Sie sind auf Seite 1von 11

MULTISERVICES OVER WIMAX

Muhammad Ali Jinnah University, Karachi


Saqib Naeem, Noman Saghir, Junaid R Malik
saqibnaeem22@hotmail.com, n_saghir82@hotmail.com, junaidrmalik@gmail.com

Introduction What is WiMAX?


Broadband Wireless Access (BWA) has Standards associated to WiMax
been serving enterprises and operators Worldwide Interoperability for
for years, to the great satisfaction of Microwave Access (WiMax) is the
its users. However, the new IP-based common name associated to the IEEE
standard developed by the IEEE 802.16a/REVd/e standards. These
802.16 is likely to accelerate adoption standards are issued by the IEEE
of the technology. It will expand the 802.16 subgroup that originally
scope of usage thanks to: the covered the Wireless Local Loop (WLL)
possibility of operating in licensed and technologies with radio spectrum from
unlicensed frequency bands, unique 10 to 66 GHz. Recently, these
performance under Non-Line-of-Sight specifications were extended below 10
(NLOS) conditions, Quality of Service GHz.
(QoS) awareness, extension to • In January 2003, the IEEE
nomadicity, and more. approved 802.16a as an amendment
In parallel, the WiMax forum, to IEEE 802.16- 2001, defining (Near)
backed by industry leaders, will Line-Of-Sight capability.
encourage the widespread adoption of • In July 2004, IEEE
broadband wireless access by 802.16REVd, now published under the
establishing a brand for the technology name IEEE 802.16-2004, introduces
and pushing interoperability between support for indoor CPE (NLOS) through
products. additional radio capabilities such as
The purpose of this Paper is to antenna beam forming and OFDM sub-
highlight and assess the value of channeling.
WiMax as the right solution to: • Early 2005, an IEEE 802.16e
• extend the currently limited variant will introduce support for
coverage of public WLAN (hotspots) to mobility.
citywide coverage (hot zones) - the See Figure 1 for the applications
same technology being usable at home associated with each of these
and on the move, standards.
• blanket metropolitan areas for
mobile data-centric service delivery,
• offer fixed broadband access in
urban and suburban areas where
copper quality is poor or unbundling
difficult,
• bridge the digital divide in low-
density areas where technical and
economic factors make broadband
deployment very challenging.
In addition to these uses, this
paper will highlight other potential
applications, such as telephony or an
effective point-to-multipoint
backhauling solution for operators or
enterprises. WiMax can offer very high data rates
and extended coverage. However,
• 75Mbit/s capacity for the base from the radio equipment
station is achievable with a 20 MHz manufacturers and chipset industries.
channel in best propagation conditions. WiMax will also target the data-centric
But regulators will often allow only mobility market with the introduction
smaller channels (10 MHz or less) of lower power consumption chipsets.
reducing the maximum bandwidth. The strong support from some of the
• Even though 50 km is most important chipsets
achievable under optimal conditions manufacturers such as Intel is a key
and with a reduced data rate (a few enabler for the success of WiMAX,
Mbit/s), the typical coverage will be since it will lead to wide availability of
around 5 km with indoor CPE (NLOS) affordable WiMAX-enabled terminals
and around 15 km with a CPE (e.g., laptops, PDAs, etc.).
connected to an external antenna
(LOS). WiMAX, a complement to fixed and
mobile access
WiMAX product availability WiMAX integrates perfectly into
Mass deployment of WiMAX products is existing fixed and mobile networks,
