Wednesday, December 30, 2009

Dealing with Interference with WiMAX

Interference—Some Assumptions

The primary objection to wireless systems is the concern that there are or will soon be too many operators on the same frequency, which will cause so much interference that the technology will become unusable. This issue is not that simple.

Such an assumption relies largely on the use of unlicensed spectrum, where, according to Larry Lessig's "tragedy of the commons" scenario, multiple operators broadcast on the same unlicensed (read "free") spectrum, ultimately rendering it useless. Although this scenario may already be evident in the case of Wi-Fi variants (largely limited to the 2.4 GHz range), WiMAX is considerably different. WiMAX currently has no problems, only solutions.

Since 1927, interference protection has always been at the core of federal regulators' spectrum mission. The Radio Act of 1927 empowered the Federal Radio Commission to address interference concerns. This act primarily focused on three parameters: location, frequency, and power. The technology of the time did not permit consideration of a fourth element: time. In the modern sense, one might consider that a spectrum used by cell phones in a metropolitan area (dense population with millions of users) would command a very high price at a spectrum auction. At the other end of the "spectrum," a frequency band, say 2.5 GHz, in an exurban or rural market may go for very little money at an auction or at resell by a spectrum broker. It is entirely possible that the wireless service provider may find a very low cost licensed spectrum and enjoy a protected spectrum, which will largely negate the concern over interference from other broadcasters (the purpose of the Radio Act of 1927 in the first place).

Sunday, December 27, 2009

What OFDM Means to WiMAX

To the telecommunications industry, an WiMAX OFDM-based system can squeeze a 72 Mbps uncoded data rate (~100 Mbps coded) out of 20 MHz of channel spectrum. This translates into a spectrum efficiency of 3.6 bps per Hz. If five of these 20 MHz channels are contained within the 5.725 to 5.825 GHz band, giving a total band capacity of 360 Mbps (all channels added together with 1 ×frequency reuse). With channel reuse and through sectorization, the total capacity from one BS site could potentially exceed 1 Gbps.

OFDM has manifold advantages in WiMAX, but among the more notable advantages is greater spectral efficiency. This is especially important in licensed spectrum use, where bandwidth and spectrum can be expensive. Here, OFDM delivers more data per spectrum dollar. In unlicensed spectrum applications, OFDM mitigates interference from other broadcasters due to its tighter beam width (less than 28 Mhz) and guardbands, as well as its dispersal of the data across different frequencies so that if one flow is "stepped on" by an interfering signal, the rest of the data is delivered on other frequencies.

QoS: Error Correction and Interleaving

Error correcting coding builds redundancy into the transmitted data stream. This redundancy allows bits that are in error or even missing to be corrected. The simplest example would be to simply repeat the information bits. This is known as a repetition code. Although the repetition code is simple in structure, more sophisticated forms of redundancy are typically used because they can achieve a higher level of error correction. For OFDM, error correction coding means that a portion of each information bit is carried on a number of subcarriers; thus, if any of these subcarriers has been weakened, the information bit can still arrive intact.

Interleaving is the other mechanism used in OFDM systems to combat the increased error rate on the weakened subcarriers. Interleaving is a deterministic process that changes the order of transmitted bits. For OFDM systems, this means that bits that were adjacent in time are transmitted on subcarriers that are spaced out in frequency. Thus errors generated on weakened subcarriers are spread out in time; that is, a few long bursts of errors are converted into many short bursts. Error correcting codes then correct the resulting short bursts of errors.

Thursday, December 24, 2009

QPSK Versus QAM

Rather than attempting to be all things to all subscribers, WiMAX delivers a gradation of QoS dependent on distance of the SS from the BS: The greater the distance, the lower the guarantee of QoS. WiMAX utilizes three mechanisms for QoS; from highest to lowest, these mechanisms are 64-QAM, 16-QAM, and QPSK. Figure 1 illustrates modulation schemes.

Figure 1: Modulation schemes focus the signal over distance.

By using a robust modulation scheme, WiMAX delivers high throughput at long ranges with a high level of spectral efficiency that is also tolerant of signal reflections. Dynamic adaptive modulation allows the BS to trade throughput for range. For example, if the BS cannot establish a robust link to a distant subscriber using the highest order modulation scheme, 64-QAM, the modulation order is reduced to 16-QAM or QPSK, which reduces throughput and increases effective range. Figure 2 demonstrates how modulation schemes ensure throughput over distance.

