0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
36 Ansichten11 Seiten
The new IP-based standard developed by the IEEE 802. Is likely to accelerate adoption of the technology. It will expand the scope of usage thanks to: the possibility of operating in licensed and unlicensed frequency bands. The WiMax forum, backed by industry leaders, will encourage the widespread adoption of broadband wireless access.
The new IP-based standard developed by the IEEE 802. Is likely to accelerate adoption of the technology. It will expand the scope of usage thanks to: the possibility of operating in licensed and unlicensed frequency bands. The WiMax forum, backed by industry leaders, will encourage the widespread adoption of broadband wireless access.
Copyright:
Attribution Non-Commercial (BY-NC)
Verfügbare Formate
Als DOC, PDF, TXT herunterladen oder online auf Scribd lesen
The new IP-based standard developed by the IEEE 802. Is likely to accelerate adoption of the technology. It will expand the scope of usage thanks to: the possibility of operating in licensed and unlicensed frequency bands. The WiMax forum, backed by industry leaders, will encourage the widespread adoption of broadband wireless access.
Copyright:
Attribution Non-Commercial (BY-NC)
Verfügbare Formate
Als DOC, PDF, TXT herunterladen oder online auf Scribd lesen
Saqib Naeem, Noman Saghir, Junaid R Malik saqibnaeem22@hotmail.com, n_saghir82@hotmail.com, junaidrmalik@gmail.com
Introduction What is WiMAX?
Broadband Wireless Access (BWA) has Standards associated to WiMax been serving enterprises and operators Worldwide Interoperability for for years, to the great satisfaction of Microwave Access (WiMax) is the its users. However, the new IP-based common name associated to the IEEE standard developed by the IEEE 802.16a/REVd/e standards. These 802.16 is likely to accelerate adoption standards are issued by the IEEE of the technology. It will expand the 802.16 subgroup that originally scope of usage thanks to: the covered the Wireless Local Loop (WLL) possibility of operating in licensed and technologies with radio spectrum from unlicensed frequency bands, unique 10 to 66 GHz. Recently, these performance under Non-Line-of-Sight specifications were extended below 10 (NLOS) conditions, Quality of Service GHz. (QoS) awareness, extension to • In January 2003, the IEEE nomadicity, and more. approved 802.16a as an amendment In parallel, the WiMax forum, to IEEE 802.16- 2001, defining (Near) backed by industry leaders, will Line-Of-Sight capability. encourage the widespread adoption of • In July 2004, IEEE broadband wireless access by 802.16REVd, now published under the establishing a brand for the technology name IEEE 802.16-2004, introduces and pushing interoperability between support for indoor CPE (NLOS) through products. additional radio capabilities such as The purpose of this Paper is to antenna beam forming and OFDM sub- highlight and assess the value of channeling. WiMax as the right solution to: • Early 2005, an IEEE 802.16e • extend the currently limited variant will introduce support for coverage of public WLAN (hotspots) to mobility. citywide coverage (hot zones) - the See Figure 1 for the applications same technology being usable at home associated with each of these and on the move, standards. • blanket metropolitan areas for mobile data-centric service delivery, • offer fixed broadband access in urban and suburban areas where copper quality is poor or unbundling difficult, • bridge the digital divide in low- density areas where technical and economic factors make broadband deployment very challenging. In addition to these uses, this paper will highlight other potential applications, such as telephony or an effective point-to-multipoint backhauling solution for operators or enterprises. WiMax can offer very high data rates and extended coverage. However, • 75Mbit/s capacity for the base from the radio equipment station is achievable with a 20 MHz manufacturers and chipset industries. channel in best propagation conditions. WiMax will also target the data-centric But regulators will often allow only mobility market with the introduction smaller channels (10 MHz or less) of lower power consumption chipsets. reducing the maximum bandwidth. The