planned in two main steps: complementing them when needed.
• Mid-2005, availability of the This section gives a more detailed
802.16REVd chipset, allowing the analysis of WiMAX integration into
development of cost optimized CPE fixed and the mobile markets.
operating indoors (NLOS),
• In 2006, availability of WiMAX for fixed wireless access
802.16e chipsets embedded in laptops Nationwide broadband access has
and later on in other mobile devices, become a priority in many countries.
enabling Portable Internet. In most developed countries, the
We believe that current pre-WiMAX average broadband coverage will reach
products and initial 802.16a WiMAX 90% in the coming years. Still, in
products available in early 2005, some rural areas of such countries,
operating similarly to current broadband coverage will not exceed
proprietary equipment (LOS, not cost- 50%.
optimized CPE) and at similar cost, will The service gap can be categorized by
not be widely deployed, because the two characteristics: the type of area
operator needs to go and install the (rural or urban) and the level of
antenna at the customer premise, national development (see Table 1).
which is uneconomical for residential
customer as proved in the early days
of ADSL installation. This said 802.16a
will certainly be used for at least two
years on the market window of
backhauling of operator’s sites:
wireless transmission of WiFi hotspot
traffic to the nearest ISP point of
presence, or data leased lines In developed countries, DSL service
concentration, or 3G new small site deployment has been massive in urban
backhauling. and sub-urban deployments, whereas
coverage of remote areas - smaller
Market for WiMAX towns and rural areas - is lagging
WiMAX will boost today's highly behind.
fragmented BWA market thanks to Hurdles to overcome are the poor line
standardization and interoperability, quality of the installed copper base,
state-of-the-art radio efficiency with the large distances to the central
NLOS capability, and strong support offices or cabinets, or the low
population density. In this context, While nomadicity offers connectivity
WiMAX, with its QoS support, longer within the coverage area of a single
reach, and data rates similar to DSL, is base station, Portable Internet implies
naturally positioned as a viable first session continuity throughout the
mile option to offer broadband access network. In addition a new generation
to residential users. of networks with multi-access (3G, Wi-
In emerging countries, the main focus Fi, WiMAX, DSL, FTTU, etc.) enable
of broadband deployment is on urban end-users to enjoy an "Always Best
and sub-urban areas, and will remain Connected" experience when accessing
so in the near future. The low POTS their applications via the best available
penetration and the low quality of the network at home, on the pause, or on
copper pair prevent mass scale DSL the move. See Figure 2. WiMAX
deployment and foster the need for becomes an additional radio access
alternate broadband technologies. In solution in the global network
this context, WiMAX is positioned as architecture.
an excellent option. Moreover, the
possibility of offering broadband Fig 2
services in combination with voice
services will gradually lead to
narrowband WLL substitution.
WiMax is of interest for large
enterprises with several locations in
the same metropolitan area.
WiMax will permit Operator's bypass
under license conditions: building a
metropolitan private network of IP
lines at a very low cost (no civil
works). The comparison to leased lines
rental fee is in favor of WiMax even for
two sites only.