Figure 2: Modulation schemes ensure a quality signal is delivered over distance by decreasing throughput.

QPSK and QAM are the two leading modulation schemes for WiMAX. In general the greater the number of bits transmitted per symbol, the higher the data rate is for a given bandwidth. Thus, when very high data rates are required for a given bandwidth, higher-order QAM systems, such as 16-QAM and 64-QAM, are used. 64-QAM can support up to 28 Mbps peak data transfer rates over a single 6 MHz channel. However, the higher the number of bits per symbol, the more susceptible the scheme is to intersymbol interference (ISI) and noise. Generally the signal-to-noise ratio (SNR) requirements of an environment determine the modulation method to be used in the environment. QPSK is more tolerant of interference than either 16-QAM or 64-QAM. For this reason, where signals are expected to be resistant to noise and other impairments over long transmission distances, QPSK is the normal choice.

Multiplexing in OFDM

As shown in Figure 3, an efficient OFDM implementation converts a serial symbol stream of QPSK or QAM data into a size M parallel stream. These M streams are then modulated onto M subcarriers via the use of size N (N M) inverse FFT. The N outputs of the inverse FFT are then serialized to form a data stream that can then be modulated by a single carrier. Note that the N-point inverse FFT could modulate up to N subcarriers. When M is less than N, the remaining NM subcarriers are not in the output stream. Essentially, these have been modulated with amplitude of zero.

Figure 3: Block diagram of a simple OFDM transmitter

Although it would seem that combining the inverse FFT outputs at the transmitter would create interference between subcarriers, the orthogonal spacing allows the receiver to perfectly separate out each subcarrier. Figure 4 illustrates the process at the receiver. The received data is split into N parallel streams that are processed with a size N FFT. The size N FFT efficiently implements a bank of filters, each matched to N possible subcarriers. The FFT output is then serialized into a single stream of data for decoding. Note that when M is less than N, in other words fewer than N subcarriers are used at the transmitter, the receiver only serializes the M subcarriers with data.

Figure 4: Block diagram of a simple OFDM receiver

Monday, December 21, 2009

Legacy QoS Mechanisms

The following paragraphs describe legacy mechanisms.

FDD/TDD/OFDM

WiMAX incorporates a number of time-proven mechanisms to ensure good QoS. Most notable are TDD, FDD, FEC, FFT, and OFDM. The WiMAX standard provides flexibility in spectrum usage by supporting both FDD and TDD. Thus, it can operate in both FDD/OFDM and TDD/OFDM modes. It supports two types of FDD: continuous FDD and burst FDD.

In continuous FDD, the upstream and downstream channels are located on separate frequencies, and all CPE stations can transmit and receive simultaneously. The downstream channel is always on, and all stations are always listening to it. Traffic is sent on this channel in a broadcast manner using TDM. The upstream channel is shared using TDMA, and the BS is responsible for allocating bandwidth to the stations.

In burst FDD, the upstream and downstream channels are located on separate frequencies. In contrast to continuous FDD, not all stations can transmit and receive simultaneously. Those that can transmit and receive simultaneously are referred to as full-duplex capable stations while those that cannot are referred to as half-duplex capable stations.

A TDD frame has a fixed duration and contains one downstream subframe and one upstream subframe. The two subframes are separated by a guard time called transition gap (TG), and the bandwidth that is allocated to each subframe is adaptive. The TDD subframe is illustrated in Figure 1.

(Source: IEEE)

Figure 1: TDD subframe

Within a TDD downlink subframe, transmissions coming from the BS are organized into different modulation and FEC groups. The subframe header, called the FCH, consists of a preamble field, a PHY control field, and a MAC control field. The PHY control field is used for physical information, such as the slot boundaries, destined for all stations. It contains a map that defines where the physical slots for the different modulation/FEC groups begin.

The groups are listed in ascending modulation order, with QPSK first, followed by 16-QAM and then 64-QAM. Each CPE station receives the entire DL frame, decodes the subframe, and looks for MAC headers indicating data for the station. The DL data is always FEC coded. Payload data is encrypted, but message headers are unencrypted. The MAC control is used for MAC messages destined for multiple stations.