strong support from some of the • Even though 50 km is most important chipsets achievable under optimal conditions manufacturers such as Intel is a key and with a reduced data rate (a few enabler for the success of WiMAX, Mbit/s), the typical coverage will be since it will lead to wide availability of around 5 km with indoor CPE (NLOS) affordable WiMAX-enabled terminals and around 15 km with a CPE (e.g., laptops, PDAs, etc.). connected to an external antenna (LOS). WiMAX, a complement to fixed and mobile access WiMAX product availability WiMAX integrates perfectly into Mass deployment of WiMAX products is existing fixed and mobile networks, planned in two main steps: complementing them when needed. • Mid-2005, availability of the This section gives a more detailed 802.16REVd chipset, allowing the analysis of WiMAX integration into development of cost optimized CPE fixed and the mobile markets. operating indoors (NLOS), • In 2006, availability of WiMAX for fixed wireless access 802.16e chipsets embedded in laptops Nationwide broadband access has and later on in other mobile devices, become a priority in many countries. enabling Portable Internet. In most developed countries, the We believe that current pre-WiMAX average broadband coverage will reach products and initial 802.16a WiMAX 90% in the coming years. Still, in products available in early 2005, some rural areas of such countries, operating similarly to current broadband coverage will not exceed proprietary equipment (LOS, not cost- 50%. optimized CPE) and at similar cost, will The service gap can be categorized by not be widely deployed, because the two characteristics: the type of area operator needs to go and install the (rural or urban) and the level of antenna at the customer premise, national development (see Table 1). which is uneconomical for residential customer as proved in the early days of ADSL installation. This said 802.16a will certainly be used for at least two years on the market window of backhauling of operator’s sites: wireless transmission of WiFi hotspot traffic to the nearest ISP point of presence, or data leased lines In developed countries, DSL service concentration, or 3G new small site deployment has been massive in urban backhauling. and sub-urban deployments, whereas coverage of remote areas - smaller Market for WiMAX towns and rural areas - is lagging WiMAX will boost today's highly behind. fragmented BWA market thanks to Hurdles to overcome are the poor line standardization and interoperability, quality of the installed copper base, state-of-the-art radio efficiency with the large distances to the central NLOS capability, and strong support offices or cabinets, or the low population density. In this context, While nomadicity offers connectivity WiMAX, with its QoS support, longer within the coverage area of a single reach, and data rates similar to DSL, is base station, Portable Internet implies naturally positioned as a viable first session continuity throughout the mile option to offer broadband access network. In addition a new generation to residential users. of networks with multi-access (3G, Wi- In emerging countries, the main focus Fi, WiMAX, DSL, FTTU, etc.) enable of broadband deployment is on urban end-users to enjoy an "Always Best and sub-urban areas, and will remain Connected" experience when accessing so in the near future. The low POTS their applications via the best available penetration and the low quality of the network at home, on the pause, or on copper pair prevent mass scale DSL the move. See Figure 2. WiMAX deployment and foster the need for becomes an additional radio access alternate broadband technologies. In solution in the global network this context, WiMAX is positioned as architecture. an excellent option. Moreover, the possibility of offering broadband Fig 2 services in combination with voice services will gradually lead to narrowband WLL substitution. WiMax is of interest for large enterprises with several locations in the same metropolitan area. WiMax will permit Operator's bypass under license conditions: building a metropolitan private network of IP lines at a very low cost (no civil works). The comparison to leased lines rental fee is in favor of WiMax even for two sites only.
WiMAX for Portable Internet
WiMAX, the natural complement to mobile and Wi-Fi networks Mobile networks offer full mobility, nation- wide coverage voice support and WiMAX, the obvious choice for moderate data rates. operators WiMAX can then be positioned as a By integrating WiMAX into their complementary solution by offering networks, mobile operators can boost higher bandwidth when required, in their service with high bandwidth, particular in dense urban areas. when necessary, the same applications Public WLAN, while offering clear (messaging, agenda, location-based benefits, is limited in coverage and services …) being offered on both mobility capabilities. WiMAX by-passes networks with a single billing and these limitations and offers broadband subscriber profile. connectivity in larger areas (hot Mobile operators can also reuse zones). Wi-Fi and WiMAX solutions are existing radio sites and backhauling also complementary, with Wi-Fi being equipment to facilitate the deployment more adapted for short-range, indoor of WiMAX. connections (in particular in the enterprise and at home) and WiMAX for long- range outdoor connections. From nomadicity to Portable Internet WiMAX Technology Challenge A number of arguments favor the use WiMAX, more flexibility and of IP-based protocols and architecture security for broadband wireless. First, IP-based Unlike WLAN, WiMAX provides a systems tend to be cheaper because of media access control (MAC) layer that the economies of scale they enjoy uses a grant-request mechanism to from widespread adoption in wired authorize the exchange of data. This communication systems. Adopting IP feature allows better exploitation of architecture can make it easier to the radio resources, in particular with develop new services and applications smart antennas, and independent rapidly. The large IP application management of the traffic of every development community can be user. leveraged. An IP-based architecture This simplifies the support of real-time for broadband wireless will enable and voice applications. easier support for such applications as One of the inhibitors to widespread IP multicast and any cast. An IP-based deployment of WLAN was the poor architecture makes it easy to integrate security feature of the first releases. broadband wireless systems with other WiMAX proposes the full range of access technologies and thereby security features to ensure secured enable converged services. data exchange: IP-based protocols are simple and • Terminal authentication by flexible but not very efficient or robust. exchanging certificates to prevent These deficiencies were not such a rogue devices. huge concern as IP evolved largely in • User authentication using the the wired communications space, Extensible Authentication Protocol where transmission media, such as (EAP). fiber-optic channels, offered abundant • Data encryption using the bandwidth and very high reliability. In Data Encryption Standard (DES) or wireless systems, however, Advanced Encryption Standard (AES), introducing IP poses several both much more robust than the challenges: Wireless Equivalent Privacy (WEP) (1) Making IP-based protocols more initially used by WLAN. Furthermore, bandwidth efficient, each service is encrypted with its own (2) Adapting them to deliver the security association and private keys. required QoS (delay, jitter, throughput, etc.) when operating in Supporting IP in Wireless bandwidth-limited and unreliable The Internet Protocol (IP) has become media, and the networking protocol of choice for (3) Adapting them to handle terminals modern communication systems. that move and change their point of Internet-based protocols are now attachment to the network. beginning to be used to support not only data but also voice, video, and MAC-Layer Overview multimedia. Voice over IP is quickly The primary task of the WiMAX MAC emerging as a formidable competitor layer is to provide an interface to traditional circuit-switched voice between the higher transport layers and appears likely to displace it over and the physical layer. The MAC layer time. Video over IP and IPTV are also takes packets from the upper layer— emerging as potential rivals to these packets are called MAC service traditional cable TV. Because more and data units (MSDUs)—and organize more applications will migrate to IP, them into MAC protocol data units IP-based protocols and architecture (MPDUs) for transmission over the air. must be considered for broadband For received transmissions, the MAC wireless systems. layer does the reverse. The IEEE 802.16-2004 and IEEE 802.16e-2005 WiMAX MAC also supports ARQ, which MAC design includes a convergence can be used to request the sub layer that can interface with a retransmission of unfragmented variety of higher-layer protocols, such MSDUs and fragments of MSDUs. The as ATM, TDM Voice, Ethernet, IP, and maximum frame length is 2,047 bytes, any unknown future protocol. Given which is represented by 11 bits in the the predominance of IP and Ethernet GMH. in the industry, the WiMAX Forum has decided to support only IP and Ethernet at this time. Besides providing a mapping to and from the higher layers, the convergence sub layer supports MSDU header suppression to reduce the higher layer overheads on each packet. The WiMAX MAC is designed from the ground up to support very high peak bit rates while delivering quality of service similar to that of ATM and DOCSIS. The WiMAX MAC uses a variable-length MPDU and offers a lot of flexibility to allow for their efficient transmission. For example, multiple MPDUs of same or different lengths may be aggregated into a single burst Figure 3 Examples of various MAC to save PHY overhead. Similarly, PDU frames multiple MSDUs from the same higher- layer service may be concatenated into Quality of Service a single MPDU to save MAC header What is QoS? This rather elusive term overhead. Conversely, large MSDUs denotes some form of assurance that a may be fragmented into smaller service will perform to a certain level. MPDUs and sent across multiple The performance level is typically frames. specified in terms of throughput, Figure 3 shows examples of various packet loss, delay, and jitter, and the MAC PDU (packet data unit) frames. requirements vary, based on the Each MAC frame is prefixed with a application and service. generic MAC header (GMH) that The form of assurance can also vary contains a connection identifier8 from a hard quantitative measure, (CID), the length of frame, and bits to such as a guarantee that all voice qualify the presence of CRC, sub packets will be delivered with less than headers, and whether the payload is 100ms delay 99 percent of the time— encrypted and if so, with which key. to a soft qualitative guarantee that The MAC payload is either a transport certain applications and users will be or a management message. Besides given priority over others. MSDUs, the transport payload may Resource limitations in the network are contain bandwidth requests or what make providing assurances a retransmission requests. The type of challenge. transport payload is identified by the Although typically, the most- sub header that immediately precedes constrained resource is the wireless it. Examples of sub headers are link, the other intermediate nodes and packing sub headers and links that have to be traversed for an fragmentation sub headers. end-to-end service also have resource limitations. Each link has its own bandwidth-capacity limits, and each Internet using IP node has limited memory for buffering Let us consider the working of a typical packets before forwarding. VoIP system. A simplified VoIP Overbuilding the network to provide architecture is shown in Figure. First, higher bandwidth capacity and larger the voice signal is sampled and buffers is an expensive and inefficient digitized. way to provide quality, particularly Then it is encoded into VoIP frames. when the quality requirements are There are many popular encoders very high. Therefore, more clever available, for example, G.711, methods for providing QoS must be G.723.1, G.729. The VoIP frames are devised and these methods must take then packetized and transmitted using into account the particular needs of RTP/UDP/IP. At the receiver side, the the application or service and optimize VoIP frames are de-packetized and the resources used. Different processed through a play out buffer. applications require a different mix of The function of the play out buffer is resources. For example, latency- nothing but to smooth out the playing intolerant applications require faster delay, that is, to smoothen the delay access to bandwidth resources and not jitter caused during transmission memory, whereas latency-tolerant through the network. applications can use memory At the end, the voice signal is resources to avoid packets being retrieved from the VoIP frames and is dropped, while waiting for access to played out at the user’s speakers. bandwidth resources. This fact may be As VoIP packets travel through the exploited to deliver QoS efficiently. In network, there is evidently some short, a QoS-enabled network should congestion and channel-related losses. provide guarantees appropriate for Also, the packets suffer delay various application and service types depending on the congestion at the while making efficient use of network intermediate routers. Both loss and resources. delay of packets adversely affect the quality of VoIP calls, which is generally VoIP over WiMAX expressed in terms of R-score. In spite of the growing popularity of data services, voice services still remain the major revenue earner for the network service providers. The two most popular ways of providing voice services are the packet switched telephone networks (PSTN) and the wireless cellular networks. Deployment of both these forms of networks requires infrastructures that are usually very expensive. Alternative solutions are being sought FIGURE 4 that can deliver good quality voice A simplified VoIP architecture. services at a relatively lower cost. One way to achieve low cost is to use the already existing IP infrastructure. Quality of VoIP and R-Score Protocols used to carry voice signals The quality of the reconstructed voice over the IP network are commonly signal is subjective and therefore is referred to as voice over IP (VoIP) measured by the mean opinion score protocols. (MOS). MOSis a subjective quality In more common terms, it signifies the scores that ranges from 1 (worst) to 5 phone service (voice) over the (best) and is obtained by conducting subjective surveys. Though these VoIP but also to support more number methods provide a good assessment of VoIP calls. The proposed schemes, technique, they fail to provide an on- adhering to the MAC layer specification line assessment that might be used for of WiMAX, make use of the flexible adaptation purpose. features—mainly the size of the The ITU-T E-Model [6] has provided a protocol data units. We enable the parametric estimation for this purpose. ARQ, use FEC, construct MPDUs by It defines an R-score [6, 7] that aggregating multiple MSDUs, and combines different aspects of voice dynamically allocate one or multiple quality impairment. It is given by minislots to every VoIP call. The R = 100 − Is − Ie − Id + A performance of the VoIP calls is Where Is is the SNR impairments studied with respect to R-score. We associated with typical switched circuit exploit the difference in sensitivity of networks paths, Ie is an equipment R-score toward loss and