WiMAX for Portable Internet


WiMAX, the natural complement to
mobile and Wi-Fi networks Mobile
networks offer full mobility, nation-
wide coverage voice support and WiMAX, the obvious choice for
moderate data rates. operators
WiMAX can then be positioned as a By integrating WiMAX into their
complementary solution by offering networks, mobile operators can boost
higher bandwidth when required, in their service with high bandwidth,
particular in dense urban areas. when necessary, the same applications
Public WLAN, while offering clear (messaging, agenda, location-based
benefits, is limited in coverage and services …) being offered on both
mobility capabilities. WiMAX by-passes networks with a single billing and
these limitations and offers broadband subscriber profile.
connectivity in larger areas (hot Mobile operators can also reuse
zones). Wi-Fi and WiMAX solutions are existing radio sites and backhauling
also complementary, with Wi-Fi being equipment to facilitate the deployment
more adapted for short-range, indoor of WiMAX.
connections (in particular in the
enterprise and at home) and WiMAX
for long- range outdoor connections.
From nomadicity to Portable Internet WiMAX Technology Challenge
A number of arguments favor the use
WiMAX, more flexibility and of IP-based protocols and architecture
security for broadband wireless. First, IP-based
Unlike WLAN, WiMAX provides a systems tend to be cheaper because of
media access control (MAC) layer that the economies of scale they enjoy
uses a grant-request mechanism to from widespread adoption in wired
authorize the exchange of data. This communication systems. Adopting IP
feature allows better exploitation of architecture can make it easier to
the radio resources, in particular with develop new services and applications
smart antennas, and independent rapidly. The large IP application
management of the traffic of every development community can be
user. leveraged. An IP-based architecture
This simplifies the support of real-time for broadband wireless will enable
and voice applications. easier support for such applications as
One of the inhibitors to widespread IP multicast and any cast. An IP-based
deployment of WLAN was the poor architecture makes it easy to integrate
security feature of the first releases. broadband wireless systems with other
WiMAX proposes the full range of access technologies and thereby
security features to ensure secured enable converged services.
data exchange: IP-based protocols are simple and
• Terminal authentication by flexible but not very efficient or robust.
exchanging certificates to prevent These deficiencies were not such a
rogue devices. huge concern as IP evolved largely in
• User authentication using the the wired communications space,
Extensible Authentication Protocol where transmission media, such as
(EAP). fiber-optic channels, offered abundant
• Data encryption using the bandwidth and very high reliability. In
Data Encryption Standard (DES) or wireless systems, however,
Advanced Encryption Standard (AES), introducing IP poses several
both much more robust than the challenges:
Wireless Equivalent Privacy (WEP) (1) Making IP-based protocols more
initially used by WLAN. Furthermore, bandwidth efficient,
each service is encrypted with its own (2) Adapting them to deliver the
security association and private keys. required QoS (delay, jitter,
throughput, etc.) when operating in
Supporting IP in Wireless bandwidth-limited and unreliable
The Internet Protocol (IP) has become media, and
the networking protocol of choice for (3) Adapting them to handle terminals
modern communication systems. that move and change their point of
Internet-based protocols are now attachment to the network.
beginning to be used to support not
only data but also voice, video, and MAC-Layer Overview
multimedia. Voice over IP is quickly The primary task of the WiMAX MAC
emerging as a formidable competitor layer is to provide an interface
to traditional circuit-switched voice between the higher transport layers
and appears likely to displace it over and the physical layer. The MAC layer
time. Video over IP and IPTV are also takes packets from the upper layer—
emerging as potential rivals to these packets are called MAC service
traditional cable TV. Because more and data units (MSDUs)—and organize
more applications will migrate to IP, them into MAC protocol data units
IP-based protocols and architecture (MPDUs) for transmission over the air.
must be considered for broadband For received transmissions, the MAC
wireless systems. layer does the reverse. The IEEE
802.16-2004 and IEEE 802.16e-2005 WiMAX MAC also supports ARQ, which
MAC design includes a convergence can be used to request the
sub layer that can interface with a retransmission of unfragmented
variety of higher-layer protocols, such MSDUs and fragments of MSDUs. The
as ATM, TDM Voice, Ethernet, IP, and maximum frame length is 2,047 bytes,
any unknown future protocol. Given which is represented by 11 bits in the
the predominance of IP and Ethernet GMH.
in the industry, the WiMAX Forum has
decided to support only IP and
Ethernet at this time. Besides
providing a mapping to and from the
higher layers, the convergence sub
layer supports MSDU header
suppression to reduce the higher layer
overheads on each packet.
The WiMAX MAC is designed from the
ground up to support very high peak
bit rates while delivering quality of
service similar to that of ATM and
DOCSIS. The WiMAX MAC uses a
variable-length MPDU and offers a lot
of flexibility to allow for their efficient
transmission. For example, multiple
MPDUs of same or different lengths
may be aggregated into a single burst Figure 3 Examples of various MAC
to save PHY overhead. Similarly, PDU frames
multiple MSDUs from the same higher-
layer service may be concatenated into Quality of Service
a single MPDU to save MAC header What is QoS? This rather elusive term
overhead. Conversely, large MSDUs denotes some form of assurance that a
may be fragmented into smaller service will perform to a certain level.
MPDUs and sent across multiple The performance level is typically
frames. specified in terms of throughput,
Figure 3 shows examples of various packet loss, delay, and jitter, and the
MAC PDU (packet data unit) frames. requirements vary, based on the
Each MAC frame is prefixed with a application and service.
generic MAC header (GMH) that The form of assurance can also vary
contains a connection identifier8 from a hard quantitative measure,
(CID), the length of frame, and bits to such as a guarantee that all voice
qualify the presence of CRC, sub packets will be delivered with less than
headers, and whether the payload is 100ms delay 99 percent of the time—
encrypted and if so, with which key. to a soft qualitative guarantee that
The MAC payload is either a transport certain applications and users will be
or a management message. Besides given priority over others.
MSDUs, the transport payload may Resource limitations in the network are
contain bandwidth requests or what make providing assurances a
retransmission requests. The type of challenge.
transport payload is identified by the Although typically, the most-
sub header that immediately precedes constrained resource is the wireless
it. Examples of sub headers are link, the other intermediate nodes and
packing sub headers and links that have to be traversed for an
fragmentation sub headers. end-to-end service also have resource
limitations. Each link has its own
bandwidth-capacity limits, and each Internet using IP
node has limited memory for buffering Let us consider the working of a typical
packets before forwarding. VoIP system. A simplified VoIP
Overbuilding the network to provide architecture is shown in Figure. First,
higher bandwidth capacity and larger the voice signal is sampled and
buffers is an expensive and inefficient digitized.
way to provide quality, particularly Then it is encoded into VoIP frames.
when the quality requirements are There are many popular encoders
very high. Therefore, more clever available, for example, G.711,
methods for providing QoS must be G.723.1, G.729. The VoIP frames are
devised and these methods must take then packetized and transmitted using
into account the particular needs of RTP/UDP/IP. At the receiver side, the
the application or service and optimize VoIP frames are de-packetized and
the resources used. Different processed through a play out buffer.
applications require a different mix of The function of the play out buffer is
resources. For example, latency- nothing but to smooth out the playing
intolerant applications require faster delay, that is, to smoothen the delay
access to bandwidth resources and not jitter caused during transmission
memory, whereas latency-tolerant through the network.
applications can use memory At the end, the voice signal is
resources to avoid packets being retrieved from the VoIP frames and is
dropped, while waiting for access to played out at the user’s speakers.
bandwidth resources. This fact may be As VoIP packets travel through the
exploited to deliver QoS efficiently. In network, there is evidently some
short, a QoS-enabled network should congestion and channel-related losses.
provide guarantees appropriate for Also, the packets suffer delay
various application and service types depending on the congestion at the
while making efficient use of network intermediate routers. Both loss and
resources. delay of packets adversely affect the
quality of VoIP calls, which is generally
VoIP over WiMAX expressed in terms of R-score.
In spite of the growing popularity of
data services, voice services still
remain the major revenue earner for
the network service providers. The two
most popular ways of providing voice
services are the packet switched
telephone networks (PSTN) and the
wireless cellular networks. Deployment
of both these forms of networks
requires infrastructures that are
usually very expensive.
Alternative solutions are being sought FIGURE 4
that can deliver good quality voice A simplified VoIP architecture.
services at a relatively lower cost. One
way to achieve low cost is to use the
already existing IP infrastructure. Quality of VoIP and R-Score
Protocols used to carry voice signals The quality of the reconstructed voice
over the IP network are commonly signal is subjective and therefore is
referred to as voice over IP (VoIP) measured by the mean opinion score
protocols. (MOS). MOSis a subjective quality
In more common terms, it signifies the scores that ranges from 1 (worst) to 5
phone service (voice) over the (best) and is obtained by conducting
subjective surveys. Though these VoIP but also to support more number
methods provide a good assessment of VoIP calls. The proposed schemes,
technique, they fail to provide an on- adhering to the MAC layer specification
line assessment that might be used for of WiMAX, make use of the flexible
adaptation purpose. features—mainly the size of the
The ITU-T E-Model [6] has provided a protocol data units. We enable the
parametric estimation for this purpose. ARQ, use FEC, construct MPDUs by
It defines an R-score [6, 7] that aggregating multiple MSDUs, and
combines different aspects of voice dynamically allocate one or multiple
quality impairment. It is given by minislots to every VoIP call. The
R = 100 − Is − Ie − Id + A performance of the VoIP calls is
Where Is is the SNR impairments studied with respect to R-score. We
associated with typical switched circuit exploit the difference in sensitivity of
networks paths, Ie is an equipment R-score toward loss and delay for
impairment factor associated with the recovering as many packets as
losses due to the codecs and network, possible at the cost of increased delay.
Id represents the impairment caused Exhaustive simulation experiments
by the mouth-to-ear delay, and A reveal that the feedback-based
compensates for the above technique coupled with
impairments under various user retransmissions, aggregation, and
conditions and is known as the variable size MPDUs not only increases
expectation factor. the R-score (and consequently the
R-score. The R-score ranges from 0 to MOS) but also the number of VoIP
100 and a score of more than 70 streams.
usually means a VoIP call of decent
quality. Multimedia Session Management
A session may loosely be defined as a
Supporting VoIP over WiMAX set of meaningful communications
With the sensitivity of VoIP with between two or more users or devices
respect to loss and delay known, let us over limited time duration. In the
consider the adaptive schemes at the context of multimedia
MAC layer to dynamically construct the communications, the term session
MPDUs. Once a connection is set up, includes voice telephony, audio and
the aim behind forming variable sized video streaming, chat and instant
MPDUs is such that it strikes a balance messaging, interactive games, virtual
between the lost packets and the delay reality sessions, and so on. A session
incurred. The final aim is to improve may also have multiple connections
the quality of VoIP calls and at the associated with it; for example, a
same time increase the number of video conference, in which the audio
streams that can be accommodated. and video parts are separate
connections.
As new wireless access technologies Session management encompasses
are being developed, WiMAX is more than transfer of bits from a
emerging as one of the promising transmitter to a receiver.
broadband technologies that can It includes support for locating and
support a variety of real-time services. getting consent from the parties
Since extension of VoIP calls over involved in the communication,
wireless networks is inevitable, we negotiating the parameters and
study the feasibility of supporting VoIP characteristics of the communication,
over WiMAX. modifying it midstream as necessary,
We discuss a combination of and terminating it. For traditional IP
techniques that can be adopted not data applications, such as Web
only to enhance the performance of browsing and e-mail, session
management is rather simple. For Security is a broad and complex
example, for a Web download, a DNS subject, and this section provides only
(domain name server) is used to a brief introduction to it.
identify the appropriate Web site, TCP We cover the basic security issues,
is used to reliably transfer the content, introduce some terminology, and
and the application itself—hypertext provide a brief overview of some of
transfer protocol (HTTP)—is used to the security mechanisms, using
provide basic session management. examples that are relevant to
Session management follows a “one broadband wireless services, especially
size fits all” policy, with everyone WiMAX.
pretty much getting to view the same Well-designed security architecture for
Web pages without being able to a wireless communication system
specify preferences in any meaningful should support the following basic
way. IP multimedia communications, requirements:
however, need a more robust session • Privacy: Provide protection from
management scheme, primarily eavesdropping as the user data
because of the need to support a large traverses the network from source to
variety of applications and terminals. destination.
Such session management tasks as • Data integrity: Ensure that user
capabilities negotiation become very data and control/management
important when different terminals messages are protected from being
support different encoding schemes, tampered with while in transit.
for example. Or say, if one party • Authentication: Have a mechanism
wants to listen to the audio while to ensure that a given user/device is
others receive both video and audio of the one it claims to be. Conversely,
a multicast stream. the user/device should also be able to
Clearly, there is a need for a session- verify the authenticity of the network
control protocol to support multimedia that it is connecting to. Together, the
services, including telephony using IP. two are referred to as mutual
The ITU standard H.323 was the authentication.
protocol that traditionally served this • Authorization: Have a mechanism
purpose in most IP telephony and in place to verify that a given user is
multimedia systems. Recently, a much authorized to receive a particular
more simple and lightweight protocol, service.
called the session initiation protocol • Access control: Ensure that only
(SIP), has emerged as the leading authorized users are allowed to get
contender for this task and it will likely access to the offered services.
become the standard session control Security is typically handled at
protocol used in WiMAX networks. SIP multiple layers within a system. Each
has already been chosen as the layer handles different aspects of
session control protocol for third security, though in some cases, there
generation (3G) cellular networks. Also may be redundant mechanisms. As a
needed is a transport-layer protocol general principle of security, it is
that meets the requirements of considered good to have more than
multimedia communications. Real-time one mechanism providing protection
transport protocol (RTP) was designed so that security is not compromised in
for this purpose. SIP and RTP work case one of the mechanisms is broken.
well together to provide the session-
control and media-transport functions
required for IP multimedia sessions.