This variation uses burst single-carrier modulation with adaptive burst profiling in which transmission parameters, including the modulation and coding schemes, may be adjusted individually to each SS on a frame-by-frame basis. Channel bandwidths of 20 or 25 MHz (typical United States allocation) or 28 MHz (typical European allocation) are specified. Randomization is performed for spectral shaping and to ensure bit transitions for clock recovery.

Forward Error Correction (FEC)

WiMAX utilizes FEC, a technique that doesn't require the transmitter to retransmit any information that a receiver uses for correcting errors incurred in transmission over a communication channel. The transmitter usually uses a common algorithm and embeds sufficient redundant information in the data block to allow the receiver to correct. Without FEC, error correction would require the retransmission of whole blocks or frames of data, resulting in added latency and a subsequent decline in QoS.

Need QoS? Throw more bandwidth at it! Throughput and latency are two essentials for network performance. Taken together, these elements define the "speed" of a network. Whereas throughput is the quantity of data that can pass from source to destination in a specific time, round-trip latency is the time it takes for a single data transaction to occur (the time between requesting data and receiving it). Latency can also be thought of as the time it takes from data send-off on one end to data retrieval on the other (from one user to the other). Therefore, the better throughput (bandwidth) management, the better the QoS

Friday, December 18, 2009

Service Flow - WiMAX

Service Flow

Minimizing customer intervention and truck roll is very important for WiMAX deployments. The Provisioned Service Flow Table, Service Class Table, and Classifier Rule Table are configured to support self-installation and auto-configuration. When customers subscribe to the service, they tell the service provider the service flow information including the number of UL/DL connections with the data rates and QoS parameters, along with the types of applications (for example, Internet, voice, or video) the customer intends to run. The service provider preprovisions the services by entering the service flow information into the service flow database. When the SS enters the BS by completing the network entry and authentication procedure, the BS downloads the service flow information from the service flow database. Figure 1 provides an example of how the service flow information is populated. It indicate that two SSs, identified by MAC address 0x123ab54 and 0x45fead1, have been preprovisioned. Each SS has two service flows, identified by sfIndex, with the associated QoS parameters that are identified by qosIndex 1 and 2, respectively. qosIndex points to a QoS entry in the wmanIfBsServiceClassTable that contains three levels of QoS: Gold, Silver, and Bronze. sfIndex points to the entry in the wmanBsClassifierRuleTable and indicates which rules shall be used to classify packets on the given service flow.

(Source: Intel)

Figure 1: Service flow provisioning

When the SS with MAC address 0x123ab54 registers into the BS, the BS creates an entry in the wmanIfBaseRegisteredTable. Based on the MAC address, the BS will be able to find the service flow information that has been preprovisioned. The BS will use a dynamic service activate (DSA) message to create service flows for sfIndex 100001 and 100002, with the preprovisioned service flow information. This can be seen in Figure 1. It creates two entries in wmanIfCmnCpsServiceFlowTable. The service flows will then be available for the customer to send data traffic

Tuesday, December 15, 2009

How WiMAX Works

Like most data communications, WiMAX relies on a process consisting of a session setup and authentication. The RLC manages and monitors the quality of the service flow. With WiMAX, this process is a series of exchanges (DLs and ULs) between the BS and SS. A complex process determines what FDD and TDD settings will be used for the service flow, FEC, sets encryption, bandwidth requests, burst profiles, and so on. The process starts with channel acquisition by the newly installed SS.

Channel Acquisition

The MAC protocol includes an initialization procedure designed to eliminate the need for manual configuration. In other words, the subscriber takes the SS out of the box, plugs in power and Ethernet, and connects almost immediately to the network. The following paragraphs describe how that is possible without laborious user setup or service provider truck roll.

Upon installation, the SS begins scanning its frequency list to find an operating channel. It may be preconfigured by the service provider to register with a specified BS. This feature is useful in dense deployments where the SS might hear a secondary BS due to spurious signals or when the SS picks up a sidelobe of a nearby BS antenna. Moreover, this feature will help service providers avoid expensive installations and subsequent truck rolls.

After selecting a channel or channel pair, the SS synchronizes to the DL transmission from the BS by detecting the periodic frame preambles. Once the PHY is synchronized, the SS will look for the periodically broadcasted DCD and UCD messages that enable the SS to determine the modulation and FEC schemes used on the BS's carrier.