delay for impairment factor associated with the recovering as many packets as losses due to the codecs and network, possible at the cost of increased delay. Id represents the impairment caused Exhaustive simulation experiments by the mouth-to-ear delay, and A reveal that the feedback-based compensates for the above technique coupled with impairments under various user retransmissions, aggregation, and conditions and is known as the variable size MPDUs not only increases expectation factor. the R-score (and consequently the R-score. The R-score ranges from 0 to MOS) but also the number of VoIP 100 and a score of more than 70 streams. usually means a VoIP call of decent quality. Multimedia Session Management A session may loosely be defined as a Supporting VoIP over WiMAX set of meaningful communications With the sensitivity of VoIP with between two or more users or devices respect to loss and delay known, let us over limited time duration. In the consider the adaptive schemes at the context of multimedia MAC layer to dynamically construct the communications, the term session MPDUs. Once a connection is set up, includes voice telephony, audio and the aim behind forming variable sized video streaming, chat and instant MPDUs is such that it strikes a balance messaging, interactive games, virtual between the lost packets and the delay reality sessions, and so on. A session incurred. The final aim is to improve may also have multiple connections the quality of VoIP calls and at the associated with it; for example, a same time increase the number of video conference, in which the audio streams that can be accommodated. and video parts are separate connections. As new wireless access technologies Session management encompasses are being developed, WiMAX is more than transfer of bits from a emerging as one of the promising transmitter to a receiver. broadband technologies that can It includes support for locating and support a variety of real-time services. getting consent from the parties Since extension of VoIP calls over involved in the communication, wireless networks is inevitable, we negotiating the parameters and study the feasibility of supporting VoIP characteristics of the communication, over WiMAX. modifying it midstream as necessary, We discuss a combination of and terminating it. For traditional IP techniques that can be adopted not data applications, such as Web only to enhance the performance of browsing and e-mail, session management is rather simple. For Security is a broad and complex example, for a Web download, a DNS subject, and this section provides only (domain name server) is used to a brief introduction to it. identify the appropriate Web site, TCP We cover the basic security issues, is used to reliably transfer the content, introduce some terminology, and and the application itself—hypertext provide a brief overview of some of transfer protocol (HTTP)—is used to the security mechanisms, using provide basic session management. examples that are relevant to Session management follows a “one broadband wireless services, especially size fits all” policy, with everyone WiMAX. pretty much getting to view the same Well-designed security architecture for Web pages without being able to a wireless communication system specify preferences in any meaningful should support the following basic way. IP multimedia communications, requirements: however, need a more robust session • Privacy: Provide protection from management scheme, primarily eavesdropping as the user data because of the need to support a large traverses the network from source to variety of applications and terminals. destination. Such session management tasks as • Data integrity: Ensure that user capabilities negotiation become very data and control/management important when different terminals messages are protected from being support different encoding schemes, tampered with while in transit. for example. Or say, if one party • Authentication: Have a mechanism wants to listen to the audio while to ensure that a given user/device is others receive both video and audio of the one it claims to be. Conversely, a multicast stream. the user/device should also be able to Clearly, there is a need for a session- verify the authenticity of the network control protocol to support multimedia that it is connecting to. Together, the services, including telephony using IP. two are referred to as mutual The ITU standard H.323 was the authentication. protocol that traditionally served this • Authorization: Have a mechanism purpose in most IP telephony and in place to verify that a given user is multimedia systems. Recently, a much authorized to receive a particular more simple and lightweight protocol, service. called the session initiation protocol • Access control: Ensure that only (SIP), has emerged as the leading authorized users are allowed to get contender for this task and it will likely access to the offered services. become the standard session control Security is typically handled at protocol used in WiMAX networks. SIP multiple layers within a system. Each has already been chosen as the layer handles different aspects of session control protocol for third security, though in some cases, there generation (3G) cellular networks. Also may be redundant mechanisms. As a needed is a transport-layer protocol general principle of security, it is that meets the requirements of considered good to have more than multimedia communications. Real-time one mechanism providing protection transport protocol (RTP) was designed so that security is not compromised in for this purpose. SIP and RTP work case one of the mechanisms is broken. well together to provide the session- control and media-transport functions required for IP multimedia sessions.