Security Table 2 shows how security is handled


at various layers of the IP stack. At the
link layer, strong encryption should be
used for wireless systems to prevent
over-the-air eavesdropping. Also
needed at the link layer is access
control to prevent unauthorized users
from using network resources:
precious over-the-air resources.

Table 2 Examples of Security


Mechanisms at Various Layers of the
IP Stack

Figure 5 IEAP architecture

IP for Wireless: Issues and


Potential Solutions
The Internet Protocol is a network-
layer protocol following a modular
design that allows it to run over any
link layer and supports carrying a
variety of applications over it. The
Mobility Management
modularity and simplicity of IP design
Two basic mechanisms are required to
have led to a remarkable growth in the
allow a subscriber to communicate
number of applications developed for
from various locations and while
it. The remarkable success of the
moving. First, to deliver incoming
Internet has made IP the network-
packets to a mobile subscriber, there
layer protocol of choice for all modern
should be a mechanism to locate all
communication systems; not only for
mobile stations (MS)—including idle
data communications but also voice,
stations—at any time, regardless of
video, and multimedia
where they are in the network. This
communications. WiMAX has chosen IP
process of identifying and tracking a
as the protocol for delivering all
MS’s current point of attachment to
services.
the network is called location
IP’s modularity and simplicity are
management. Second, to maintain an
achieved by making a number of
ongoing session as the MS moves out
assumptions about the underlying
of the coverage area of one base
network. IP assumes that the link
station to that of another, a
layers in the network are generally
mechanism to seamlessly transition, or
reliable and introduce very few errors.
hand off, the session is required. The
IP does not strive for efficient use of
set of procedures to manage this is
network resources; rather, it assumes
called handoff management. Location
that the network has sufficient
management and handoff
resources. Some of these assumptions
management together constitute
do not hold well in a wireless network;
mobility management.
as a result running IP over wireless
networks introduces problems that
need to be addressed. In this section,
we cover two such problems. The first
problem results from the error-prone
nature of wireless links, the second,
from the bandwidth scarcity of wireless • To support mobile users,
links. broadband wireless networks should
incorporate mechanisms for location
Conclusions management and handoff
WiMAX defines a flexible all-IP-based management. Developing good
network architecture that allows for handoff mechanisms is critical to the
the exploitation of all the benefits of performance of mobile networks.
IP. The reference network model calls
for the use of IP-based protocols to References
deliver end-to-end functions, such as 1. IEEE 802.16 Standard—Local and
QoS, security, and mobility Metropolitan Area Networks—Part 16,
management. IEEE Std 802.16a-2003.
• WiMAX offers very high 2. J. Ye, X. Shen, and J. W. Mark, Call
spectral efficiency, particularly when admission control in wideband CDMA
using higher-order MIMO solutions. cellular networks by using fuzzy logic,
WiMAX has a very flexible MAC layer IEEE Trans. Mobile Comp., vol. 4, no.
that can accommodate a variety of 2, pp. 129–141, March–April 2005.
traffic types, including voice, video, 3. S. Shen, C. J. Chang, C. Huang, and
and multimedia, and provide strong Q. Bi, Intelligent call admission control
QoS. WiMAX supports a number of for wideband CDMA cellular systems,
advanced signal-processing techniques IEEE Trans. Wireless Comm., vol. 3,
to improve overall system capacity. no. 5, pp. 1810–1821, September
These techniques include adaptive 2004.