Initial Ranging and Negotiation of SS Capabilities

Once the parameters for initial ranging transmissions are established, the SS will scan the UL-MAP messages present in every frame for ranging information. The SS uses a backoff algorithm to determine which initial ranging slot it will use to send a ranging request (RNG-REQ) message. The SS will then send its burst using the minimum power setting and will repeat with increasingly higher transmission power until it receives a ranging response.

Based on the arrival time of the initial RNG-REQ and the measured power of the signal, the BS adjusts the timing advance and power to the SS with the ranging response (RNG-RSP). The response provides the SS with the basic and primary management CIDs. Once the timing advance of the SS transmissions has been correctly determined, the ranging procedure for fine-tuning the power is done via a series of invited transmissions.

WiMAX transmissions are made using the most robust burst profile. To save bandwidth, the SS next reports its PHY capabilities, including which modulation and coding schemes it supports and whether, in an FDD system, it is half-duplex or full-duplex. The BS, in its response, can deny the use of any capability reported by the SS. See Figure 1 for an illustration of this process.

Figure 1: Channel acquisition process between an SS and BS

It should be noted here how complex this setup procedure is. The purpose thus far is to ensure a high quality connection between the SS and the BS.

SS Authentication and Registration

Wi-Fi has been dogged with a reputation for lax security. Perhaps the best "horror story" deals with a computer retailer who installed a wireless LAN. A customer purchased a Wi-Fi equipped laptop and, anxious to enjoy it, powered it up in the parking lot of the retailer. The new laptop owner was immediately able to tap into the retailer's Wi-Fi network and was able to capture some customer credit card information. Fortunately, the new laptop owner was a journalist, not a con artist. The story, much to the chagrin of the national retailer and the Wi-Fi industry, made the national news. The Wi-Fi industry has had to work hard to shake the reputation of having loose security measures. A similar story will not easily, if ever, occur with WiMAX.

Each SS contains both a manufacturer-issued factory-installed X.509 digital certificate and the certificate of the manufacturer. The SS in the Authorization Request and Authentication Information messages sends these certificates, which set up the link between the 48-bit MAC address of the SS and its public RSA key, to the BS. The network is able to verify the identity of the SS by checking the certificates and can subsequently check the level of authorization of the SS. If the SS is authorized to join the network, the BS will respond to its request with an authorization reply containing an authorization key (AK) encrypted with the SS's public key and used to secure further transactions.

Upon successful authorization, the SS will register with the network. This will establish the secondary management connection of the SS and determine capabilities related to connection setup and MAC operation. The version of IP used on the secondary management connection is also determined during registration.

IP Connectivity

After registration, the SS attains an IP address via DHCP and establishes the time of day via the Internet Time Protocol. The DHCP server also provides the address of the TFTP server from which the SS can request a configuration file. This file provides a standard interface for providing vendor-specific configuration information. Se Figure 2 for an illustration of this process.

Figure 2: SS authentication and registration

Connection Setup

Now comes the connection setup, where data (the content) actually flows. WiMAX uses the concept of service flows to define one-way transport of packets on either the DL or the UL. Service flows are characterized by a set of QoS parameters, such as those for latency and jitter. To most efficiently utilize network resources, such as bandwidth and memory, WiMAX adopts a two-phase activation model in which resources assigned to a particular admitted service flow may not be actually committed until the service flow is activated. Each admitted or active service flow is mapped to a MAC connection with a unique CID. In general, service flows in WiMAX are preprovisioned, and the BS initiates the setup of the service flows during SS initialization.

In addition, the BS or the SS can dynamically establish service flows. The SS typically initiates service flows only if there is a dynamically signaled connection, such as a switched virtual connection (SVC) from an ATM network. The establishment of service flows is performed via a three-way handshaking protocol in which the request for service flow establishment is responded to and the response acknowledged.

In addition to supporting dynamic service establishment, WiMAX supports dynamic service changes in which service flow parameters are renegotiated. These service flow changes follow a three-way handshaking protocol similar to the one dynamic service flow establishment uses.

Friday, December 11, 2009

The MAC and WiMAX Architecture

The WiMAX DL from the BS to the user operates on a point-tomultipoint basis as illustrated in Figure 1. The WiMAX wireless link operates with a central BS with a sectorized antenna that is capable of handling multiple independent sectors simultaneously. Within a given frequency channel and antenna sector, all stations receive the same transmission. The BS is the only transmitter operating in this direction, so it transmits without having to coordinate with other stations except the overall TDD that may divide time into UL and DL transmission periods. The DL is generally broadcast. In cases where the DL-MAP does not explicitly indicate that a portion of the DL subframe is not a specific SS, all SSs capable of listening to that portion of the DL subframe will listen.

