. Bhavneet Sidhu, Hardeep Singh, and Amit Chhabra “Emerging Wireless Standards - WiFi,
ZigBee
7. Broadcom, 802.11n: Next-Generation Wireless LAN Technology, White Paper dated April
2006
8. C. Eklund et al., “IEEE Standard 802.16: A Technical Overview of the WirelessMAN™ Air
Interface for Broadband Wireless Access,” IEEE Commun. Mag., June 2002, pp. 98–107.
9. C. Y. Wong et al., “Multicarrier OFDM with Adaptive Subcarrier, Bit, and Power
10. Darcy Poulin. “WiMAX advantages bring about new challenges” Aug 25, 2005
Redundancy,” IEEE Trans. Info. Theory, vol. 20, no. 3, 1974, pp. 388–89.
12. Erceg, V., et al., “Channel models for fixed wireless access applications,”
http://www.wirelessman.org/tg3/contrib/802163c-01_29r4.pdf.
http://www.intel.com/ebusiness/pdf/wireless/intel/80216_WiMAX.pdf
15. Introduction to Wi-Fi technology, Retrieved on September 24, 2006 from www.wi-
fitechnology.com
Communications Microwave
measurements,” in Proc. 5th IEEE Int. Symp. Personal, Indoor, Mobile Radio Commun.,
20. Mirza M Wahaj, “RCE Certification Course Redline’s TDM Over Packet Solution: Module-
21. M. Hata, “Empirical formula for propagation loss in land mobile radio services,” IEEE
Transactions on Vehicular Technology, vol. vol. VT-29, pp. 317–325, September 1981.
22. M. Iskander, Z. Yun, and Z. Zhang, “Outdoor/indoor propagation modelling for wireless
23. Monica Paolini “WiMAX and Cellular: Competitive or Complementary?” Senza Fili
24. P. Kinney, ZigBee Technology: Wireless Control that Simply Works, White Paper dated 2
October 2003.
25. Ranveer Chandra, Christof Fetzer, Karin H¨Ogstedt “Adaptive Topology Discovery in Hybrid
27. Redline Communications Inc., “RCE Certification Course Module-3 AN-50 PMP System
28. Rhim, H. C., and Buyukozturk, O., 1998, Electromagnetic properties of concrete at
30. S. Lin and P. Yu, “A Hybrid ARQ Scheme with Parity Retransmission for Error Control of
Satellite Channels,” IEEE Trans. Commun., vol. 30, no. 7, July 1982, pp 1701–19.
31. SR Telecom Inc. “WiMAX Technology LOS and NLOS Environments” Aug 30, 2004
32. S. T. Peng, T. Tamir and H. L. Bertoni, “Theory of Periodic Dielectric Waveguides,” IEEE
Transactions on Microwaves Theory and Technologies, vol. MlT-23, no. 1, pp. 123-133,
January 1975.
33. V. Erceg, L. J. Greenstein, et al., “An empirically based path loss model for wireless channels
in suburban environments,” IEEE Journal on Selected Areas of Communications, vol. 17, pp.
34. Westech Communications Inc. on behalf of the WiMAX Forum, “Can WiMAX Address Your
35. Z. Shen, J. G. Andrews, and B. L. Evans, “Optimal Power Allocation for Multiuser OFDM,”
IEEE GLOBECOM, San Francisco, CA, Dec. 2003, pp. 337– 41.