modulation and coding, spatial 4. D. Niyato and E. Hossain, Delay-
multiplexing, and multi user diversity. based admission control using fuzzy
QoS is of two types: one based on per logic for OFDMA broadband wireless
flow handling and one based on networks, Proc. IEEE ICC’06, vol. 12,
aggregate handling. pp. 5511–5516, June 2006.
Per flow handling offers better QoS but 5. Y.-C. Liang, R. Zhang, and J. M.
has scalability issues. Most IP Cioffi, Transmit optimization for MIMO-
networks today rely on aggregate OFDM with delay-constrained and no-
handling. delay-constrained traffic, IEEE Trans.
• The IETF has developed a Signal Process., vol. 54, no. 8, pp.
number of architectures and protocols 3190–3199, August 2006.
for providing QoS in an IP network. 6. I. Koutsopoulos and L. Tassiulas,
Three major emerging IP QoS Cross-layer adaptive techniques for
technologies are integrated services, throughput enhancement in wireless
differentiated services, and multi OFDM-based networks, IEEE/ACM
protocol label switching. Trans. Network., vol. 14, pp. 1056–
• The session initiation protocol 1066, October 2006.
(SIP), a simple, flexible, and powerful 7. I. Kim, I.-S. Park, and Y. H. Lee,
text-based protocol, has rapidly Use of linear programming for dynamic
established itself as the protocol of Sub carrier and bit allocation in multi-
choice for multimedia session control user OFDM, IEEE Trans. Vehicular
in IP networks. Technol., vol. 55, no. 4, pp. 1195–
• Wireless network designs 1207, July 2006.
should include support for basic 8. J. Bandara, X. Shen, and Z.
security mechanisms, such as Nurmohamed, A fuzzy resource
encryption, authentication, and access controller for non-real-time traffic in
control. The IEEE 802.16e-2005, along wireless networks, Proc. IEEE ICC’00,
with the WiMAX architecture, has vol. 1, pp. 75–79, June 2000.
support for robust and flexible security 9. J. Mar and C.-Y. Kao, Cascade fuzzy
mechanisms. radio resource management using
SDMA scheduling in TD-CDMA system, VTC’99, vol. 2, pp. 1419–1427, May
Proc. IEEE WCNC’06, vol. 2, pp. 991– 1999.
996, April 2006. 20. H. Liao, L. Tie, and Z. Du, A
10. L. Giupponi, R. Agusti, J. Perez- vertical handover decision algorithm
Romero, and O. Sallent, A novel joint based on fuzzy control theory, Proc.
radio resource management IEEE IMSCCS’06, vol. 2, pp. 309–313,
approaches with reinforcement April 2006.
learning mechanisms, Proc. IEEE
IPCCC’05, pp. 621–626, April 2005.
11. L. Giupponi, R. Agusti, J. Perez-
Romero, and O. Sallent, Joint radio
resource management algorithm for
multi-RAT networks, Proc. IEEE
GLOBECOM’05, vol. 6, November–
December 2005.
12. D. Soud and H. B. Kazemian, A
fuzzy approach to connection
admission control in 802.11b wireless
systems, Proc. IEEE IECON’03, vol. 2,
pp. 1914–1919, November 2003.
13. C.-L. Chen and P.-C. Hsiao,
Supporting QoS in wireless MAC by
fuzzy control, Proc. WCNC’05, vol. 2,
pp. 1242–1247, March 2005.
14. A. Zhu and J. Hu, Adaptive call
admission control for multi-class CDMA
cellular systems, Proc. IEEE
APCC/OECC’99, vol. 1, pp. 533–536,
October 1999.
15. B. AliPanahi and M. Karzand, A
novel soft handoff algorithm for fair
network resources distribution, Proc.
IEEE WOCN’05, pp. 255–259, March
2005.
16. G. Edwards and R. Sankar, Hand-
off using fuzzy logic, Proc. IEEE
GLOBECOM’95, vol. 1, pp. 524–528,
November 1995.
17. G. Edwards and R. Sankar, A
predictive fuzzy algorithm for high
performance microcellular handoff,
Proc. IEEE GLOBECOM’97, vol. 2, pp.
987–990, November 1997.
18. M. S. Dang, A. Prakash, D. K.
Anvekar, D. Kapoor, and R. Shorey,
Fuzzy logic based handoff in wireless
networks, Proc. IEEE VTC’00 spring,
vol. 3, pp. 2375–2379, May 2000.
19. N. D. Tripathi, J. H. Reed, and H.
F. VanLandingham, Fuzzy logic based
adaptive handoff algorithms for
microcellular systems, Proc. IEEE

Das könnte Ihnen auch gefallen