Figure 1: Typical WiMAX architecture for point-to-multipoint distribution

The MAC is connection-oriented. Connections are referenced with 16-bit connection identifiers (CIDs) and may require continuously granted bandwidth or bandwidth on demand. As described previously, both bandwidths are accommodated. A CID is used to distinguish between multiple UL channels that are associated with the same DL channel. The SSs check the CIDs in the received PDUs and retain only those PDUs addressed to them.

The MAC PDU is the data unit exchanged between the MAC layers of the BS and its SSs. It is the data unit generated on the downward direction for the next lower layer and the data unit received on the upward direction from the previous lower layer.

Each SS has a standard 48-bit MAC address, which serves as an equipment identifier because the primary addresses used during operation are the CIDs. Upon entering the network, the SS is assigned three management connections in each direction. These three connections reflect the three different QoS requirements used by different management levels:

  • Basic connection—transfers short, time-critical MAC and radio link control (RLC) messages.

  • Primary management connection—transfers longer, more delay-tolerant messages, such as those used for authentication and connection setup. The secondary management connection transfers standards-based management messages such as Dynamic Host Configuration Protocol (DHCP), Trivial File Transfer Protocol (TFTP), and Simple Network Management Protocol (SNMP). In addition to these management connections, SSs are allocated transport connections for the contracted services.

  • Transport connections—are unidirectional to facilitate different UL and DL QoS and traffic parameters; they are typically assigned to services in pairs.

SSs share the UL to the BS on a demand basis. Depending on the class of service utilized, the SS may be issued continuing rights to transmit, or the BS may grant the right to transmit after receiving a request from the user.

Service Classes and QoS

Within each sector, users adhere to a transmission protocol that controls contention between users and enables the service to be tailored to the delay and bandwidth requirements of each user application. This is accomplished through four different types of UL scheduling mechanisms. These mechanisms are implemented using unsolicited bandwidth grants, polling, and contention procedures. The WiMAX MAC provides QoS differentiation for different types of applications that might operate over WiMAX networks:

  • Unsolicited Grant Services (UGS)—UGS is designed to support constant bit rate (CBR) services, such as T1/E1 emulation and VoIP without silence suppression.

  • Real-Time Polling Services (rtPS)—rtPS is designed to support real-time services that generate variable size data packets, such as MPEG video or VoIP with silence suppression, on a periodic basis.

  • Non-Real-Time Polling Services (nrtPS)—nrtPS is designed to support non-real-time services that require variable size data grant burst types on a regular basis.

  • Best Effort (BE) Services—BE services are typically provided by the Internet today for web surfing.

The use of polling simplifies the access operation and guarantees that applications receive service on a deterministic basis if required. In general, data applications are delay tolerant, but real-time applications, like voice and video, require service on a more uniform basis and sometimes on a very tightly controlled schedule.

For the purposes of mapping to services on SSs and associating varying levels of QoS, all data communications are in the context of a connection. Service flows may be provisioned when an SS is installed in the system. Shortly after SS registration, connections are associated with these service flows (one connection per service flow) to provide a reference against which to request bandwidth. Additionally, new connections may be established when a customer's service needs change. A connection defines both a service flow and the mapping between peer convergence processes that utilize the MAC. The service flow defines the QoS parameters for the PDUs that are exchanged once the connection has been established.

Service flows are the mechanism for UL and DL for QoS management. In particular, they facilitate the bandwidth allocation process. An SS requests UL bandwidth on a per connection basis (implicitly identifying the service flow). The BS grants the bandwidth to an SS as an aggregate of grants in response to per connection requests from the SS.[1]

The modulation and coding schemes are specified in a burst profile that may be adjusted adaptively for each burst to each SS. The MAC can make use of bandwidth-efficient burst profiles under favorable link conditions then shift to more reliable, although less efficient alternatives, as required to support the planned 99.999 percent link availability (QPSK to 16-QAM to 64-QAM).

The request-grant mechanism is designed to be scalable, efficient, and self-correcting. The WiMAX access system does not lose efficiency when presented with multiple connections per terminal, multiple QoS levels per terminal, and a large number of statistically multiplexed users.

