WiMAX for Broadband Wireless Access full report
#5
[attachment=11446]
WiMAX: Broadband Wireless Access
 802.16 Standards Development
 Use wireless links with microwave or millimeter wave radios
o 10-66 GHz
o 802.16a extension to 2-11 GHz
 Use licensed spectrum (unlicensed too in 802.16a)
Metropolitan in scale
 Provide public network service to fee-paying customers
 Point-to-multipoint architecture with rooftop or tower-mounted antennas
 802.16 Standards Development
 Provide efficient transport of heterogeneous traffic supporting QoS
 Capable of broadband transmissions (2-75 Mbps)
o Accommodate both continuous and bursty traffic
Mobile extensions: 802.16e
 IEEE 802.16 Protocol Architecture
 Protocol Architecture
 Physical layer functions:
o Encoding/decoding of signals
o Preamble generation/removal
o Bit transmission/reception
 Medium access control layer functions:
o On transmission, assemble data into a frame with address and error detection fields
o On reception, disassemble frame, and perform address recognition and error detection
o Govern access to the wireless transmission medium
Protocol Architecture
 Convergence layer functions:
o Encapsulate PDU framing of upper layers into native 802.16 MAC/PHY frames
o Map upper layer’s addresses into 802.16 addresses
o Translate upper layer QoS parameters into native 802.16 MAC format
o Adapt time dependencies of upper layer traffic into equivalent MAC service
 IEEE 802.16 Services
Digital audio/video multicast
 Digital telephony
 ATM
 Internet protocol
 Bridged LAN
 Back-haul
 Frame relay
 Burst Profiles
 Each subscriber station negotiates a burst profile with the base station
 Burst profiles decided based on QoS needs and channel conditions
o Harsher environment demands more robust profiles
o Favorable environment allows efficient profiles
 IEEE 802.16.1 Frame Format
Header - protocol control information
o Downlink header – used by the base station
o Uplink header – used by the subscriber to convey bandwidth management needs to base station
o Bandwidth request header – used by subscriber to request additional bandwidth
 Payload – either higher-level data or a MAC control message
 CRC – error-detecting code
 Physical Layer: Uplink
 Stations transmit in in their assigned allocation specified in an initial map
 Uplink sub-frame may also contain contention-based allocations for initial system access
 Uses a DAMA-TDMA technique
 Error correction uses Reed-Solomon codes
 Modulation scheme based on QPSK, 16-QAM or 64-QAM
 Physical Layer: Downlink
 Continuous downstream mode
o For continuous transmission (audio/video)
o Simple TDM scheme is used for channel access
o Frequency division duplex (FDD)
 Burst downstream mode
o For bursty transmission (IP-based traffic)
o DAMA-TDMA scheme for channel access
o FDD with adaptive modulation, frequency shift division duplexing (FSDD), time division duplexing (TDD)
Medium Access Control (MAC)
 Connection-oriented
o All services inherently connectionless mapped to a connection
 Connections referenced using a 16-bit connection identifier (CID)
 Management channels and transport channels for contracted services
 Radio Link Control
 Power control and paging
Transition among burst profiles
 Downlink burst profile change
o Subscriber station monitors downlink quality
o Requests a new profile
o Granted if base station judges possible
 Uplink profile change
o Base station monitors the uplink signal quality
o Specifies the new profile’s usage code when granting subscriber bandwidth in a frame
Bandwidth Requests & Grants
 Two kinds of subscribers
o Grant per connection (GPC)
o Grant per subscriber (GPSS)
 Both classes request bandwidth per connection for QoS guarantees
 For GPC, bandwidth explicitly guaranteed to connection
 For GPSS, bandwidth aggregated into a single grant for SS
Requesting Bandwidth
 Unsolicited grants
o No need to request bandwidth for services that generate fixed units of data periodically
o Negotiated at connection setup time
 Send a bandwidth request MAC packet
 Piggyback request within MAC data packet
 Polling by base station
MAC Management Messages
 Uplink and downlink channel descriptor
 Uplink and downlink access definition
 Ranging request and response
 Registration request, response and acknowledge
 Privacy key management request and response
 Dynamic service addition request, response and acknowledge
 Dynamic service change request, response, and acknowledge
 Dynamic service deletion request and response
 Multicast polling assignment request and response
 Downlink data grant type request
 ARQ acknowledgment
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: 4g broadband wireless, cbc ca bc, mp sss, broadband access for laptop, sss m i d m p, sss md id no, wimax the next frontier broadband wireless pdf,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: WiMAX for Broadband Wireless Access full report - by seminar class - 31-03-2011, 04:39 PM
RE: WiMAX for Broadband Wireless Access full report - by Guest - 07-10-2013, 09:02 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,151 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,364 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Resistive random-access memory (RRAM) project topics 4 3,251 13-04-2017, 10:49 AM
Last Post: jaseela123d
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 31,060 07-10-2016, 09:02 AM
Last Post: ijasti
  imouse full report computer science technology 3 25,549 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,267 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 67,381 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 75,494 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,042 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,120 11-02-2016, 02:02 PM
Last Post: seminar report asees

Forum Jump: