Thursday, August 1, 2019

Data-Plane and Control-Plane Functions in Relay Stations


Multi-hop relay is an optional entity that may be deployed in conjunction with base stations to provide additional coverage or performance improvements in a radio access network. In relay-enabled networks, the BS may be replaced by a multi-hop relay BS (i.e., a BS that supports relay capability over the relay links) and one or more relay stations (RS). The traffic and signaling between the mobile station and relay-enabled BS are relayed by the RS, thus extending the coverage and performance of the system in areas where the relay stations are deployed. Each RS is under the control of a relay-enabled BS. 

In a multi-hop relay system, the traffic and signaling between an access RS and the BS may also be relayed through intermediate relay stations. The RS may either be fixed in location or it may be mobile. The mobile station may also communicate directly with the serving BS. The various relay-enabled BS features defined in the IEEE 802.16j-2009 standard allow a multi-hop relay system to be configured in several modes. The air interface protocols, including the mobility features on the access link (i.e., RS-MS link), remain unchanged.

The IEEE 802.16j-2009 standard specified a set of new functionalities on the relay link to support the RS–BS communication. Two different modes; i.e., centralized and distributed scheduling modes, were specified for controlling the allocation of bandwidths for an MS or an RS. In centralized scheduling mode the bandwidth allocation for subordinate mobile stations of an RS is determined at the serving BS. On the other hand, in distributed scheduling mode the bandwidth allocation of the subordinate stations is determined by the RS, in cooperation with the BS. Two different types of RS are defined, namely transparent and non-transparent. A non-transparent RS can operate in both centralized and distributed scheduling mode, while a transparent RS can only operate in centralized scheduling mode. A transparent RS communicates with the base station and subordinate mobile stations using the same carrier frequency. A non-transparent RS may communicate with the base station and the subordinate mobile stations via the same or different carrier frequencies. 

Relaying in the IEEE 802.16m system is performed using a decode-and-forward paradigm and supports TDD and FDD duplex modes. In TDD deployments, the relay stations operate in time-division transmit and receive (TTR) mode,xii whereby the access and relay link communications are multiplexed using time division multiplexing over a single RF carrier. In the IEEE 802.16m system, the relay stations operate in non-transparent mode, which essentially means that the relay stations compose and transmit the synchronization channels, system information, and the control channels for the subordinate stations. In any IEEE 802.16m deployment supporting relay functionality, a distributed scheduling model is used where each infrastructure station (BS or RS) schedules the radio resources on its subordinate links. In the case of a relay station, the scheduling of the resources is within the radio resources assigned by the BS. The BS notifies the relay and mobile stations of the frame structure configuration. The radio frame is divided into access and relay zones. In the access zone, the BS and the RS transmit to, or receive from, the mobile stations. In the relay zone, the BS transmits to the relay and the mobile stations, or receives from the relay and mobile stations. The start times of the frame structures of the BS and relay stations are aligned in time. The BS and relay stations transmit synchronization channels, system information, and the control channels to the mobile stations at the same time.

The MAC layer of a relay station includes signaling extensions to support functions such as network entry of an RS and of an MS through an RS, bandwidth request, forwarding of PDUs, connection management, and handover. Two different security modes are defined in the IEEE 802.16j-2009 standard: (1) a centralized security mode that is based on key management between the BS and an MS; and (2) a distributed security mode which incorporates authentication and key management between the BS and a non-transparent access RS, and between the access-RS and an MS. An RS may be configured to operate either in normal CID allocation mode, where the primary management, secondary, and basic CIDs are allocated by the BS, or in local CID allocation mode where the primary management and basic CID are allocated by the RS. 

The IEEE 802.16m RS uses the same security architecture and procedures as an MS to establish privacy, authentication, and confidentiality between itself and the BS on the relay link. The IEEE 802.16m relay stations use a distributed security model. The security association is established between an MS and an RS during the key exchange similar to a macro BS. The RS uses a set of active keys shared with the MS to perform encryption/decryption and integrity protection on the access link. The RS runs a secure encapsulation protocol with the BS based on the primary security association. The access RS uses a set of active keys shared with the BS to perform encryption/decryption and integrity protection on the relay link. The MAC PDUs are encapsulated within one relay MAC PDU and are encrypted or decrypted by primary security association, which is established between the RS and the BS. The security contexts used for the relay link (between a BS and an RS) and the access links (between an RS and an MS) are different and are maintained independently. The key management is the same as that performed by a macro BS.




Monday, July 29, 2019

Data-Plane and Control-Plane Functions in Base Stations and Mobile Stations


Figure below shows the user data processing path at the BS and MS. As shown in the figure, the user data traverses the path from network layer to physical layer and vice versa. In the transmitter side, a network layer packet is processed by the convergence sub-layer, the ARQ function (if enabled), the fragmentation/packing function, and the MAC PDU formation function, to form the MAC PDU to be sent to the physical layer for processing. In the receiver side, a physical layer SDU is processed by MAC PDU formation function, the fragmentation/packing function, the ARQ function (if enabled), and the convergence sub-layer function, to form the network layer packets. The control primitives between the MAC CPS functions and between the MAC CPS and PHY that are related to the processing of user traffic data are also shown below


Signal flow graph in data- and control-planes

The control-plane signaling and processing flow graph at the BS and the MS. In the transmitter side, the flow of control primitives from control-plane functions to data-plane functions and processing of control-plane signals by data-plane functions in order to construct MAC management messages and MAC header/sub-headers, to be transmitted over the air interface, are illustrated. In the receiver side, the arrows show the processing of the MAC control messages through data-plane functions and the reception of the corresponding control-plane signals by control-plane functions. The dotted arrows show the control primitives between MAC CPS functions and between MAC CPS and physical layer functions that are related to the processing of control-plane signaling. The control primitives to/from M-SAP/C-SAP define the network related functionalities, such as inter-BS interference management, inter/intra RAT mobility management, etc., as well as management-related functionalities, such as location management, system configuration, etc. 


Thursday, July 25, 2019

The IEEE 802.16m Protocol Structure


In this section, we further examine the functional elements of each protocol layer and their interactions. The 802.16m MAC common part sub-layer functions are classified into radio resource control and management functional group and medium access control functional group. The control-plane functions and data-plane functions are also separately classified. This would allow more organized, efficient, and structured method for specifying the MAC services in the IEEE 802.16m standard specification. The radio resource control and management functional group comprises several functional blocks including:  

• Radio resource management block adjusts radio network parameters related to the traffic load, and also includes the functions of load control (load balancing), admission control, and interference control; 

• Mobility management block scans neighbor BSs and decides whether MS should perform handover operation; 

• Network-entry management block controls initialization and access procedures and generates management messages during initialization and access procedures; 

• Location management block supports location based service (LBS), generates messages including the LBS information, and manages location update operation during idle mode; 

• Idle mode management block controls idle mode operation, and generates the paging advertisement message based on paging message from paging controller in the core network; 

• Security management block performs key management for secure communication. Using managed key, traffic encryption/decryption and authentication are performed; 

• System configuration management block manages system configuration parameters, and generates broadcast control messages such as superframe headers; 

• Multicast and broadcast service (MBS) block controls and generates management messages and data associated with MBS; 

• Service flow and connection management block allocates Station Identifier (STID) and Flow Identifiers (FIDs) during access/handover service flow creation procedures. 


Monday, July 22, 2019

The MS and BS Interface


The MAC management PDUs that are exchanged over the primary management connectioniii can trigger, or are triggered by, primitives that are exchanged over either the C-SAP or the M-SAP, depending on the particular management or control operation. The messages that are exchanged over the secondary management connection can trigger or are triggered by primitives that are exchanged over the M-SAP. This interface is a set of SAP between an IEEE 802.16 entity and NCMS as shown in Figure below. 

It consists of two parts: the M-SAP is used for delay-tolerant management-plane primitives; and the C-SAP is used for delay-sensitive control-plane primitives that support handovers, security context management, radio resource management, and low power operations such as idle mode and paging functions.




Friday, July 19, 2019

The IEEE 802.16m Reference Model


Figure below illustrates the IEEE 802.16 reference model. The data link layer of IEEE 802.16 standard comprises three sub-layers. The service-specific convergence sub-layer (CS) provides any transformation or mapping of network-layer data packets into MAC SDUs. On the transmitter side, the CS receives the data packets through the CS Service Access Point (SAP) and delivers MAC SDUs to the MAC Common Part Sub-layer (MAC CPS) through the MAC SAP. This includes classifying network-layer SDUs and associating them with the proper MAC Service Flow Identifiers (SFID) and Connection Identifiers (CID). The convergence sub-layer also includes payload header suppression function to compress the higher-layer protocol headers. Multiple CS specifications are provided for interfacing with various network-layer protocols such as Asynchronous Transfer Mode (ATM)i and packet-switched protocols such as IP or Ethernet. The internal format of the CS payload is unique to the CS, and the MAC CPS is not required to understand the format of or parse any information from the CS payload.  


The IEEE 802.16 reference model

The MAC CPS provides the core MAC functionality of system access, bandwidth allocation, connection establishment, and connection maintenance. It can receive data from the various convergence sub-layers, through the MAC SAP classified into particular MAC connections. An example of MAC CPS service definition is given in reference. The Quality of Service (QoS) is further applied to the transmission and scheduling of data over the physical layer. 

The MAC also contains a separate security sub-layer providing authentication, secure key exchange, and encryption. The user data, physical layer control, and statistics are transferred between the MAC CPS and the Physical Layer (PHY) via the PHY SAP which is implementation-specific. The IEEE 802.16 physical layer protocols include multiple specifications, defined through several amendments and revisions, each appropriate for a particular frequency range and application.

The IEEE 802.16 compliant devices include mobile stations or base stations. Given that the IEEE 802.16 devices may be part of a larger network, and therefore would require interfacing with entities for management and control purposes, a Network Control and Management System (NCMS) abstraction has been introduced in the IEEE 802.16 standard as a “black box” containing these entities. The NCMS abstraction allows the physical and MAC layers specified in the IEEE 802.16 standard to be independent of the network architecture, the transport network, and the protocols used in the backhaul, and therefore would allow greater flexibility. The NCMS entity logically exists at both BS and MS sides of the radio interface. Any necessary inter-BS coordination is coordinated through the NCMS entity at the BS. An IEEE 802.16 entity is defined as a logical entity in an MS or BS that comprises the physical and MAC layers on the data, control, and management planes.

The IEEE 802.16f amendment (currently part of IEEE 802.16-2009 standard) provided enhancements to IEEE 802.16-2004 standard, defining a management information base (MIB), for the physical and medium access control layers and the associated management procedures. The management information base originates from the Open Systems Interconnection Network Management Model and is a type of hierarchical database used to manage the devices in a communication network. It comprises a collection of objects in a virtual database used to manage entities such as routers and switches in a network.

The IEEE 802.16 standard describes the use of a Simple Network Management Protocol (SNMP),ii i.e., an IETF protocol suite, as the network management reference model. The standard consists of a Network Management System (NMS), managed nodes, and a service flow database. The BS and MS managed nodes collect and store the managed objects in the form of WirelessMAN Interface MIB and Device MIB that are made available to network management system via management protocols, such as SNMP. A Network Control System contains the service flow and the associated Quality of Service information that have to be provided to BS when an MS enters into the network. The Control SAP (C-SAP) and Management SAP (M-SAP) interface the control and management plane functions with the upper layers. The NCMS entity presents within each MS. The NCMS is a layer-independent entity that may be viewed as a management entity or control entity. Generic system management entities can perform functions through NCMS and standard management protocols can be implemented in the NCMS. If the secondary management connection does not exist, the SNMP messages, or other management protocol messages, may go through another interface in the customer premise or on a transport connection over the air interface. Figure 3-4 describes a simplified network reference model. Multiple mobile stations may be attached to a BS. The MS communicates to the BS over the air interface using a primary management connection, basic connection or a secondary management connection. The latter connection types have been replaced with new connection types in IEEE 802.16m standard




Wednesday, July 17, 2019

CSN-anchored Mobility


The CSN-anchored mobility refers to mobility across different ASNs alternatively to mobility across different IP subnets, and thereby requires network layer mobility management. The mobile IP protocols are used to manage mobility across IP subnets, and to enable CSN-anchored mobility. This section describes mobile IP based macro-mobility between the ASN and CSN across R3 reference point. In the case of IPv4, this implies re-anchoring of the current FA to a new FA, and the consequent binding updates (or MIP re-registration) to update the upstream and downstream data forwarding paths. In CSN-anchored mobility, the anchor mobile IP FA of the MS is changed. The new FA and CSN exchange messages to establish a data forwarding path. The CSN-anchored mobility management is established between ASN and CSN that are in the same or different administrative domains. The mobility management may further extend to handovers across ASNs in the same administrative domain. The procedures for CSN-anchored mobility management and the change of MS point of attachment to the ASN may not be synchronized. In this case, the procedures may be delayed relative to the completion of link layer handover by the MS. 

In an intra-NAP R3 mobility scenario, an MS is moving between FAs within a single NAP domain. The R3 mobility event results in a handover between two FAs, thereby relocating the ASN R3 reference anchor point in the NAP. Note that R3 mobility does not automatically terminate or otherwise interfere with idle/sleep operation of the MS. The CSN-anchored mobility accommodates the scenario in which the MS remains in idle state or sleep mode until it is ready to transmit uplink traffic or is notified of downlink traffic by the serving BS. In all non-roaming scenarios, the HA is located in the CSN of H-NSP. For roaming scenarios, the HA is located in the CSN of either the H-NSP or V-NSP, depending on roaming agreement between H-NSP and V-NSP, user subscription profile and policy in H-NSP. The CSN-anchored mobility within a single NAP administrative domain does not introduce significant latency and packet loss. A make-before-break handover operation (i.e., when a data path is established between the MS and target BS before the data path with the serving BS is broken) is feasible within the same NAP administrative domain. To accomplish this procedure, the previous anchor FA maintains data flow continuity while signaling to establish the data path to a new anchor FA. The PMIP procedures do not require additional signaling over-the-air or additional data headers to perform CSN-anchored mobility. The CSN-anchored mobility activities are transparent to the MS. The MS uses Dynamic Host Configuration Protocol (DHCP) for IP address assignment and host configuration. DHCP is a network application protocol used by devices to obtain configuration information for operation in an IP network. This protocol reduces system administration workload, allowing devices to be added to the network with minimal user intervention 


Sunday, July 14, 2019

WIMAX Mobility Management


The WiMAX network architecture supports two types of mobility: ASN-anchored mobility (intra-ASN) and CSN-anchored mobility. ASN-anchored mobility refers to a scenario where a mobile terminal moves between two base stations belonging to the same ASN while maintaining the same foreign agent at the ASN. The handover in this case utilizes R6 and R8 reference points. The CSN-anchored mobility refers to an inter-ASN mobility scenario where the mobile station moves to a new anchor foreign agent and the new FA and CSN exchange signaling messages to establish data forwarding paths. The handover in this case is performed via R3 reference point with tunneling over R4 to transfer undelivered packets. 

Figure below illustrates three different mobility scenarios supported in WiMAX networks. When the mobile station moves from positions 1 to 2, or 1 to 3, an ASN-anchored mobility through R8 or R6 reference points, respectively, is implied, whereas moving from position 1 to 4 involves a CSN-anchored mobility scheme though R3 reference point.



Thursday, July 11, 2019

WIMAX Radio Resource Management (RRM)


Efficient utilization of radio resources within an access network is performed by the radio resource management entity. The mobile WiMAX RRM is based on a generic architecture. The RRM defines mechanisms and procedures to share radio resource related information between BS and ASN-GW. The RRM procedures allow different BSs to communicate with each other or with a centralized RRM entity residing in the same or a different ASN to exchange information related to measurement and management of radio resources. Each BS performs radio resource measurement locally based on a distributed RRM mechanism. It is also possible to deploy RRM in an ASN using base stations with RRM function, as well as a centralized RRM entity that does not reside in the BS and collects and updates radio resource indicators such as choice of target BS, admission or rejection of service flows, etc., from several BSs. The RRM procedures facilitate the following WiMAX network functions: 

• MS admission control and connection admission control, i.e., whether the required radio resources are available at a candidate target BS prior to handover; 

• Service flow admission control, i.e., creation or modification of existing/additional service flows for an existing MS in the network, selection of values for admitted and active QoS parameter sets for service flows; 

• Load balancing by managing and monitoring system load and use of counter-measures to enable the system back to normal loading condition; 

• Handover preparation and control for improvement/maintenance of overall performance indicators (for example, the RRM may assist in system load balancing by facilitating selection of the most suitable BS during a handover).  

The RRM is composed of two functional entities, i.e., radio resource agent (RRA) and radio resource control (RRC). The radio resource agent is a functional entity that resides in the BS. Each BS includes a radio resource agent. It maintains a database of collected radio resource indicators. An RRA entity is responsible for assisting local radio resource management, as well as communicating to the RRC to collect and measure radio resource indicators from the BS and from a plurality of mobile terminals served by the BS using MAC management procedures as specified by the IEEE 802.16 specifications. It also communicates RRM control information over the air interface to the MS, as defined by the IEEE 802.16 specifications. An example of such RRM control information is a list of neighbor BSs and their parameters. It further performs signaling with RRC for radio resource management functions, as well as controlling the radio resources of the serving BS, based on the local measurements and reports received by the BS and information received from the RRC functional entity. 

The local resource control includes power control, monitoring the MAC and PHY functions, modifying the contents of the neighbor advertisement message, assisting the local service flow management function and policy management for service flow admission control, making determinations and conducting actions based on radio resource policy, assisting the local handover functions. 

The radio resource control functional entity may reside in BS, in ASN-GW, or as a standalone server in an ASN, and is responsible for collection of radio resource indicators from associated RRAs. The RRC can be collocated with RRA in the BS. The RRC functional entity may communicate with other RRCs in neighboring BSs which may be in the same or different ASN. The RRC may also reside in the ASN-GW and communicate to other RRAs across R6 reference point. When the RRC is located in the ASN, each RRA is associated with exactly one RRC. The RRC relay functional entity may reside in ASN-GW for the purpose of relaying RRM messages. The RRC relay cannot terminate RRM messages, but only relays them to the final destination RRC. Standard RRM procedures are required between RRA and RRC, and between RRCs across network interfaces to ensure interoperability. These procedures are classified into two types: information reporting procedures for delivery of BS radio resource indicators from RRA to RRC; and between RRCs and decision support procedures from RRC to RRA for communicating recommendations on aggregated RRM status (e.g., in neighboring BSs) for various purposes. 

The RRM primitives can be used either to report radio resource indicators (i.e., from RRA to RRC or between RRCs) or to communicate decisions from RRC to RRA. The former type of primitive is called information reporting primitive and the latter is called decision support primitive. The available radio resource information provided by the RRAs to RRC is used by RRC for load balancing. The RRC may interact with the handover controller to ensure load balance. 





Monday, July 8, 2019

WIMAX Authentication, Authorization, and Accounting (AAA)


AAA refers to a framework based on IETF protocols, Remote Authentication Dial-in User Service (RADIUS) or Diameter , which specify the procedures for authentication, authorization, and accounting associated with the user terminal’s subscribed services across different access technologies. As an example, AAA includes mechanisms for secure exchange and distribution of authentication credentials and session keys for data encryption. The AAA protocols provide the following services:  

• Authentication including device, user, or combined device and user authentication; 

• Authorization including delivery of information to configure the session for access, mobility, QoS, and other applications; 

• Accounting including delivery of billing information and other information that can be used to audit session activity by both the H-NSP and V-NSP. 

The AAA framework supports global roaming across operator networks, including support for reuse of credentials and consistent use of authorization and accounting. It further supports roaming between H-NSP and V-NSP. The AAA framework is based on use of RADIUS or Diameter in ASN and CSN. The AAA framework accommodates both Mobile IPv4  and Mobile IPv6  Security Association (SA) management. It further accommodates various network operation scenarios from fixed to full mobility. The AAA framework provides support for deploying MS authorization, user and mutual authentication between MS and the NSP, based on Privacy Key Management (PKMv2). In order to ensure interoperability, the AAA framework supports Extensible Authentication Protocol (EAP)-based authentication mechanisms that include passwords, Subscriber Identity Module, Universal Subscriber Identity Module, Universal Integrated Circuit Card, Removable User Identity Module, and X.509 digital certificates. The AAA framework is capable of providing the V-CSN or ASN with a temporary identifier that represents the user without revealing the user’s identity.

The NAP may deploy an AAA proxy between two NASs in ASN and the AAA in CSN in order to provide security and enhanced manageability. The AAA proxy will also allow the NAP to regulate the AAA attributes received from the visited CSN, and to add additional AAA attributes that may be required by the NASs in the ASN. Note that the CSN hosts the AAA server, whereas the ASN hosts one or more NASs. The PKMv2 protocol is used to perform over-the-air user authentication. The PKMv2 transfers EAP messages over R1 reference point (i.e., the IEEE 802.16-2009 air interface or its evolution) between the MS and the BS in ASN. 


Friday, July 5, 2019

Connectivity Service Network (CSN)


Connectivity Service Network is defined as a set of network functions that provide IP connectivity to user terminals. A CSN can provide the following functions:  

• MS IP address and endpoint parameter allocation for user sessions; 

• Internet access; 

• AAA proxy/server; 

• Policy and admission control based on user profiles; 

• ASN-CSN tunneling support; 

• Subscriber billing; 

• Inter-CSN tunneling for roaming; 

• Inter-ASN mobility management and mobile IP home agent functionality; 

• Network services such as connectivity for peer-to-peer services, provisioning, authorization and/or connectivity to IP multimedia services, and to enable lawful interception; 

• Connectivity to Internet and managed services such as IP Multimedia Subsystem (IMS),vi Location-Based Services (LBS),vii Multicast and Broadcast Services (MBS), etc.; 

• Over-the-air activation and provisioning of mobile WiMAX terminals.  The CSN may further comprise network elements such as routers, AAA proxy/servers, user databases, and interworking functions.



Wednesday, July 3, 2019

Access Service Network Gateway (ASN-GW)


The base stations within an ASN-GW group (i.e., all base stations connected to the same ASN-GW) are connected through R8 reference point. Furthermore, the base stations within an ASN-GW group are separately connected to the ASN-GW via R6 reference point, as shown. 



The base station is a logical entity that implements a full instance of Medium Access Control (MAC) and Physical Layer (PHY) protocols, as specified by the IEEE 802.16-2009 standard and includes one or more access functions. A BS instance represents one sector with one frequency assignment. It incorporates scheduler functions for uplink and downlink radio resources, which are typically vendor specific.

The ASN-GW is a logical entity that represents an aggregation of control functions that are either paired with a corresponding function in the ASN (e.g., BS instance), a resident function in the CSN, or a aggregation of control functions that are either paired with a corresponding function in the ASN (e.g., BS instance), a resident function in the CSN, or a function in another ASN. The ASN-GW may also perform bearer-plane routing or bridging functions. A BS is associated with a default ASN-GW; however, the ASN-GW functions may be distributed among multiple ASN-GWs located in one or more ASNs. 

The ASN functions in an ASN-GW can be divided into two groups, i.e., the Decision Point (DP) and the Enforcement Point (EP) functions. The EP category includes bearer-plane functions and the DP category includes non-bearer-plane functions. If such functional split is implemented in ASN-GW, the EP and DP functional groups would include bearer-plane and non-bearer-plane functions, respectively, and are interfaced using R7 reference point. 

Friday, June 21, 2019

4x4 Downlink MIMO and 256QAM


Increasing bandwidth with carrier aggregation is the first and most robust technique to achieve higher 4G data rates. The next option to achieve higher 4G data rates in the DL is to upgrade to 256QAM DL Modulation. Then, increase the number of spatial streams overlaying 4X4 MIMO on one or more of the CCs that have been aggregated.

4x4 MIMO effectively reuses the same 20MHz CC four times over to transmit more data. Thus, it is a more efficient use of spectrum. Some important considerations in 4x4 MIMO deployments include the following

  • ·       Only applies in the DL.