Along with the fundamental task of allocating bandwidth and transporting data, the MAC includes a privacy sublayer that provides authentication of network access and connection establishment to avoid theft of service, and it provides key exchange and encryption for data privacy.

Tuesday, December 8, 2009

OFDM Variants 2–11 GHz

The need for NLOS operation drives the design of the 2—11 GHz PHY. Because residential applications are expected, rooftops may be too low (possibly due to obstruction by trees or other buildings) for a clear sight line to a BS antenna. Therefore, significant multipath propagation must be expected. Furthermore, outdoor-mounted antennas are expensive, due to both hardware and installation costs. The four 2—11 GHz air interface specifications are described in the following paragraphs.

WirelessMAN-OFDM This air interface uses OFDM with a 256-point transform (see OFDM description later in this chapter). Access is by TDMA. This air interface is mandatory for license-exempt bands.

The WirelessMAN-OFDM PHY is based on OFDM modulation. It is intended mainly for fixed access deployments where SSs are residential gateways deployed within homes and businesses. The OFDM PHY supports subchannelization in the UL. There are 16 subchannels in the UL. The OFDM PHY supports TDD and FDD operations, with support for both FDD and H-FDD SSs. The standard supports multiple modulation levels including Binary Phase Shift Keying (BPSK), QPSK, 16-QAM, and 64-QAM. Finally, the PHY supports (as options) transmit diversity in the DL using Space Time Coding (STC) and AAS with Spatial Division Multiple Access (SDMA).

The transmit diversity scheme uses two antennas at the BS to transmit an STC-encoded signal to provide the gains that result from second-order diversity. Each of two antennas transmits a different symbol (two different symbols) in the first symbol time. The two antennas then transmit the complex conjugate of the same two symbols in the second symbol time. The resulting data rate is the same as without transmit diversity.

Figure 1 illustrates the frame structure for a TDD system. The frame is divided into DL and UL subframes. The DL subframe is made up of a preamble, Frame Control Header (FCH), and a number of data bursts. The FCH specifies the burst profile and the length of one or more DL bursts that immediately follow the FCH. The downlink map (DL-MAP), uplink map (UL-MAP), DL Channel Descriptor (DCD), UL Channel Descriptor (UCD), and other broadcast mes-sages that describe the content of the frame are sent at the beginning of these first bursts. The remainder of the DL subframe is made up of data bursts to individual SSs.

Figure 1: Frame structure for a TDD system (Source: IEEE)

Each data burst consists of an integer number of OFDM symbols and is assigned a burst profile that specifies the code algorithm, code rate, and modulation level that are used for those data transmitted within the burst. The UL subframe contains a contention interval for initial ranging and bandwidth allocation purposes and UL PHY protocol data units (PDUs) from different SSs. The DL-MAP and UL-MAP completely describe the contents of the DL and UL subframes. They specify the SSs that are receiving and/or transmitting in each burst, the subchannels on which each SS is transmitting (in the UL), and the coding and modulation used in each burst and in each sub-channel.

If transmit diversity is used, a portion of the DL frame (called a zone) can be designated to be a transmit diversity zone. All data bursts within the transmit diversity zone are transmitted using STC coding. Finally, if AAS is used, a portion of the DL subframe can be designated as the AAS zone. Within this part of the subframe, AAS is used to communicate to AAS-capable SSs. AAS is also supported in the UL.

WirelessMAN-OFDMA This variant uses orthogonal frequency division multiple access (OFDMA) with a 2048-point transform. In this system, addressing a subset of the multiple carriers to individual receivers provides multiple access. Because of the propagation requirements, the use of AASs is supported.

The WirelessMAN-OFDMA PHY is based on OFDM modulation. It supports subchannelization in both the UL and DL. The standard supports five different subchannelization schemes. The OFDMA PHY supports both TDD and FDD operations. The same modulation levels are also supported. STC and AAS with SDMA are supported, as is multiple input, multiple output (MIMO). MIMO encompasses a number of techniques for utilizing multiple antennas at the BS and SS in order to increase the capacity and range of the channel.

The frame structure in the OFDMA PHY is similar to the structure of the OFDM PHY. The notable exceptions are that subchannelization is defined in the DL as well as in the UL, so broadcast messages are sometimes transmitted at the same time (on different subchannels) as data. Also, because a number of different subchan-nelization schemes are defined, the frame is divided into a number of zones that each use a different subchannelization scheme. The MAC layer is responsible for dividing the frame into zones and communicating this structure to the SSs in the DL-MAP and UL-MAP. As in the OFDM PHY, there are optional transmit diversity and AAS zones, as well as a MIMO zone.