Security Table 2 shows how security is handled
at various layers of the IP stack. At the link layer, strong encryption should be used for wireless systems to prevent over-the-air eavesdropping. Also needed at the link layer is access control to prevent unauthorized users from using network resources: precious over-the-air resources.
Table 2 Examples of Security
Mechanisms at Various Layers of the IP Stack
Figure 5 IEAP architecture
IP for Wireless: Issues and
Potential Solutions The Internet Protocol is a network- layer protocol following a modular design that allows it to run over any link layer and supports carrying a variety of applications over it. The Mobility Management modularity and simplicity of IP design Two basic mechanisms are required to have led to a remarkable growth in the allow a subscriber to communicate number of applications developed for from various locations and while it. The remarkable success of the moving. First, to deliver incoming Internet has made IP the network- packets to a mobile subscriber, there layer protocol of choice for all modern should be a mechanism to locate all communication systems; not only for mobile stations (MS)—including idle data communications but also voice, stations—at any time, regardless of video, and multimedia where they are in the network. This communications. WiMAX has chosen IP process of identifying and tracking a as the protocol for delivering all MS’s current point of attachment to services. the network is called location IP’s modularity and simplicity are management. Second, to maintain an achieved by making a number of ongoing session as the MS moves out assumptions about the underlying of the coverage area of one base network. IP assumes that the link station to that of another, a layers in the network are generally mechanism to seamlessly transition, or reliable and introduce very few errors. hand off, the session is required. The IP does not strive for efficient use of set of procedures to manage this is network resources; rather, it assumes called handoff management. Location that the network has sufficient management and handoff resources. Some of these assumptions management together constitute do not hold well in a wireless network; mobility management. as a result running IP over wireless networks introduces problems that need to be addressed. In this section, we cover two such problems. The first problem results from the error-prone nature of wireless links, the second, from the bandwidth scarcity of wireless • To support mobile users, links. broadband wireless networks should incorporate mechanisms for location Conclusions management and handoff WiMAX defines a flexible all-IP-based management. Developing good network architecture that allows for handoff mechanisms is critical to the the exploitation of all the benefits of performance of mobile networks. IP. The reference network model calls for the use of IP-based protocols to References deliver end-to-end functions, such as 1. IEEE 802.16 Standard—Local and QoS, security, and mobility Metropolitan Area Networks—Part 16, management. IEEE Std 802.16a-2003. • WiMAX offers very high 2. J. Ye, X. Shen, and J. W. Mark, Call spectral efficiency, particularly when admission control in wideband CDMA using higher-order MIMO solutions. cellular networks by using fuzzy logic, WiMAX has a very flexible MAC layer IEEE Trans. Mobile Comp., vol. 4, no. that can accommodate a variety of 2, pp. 129–141, March–April 2005. traffic types, including voice, video, 3. S. Shen, C. J. Chang, C. Huang, and and multimedia, and provide strong Q. Bi, Intelligent call admission control QoS. WiMAX supports a number of for wideband CDMA cellular systems, advanced signal-processing techniques IEEE Trans. Wireless Comm., vol. 3, to improve overall system capacity. no. 5, pp. 1810–1821, September These techniques include adaptive 2004. modulation and coding, spatial 4. D. Niyato and E. Hossain, Delay- multiplexing, and multi user diversity. based admission control using fuzzy QoS is of two types: one based on per logic for OFDMA broadband wireless flow handling and one based on networks, Proc. IEEE ICC’06, vol. 12, aggregate handling. pp. 5511–5516, June 2006. Per flow handling offers better QoS but 5. Y.-C. Liang, R. Zhang, and J. M. has scalability issues. Most IP Cioffi, Transmit optimization for MIMO- networks today rely on aggregate OFDM with delay-constrained and no- handling. delay-constrained traffic, IEEE Trans. • The IETF has developed a Signal Process., vol. 54, no. 8, pp. number of architectures and protocols 3190–3199, August 2006. for providing QoS in an IP network. 6. I. Koutsopoulos and L. Tassiulas, Three major emerging IP QoS Cross-layer adaptive techniques for technologies are integrated services, throughput enhancement in wireless differentiated services, and multi OFDM-based networks, IEEE/ACM protocol label switching. Trans. Network., vol. 14, pp. 1056– • The session initiation protocol 1066, October 2006. (SIP), a simple, flexible, and powerful 7. I. Kim, I.-S. Park, and Y. H. Lee, text-based protocol, has rapidly Use of linear programming for dynamic established itself as the protocol of Sub carrier and bit allocation in multi- choice for multimedia session control user OFDM, IEEE Trans. Vehicular in IP networks. Technol., vol. 55, no. 4, pp. 1195– • Wireless network designs 1207, July 2006. should include support for basic 8. J. Bandara, X. Shen, and Z. security mechanisms, such as Nurmohamed, A fuzzy resource encryption, authentication, and access controller for non-real-time traffic in control. The IEEE 802.16e-2005, along wireless networks, Proc. IEEE ICC’00, with the WiMAX architecture, has vol. 1, pp. 75–79, June 2000. support for robust and flexible security 9. J. Mar and C.-Y. Kao, Cascade fuzzy mechanisms. radio resource management using SDMA scheduling in TD-CDMA system, VTC’99, vol. 2, pp. 1419–1427, May Proc. IEEE WCNC’06, vol. 2, pp. 991– 1999. 996, April 2006. 20. H. Liao, L. Tie, and Z. Du, A 10. L. Giupponi, R. Agusti, J. Perez- vertical handover decision algorithm Romero, and O. Sallent, A novel joint based on fuzzy control theory, Proc. radio resource management IEEE IMSCCS’06, vol. 2, pp. 309–313, approaches with reinforcement April 2006. learning mechanisms, Proc. IEEE IPCCC’05, pp. 621–626, April 2005. 11. L. Giupponi, R. Agusti, J. Perez- Romero, and O. Sallent, Joint radio resource management algorithm for multi-RAT networks, Proc. IEEE GLOBECOM’05, vol. 6, November– December 2005. 12. D. Soud and H. B. Kazemian, A fuzzy approach to connection admission control in 802.11b wireless systems, Proc. IEEE IECON’03, vol. 2, pp. 1914–1919, November 2003. 13. C.-L. Chen and P.-C. Hsiao, Supporting QoS in wireless MAC by fuzzy control, Proc. WCNC’05, vol. 2, pp. 1242–1247, March 2005. 14. A. Zhu and J. Hu, Adaptive call admission control for multi-class CDMA cellular systems, Proc. IEEE APCC/OECC’99, vol. 1, pp. 533–536, October 1999. 15. B. AliPanahi and M. Karzand, A novel soft handoff algorithm for fair network resources distribution, Proc. IEEE WOCN’05, pp. 255–259, March 2005. 16. G. Edwards and R. Sankar, Hand- off using fuzzy logic, Proc. IEEE GLOBECOM’95, vol. 1, pp. 524–528, November 1995. 17. G. Edwards and R. Sankar, A predictive fuzzy algorithm for high performance microcellular handoff, Proc. IEEE GLOBECOM’97, vol. 2, pp. 987–990, November 1997. 18. M. S. Dang, A. Prakash, D. K. Anvekar, D. Kapoor, and R. Shorey, Fuzzy logic based handoff in wireless networks, Proc. IEEE VTC’00 spring, vol. 3, pp. 2375–2379, May 2000. 19. N. D. Tripathi, J. H. Reed, and H. F. VanLandingham, Fuzzy logic based adaptive handoff algorithms for microcellular systems, Proc. IEEE