  • ·       Data rates increase by a factor of two for each CC it is applied compared to 2X2.

  • ·       Requires four unique data streams transmitted from a minimum of four unique antennas at the base station.

  • ·       Needs four corresponding unique receiver chains in the mobile device.


·       Effectiveness is gated by the ability to de-correlate the four separate antennas in the handset — if the antennas can talkbto each other (interference), then the benefit drops.

All this means more receiver components — such as filters, switches, low noise amplifiers (LNAs), and antenna control devices — are needed in the mobile front end. Because DL is onlyvassociated to the receiver side of the RF chain, transmit power amplifiers are not affected. 256QAM DL modulation has a 1.33x multiplier on the data rate of each CC. It requires no change to the RF front end in the mobile device.

The 4G “baby” is now approaching maturity. For example, an FDD network and mobile device can achieve a theoretical peak 4G DL data rate of 1Gbps using:

  • ·       3CC aggregating 3 x 20 MHz to create a 60 MHz “fat pipe”and achieve 450 Mbps

  • ·       4x4 DL MIMO applied to just two out of the three CCs, to achieve 750 Mbps

  • ·       256QAM DL modulation on all three CCs to achieve 1Gbps

  • ·       A modem that supports ten spatial layers


The path to achieve even higher 4G DL peak data rates (in the 1.6Gbps range) is gated by the availability of transceiver/modem chipsets that support additional spatial layers (2017 chipsets can typically support up to 12 spatial layers), and the ability of hand-sets to accommodate the RF front end for more than two bands  with four receivers.

Wednesday, June 19, 2019

The 4G and 5G HetNet


Remember all the talk about the HetNet, the heterogeneous network? I show it below is the HetNet using all licensed components, However, for the HetNet you can have unlicensed connections like Wi-Fi and LTE-U. It is the combination of many different types of BTS, from macro to mini to small cell to a hotspot.

The way that LTE is going to migrate into 5G is by using more and more different types of RF units and technologies. Many RF bands will be working together to give the end user a great quality of experience. The end user will not know that all of this is going on if it all works well. They will notice problems. The Quality of Service, QOS, will matter to some customer depending on what application they are running.

When the customer starts seeing problems, it is a Quality of Experience, QOE, issue. You want every user to have a great QOE because they will switch service if they don’t get it. However, it does matter what they are doing with their device.

Most users are very forgiving with data problems. They expect to have some downloading issues.

I bring this up here because switching of services will greatly affect the user experience. In an unlicensed spectrum, there is the potential for interference which will cause problems with the QOE because it won’t have a clear signal. For example, if you use your Wi-Fi at home, chances are good it works well in your house, right? How about when you use it in a public area where there are many hotspots? Then you see a serious degradation in service. They interfere with each other while the UE equipment will jump across hotspots.

So, the HetNet will be a bigger part of the future networks, but the carriers will need to smart about the handoff. They shouldn’t hand it off outside of the licensed network unless they have no choice. Today, there is a problem with overloading, so the carrier welcomes the unlicensed network. They want to see LTE-U because of the format and the improved efficiencies.

Sunday, June 16, 2019

Will 5G replace LTE?

No, LTE will be the foundation for the 5G network. LTE will get new terms, like 
LTE-Advanced, just like 4G will become 4.5G and 4.9G before 5G is released. You 
will see great increases in speed and LTE will become more and more advanced. It 
is quite impressive what the OEMs are doing. 

The HetNet will be an applicable term. Networks will handoff between so many 
different types of systems. However, I do believe that the 5G systems may be a type 
of LTE to hand off to each other properly. Remember that there will be multiple 
systems running simultaneously. They would need to have a seamless handoff for 
the best user experience. 

I will use an example. The carriers have truly adopted wi-fi because of the 
complexity of the shift from LTE to Wi-Fi, that is why the carriers are so excited 
about LTE-U. The see a viable way to make the best use of unlicensed spectrum. 
The Wi-Fi carriers don’t like it because they invested a lot of money into their 
license free Wi-Fi networks. 

The 5G systems will need to have a way to such seamless handoffs without 
dropping a call or a session.


Related Posts with Thumbnails