Wireless High Speed Unlicensed Metro Area Network (WirelessHUMAN) WirelessHUMAN is similar to the aforementioned OFDM-based schemes and is focused on Unlicensed National Information Infrastructure (UNII) devices and other unlicensed bands.

Saturday, December 5, 2009

The Function of the PHY - WiMAX

As the name might imply, the purpose of the PHY is the physical transport of data. The following paragraphs will describe different methods to ensure the most efficient delivery in terms of bandwidth (volume and time in Mbps) and frequency spectrum (MHz/GHz). A number of legacy technologies are used to get the maximum performance out of the PHY. These technologies, including OFDM, TDD, FDD, QAM, and Adaptive Antenna System (AAS), will be described in the following pages or chapters.

OFDM: The "Big So What?!" of WiMAX

OFDM is what puts the max in WiMAX. OFDM is not new. Bell Labs originally patented it in 1970, and it became incorporated in various digital subscriber line (DSL) technologies as well as in 802.11a. OFDM is based on a mathematical process called Fast Fourier Transform (FFT), which enables 52 channels to overlap without losing their individual characteristics (orthogonality). This is a more efficient use of the spectrum and enables the channels to be processed at the receiver more efficiently. OFDM is especially popular in wireless applications because of its resistance to forms of interference and degradation. In short, OFDM delivers a wireless signal much farther with less interference than competing technologies. Figure 1 provides an illustration of how OFDM works.

Figure 1: The significance of OFDM: A focused beam delivering maximum bandwidth over maximum distance with minimum interference

TDD and FDD

WiMAX supports both time division duplex (TDD) and frequency division duplex (FDD) operation. TDD is a technique in which the system transmits and receives within the same frequency channel, assigning time slices for transmit and receive modes. FDD requires two separate frequencies generally separated by 50 to 100 MHz within the operating band. TDD provides an advantage where a regulator allocates the spectrum in an adjacent block. With TDD, band separation is not needed, as is shown in Figure 2. Thus, the entire spectrum allocation is used efficiently both upstream and downstream and where traffic patterns are variable or asymmetrical.

Figure 2: A TDD subframe

In FDD systems, the downlink (DL) and uplink (UL) frame structures are similar except that the DL and UL are transmitted on separate channels. When half-duplex FDD (H-FDD) subscriber stations (SSs) are present, the base station (BS) must ensure that it does not schedule an H-FDD SS to transmit and receive at the same time.

Figure 3 illustrates this relationship.

Figure 3: ULs and DLs between BSs and SSs

Adaptive Antenna System (AAS)

AAS is used in the WiMAX specification to describe beam-forming techniques where an array of antennas is used at the BS to increase gain to the intended SS while nulling out interference to and from other SSs and interference sources. AAS techniques can be used to enable Spatial Division Multiple Access (SDMA), so multiple SSs that are separated in space can receive and transmit on the same subchannel at the same time. By using beam forming, the BS is able to direct the desired signal to the different SSs and can distinguish between the signals of different SSs, even though they are operating on the same subchannel(s), as shown in Figure 4.

Figure 4: AAS uses beam forming to increase gain (energy) to the intended SS.

Wednesday, December 2, 2009

Certification Process | WiMAX Certifications

The WiMAX certification process is the steps, processes and tests which are performed to ensure that products will perform as desired and will reliably interoperate with other devices that are certified.

Testing for WiMAX products can be performed using testing conformance standards. The WiMAX test standards include a protocol implementation conformance statement (PICS), a test suite structure (TSS) and a radio conformance testing (RCT).

A protocol implementation conformance statement proforma is a document that is provided by a company or testing facility that states that the product or system provides and supports a specific set of commands and protocols. The 802.16 system has many capabilities and WiMAX devices typically are designed to support only a limited set of the protocols and capabilities.

A test suite structure (TSS) is a set of testing equipment configurations and procedures that are used to evaluate the operation and performance of products or systems. For the WiMAX system, the TSS performs operational testing of key functions of WiMAX devices including connecting radio links, authenticating, setting up, and changing services.

Radio conformance tests are a set of procedures that are used to evaluate the operation and performance of the radio part of wireless products or systems.

Related Posts with Thumbnails