You are on page 1of 51

Mobile Wimax Architecture

S.SARAVANAKARTHIKEYAN

Gemini Communication Ltd.


Innovation & Leadership

© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in


Wimax Network Specification
Normative use of Protocols and procedures to satisfy various
functions of working system based on existing IEEE and IETF
Standards

Protocols and Procedures defined over various interfaces for


different capabilities supported by the Network

A unified approach from which interoperable profiles can be


derived for basic interoperability for different usage modes and
service models

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Mobile Wimax Network Reference
Architecture

R2
R3
Interface between the MS and the (CSN) Connectivity Service
R1: Network
Interface associated
between with and the CSN to support AAA, Policy
the ASN
-Interface between
-Authentication
enforcement and (MS)Mobile
mobility station
management and the (ASN) as per the Air
capabilities
Interface
It also specification
-Service Authorization
encompasses the bearer plane to transfer IP data between the ASN
and-the
R1-May include
IP Host
CSN additionalmanagement
Configuration protocol related to the management
-Mobility Management Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Wimax Network Interfaces
R1
• Interface between (MS)Mobile station and the (ASN) as per the
Air Interface specification
• R1 May include additional protocol related to the management

R2
• Interface between the MS and the (CSN) Connectivity Service
Network associated with
• Authentication
• Service Authorization
• IP Host Configuration management
• Mobility Management.

This is a logical interface thus does not reflect a direct protocol


interface between MS and CSN

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Wimax Network Interfaces
R3
Interface between the ASN and the CSN to support AAA,
Policy enforcement and mobility management capabilities
It also encompasses the bearer plane to transfer IP data
between the ASN and the CSN

R4
Consists of a set of control plane and bearer plane
protocols originating/terminating in various entities within
the ASN that coordinates MS mobility between ASNs.

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Wimax Network Interfaces
R5

It consists of a set of Control plane and tunneling protocols


for internetworking between CSNs operated by either the
Home or Visited NSP.

R6
It consists of a set of control plane and bearer plane
protocols for communication between the BS and the ASN
GW. The bearer plane consists of Intra ASN data Path and
Inter ASN tunnels between the BS and ASN GW.

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Wimax Network Interfaces

R8

It Consists of a set of Control Plane message flows and,


in some situations , bearer plane data flows between the
BS to ensure fast and seamless handover

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Key Architecture Features
All IP Radio Access and core Network

Support for all usage Models

Access to incumbent core networks via internetworking function.

Open interfaces both with in the RAN and between the RAN and
the Core Network.

Support for Voice, data and multimedia services with appropriate


QoS
Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Key Network Features

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Network Nodes

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
ASN – Access Service Network

Multiple ASN Profiles have been specified in Wimax as


a Tool to manage diversity in ASN node usage and
implementation.

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Access Service Network –
Profile A
Centralized ASN Model with BS and ASN GW in separate
platform through R6 interface.
Spilt RRM : RRA in BS and RRC in ASN GW.
Open interface Profile A: R1 , R6 , R4 and R3

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Access Service Network –
Profile B
Distributed ASN solution with the BS and the ASN GW functionalities
implemented in a single platform.
Open interface Profile B:- R4 and R3

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Access Service Network –
Profile C
Similar to Profile A , Except for RRM being non split and located in BS.

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Connectivity Service Network

Connectivity to the Internet, ASPs

Authentication , Authorization and Accounting

IP Management

Mobility and Roaming between ASN’s

Policy and QoS Management based on a SLA

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
CSN Functions

IP address allocation to the MS for user sessions


AAA proxy or server for User, device and services
authentication, authorization and accounting
Policy and QoS management based on the SLA
Subscribers billing

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
CSN Functions

Inter – CSN tunneling to support roaming between


NSP’s
Inter – ASN mobility management and mobile IP home
agent functionality
Connectivity Infrastructure and policy control

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
HAND OVER PROCESS
Hand over process consists of six different stages

Cell Reselection
Handover decision
Handover Initiation
Synchronization
Termination of Services
Handover cancellation

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Cell Reselection

MS acquires info about the BS in the Network and evaluate


the Possibility to perform handover

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Handover decision and Initiation

The initiation of a handover is the decision to migrate the


MS from the serving BS to Target BS

Handover request will trigger a sequence of Handover


specific message to be sent in-between MS and BS

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Synchronization

To Establish Communication with the target BS, the MS


need to synchronize to its D/L Channel

During this Period the MS Rx Downlink and Uplink TX


Parameters
• Time offset and Power level

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Termination

Termination of services at the serving BS is the last step in


the Handover process

The serving BS will terminate all the associated MS

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Handover Cancellation

During the Handover the MS has the right to cancel the


handover and resume normal communication with the
serving BS

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Types of Hand over

Soft Handover

During the Soft Handover the MS will listen and transmit to all the BS
by sending PDUs to the MS and they all listen to the MS transmission

Fast BS Switching

In Fast Switching the MS will listen and transmit to only one BS with in
the active set of BS’s

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Type of Handover Cont…

In both the Handover the MS will maintain a list of BS’s


that are involved in the Handover

All the BS’s in the active set need to be synchronized to


each other to be able to support handover and fast BS
switching

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Ranging

Ranging is an uplink physical layer procedure that


maintains the quality and reliability of the radio link
communication between the MS and the BS

When it receive the ranging transmission from MS, the BS


processes the received signal to estimate various radio link
parameters

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Quality of Service
The Different types of QoS Supported in Mobile Wimax are

UGS

Rtps

Nrtps

Ertps

BE

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
UGS : Unsolicited grant services

• This is designed to support fixed-size data packets at a constant bit rate (CBR)
• Examples of applications that may use this service are T1/E1 emulation and VoIP
without silence suppression

• The mandatory service flow parameters that define this service are maximum
sustained
• Traffic rate
• Maximum latency
• Tolerated jitter
• Request/transmission policy.

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Real-time polling services
(rtPS)

This service is designed to support real-time service flows,


such as MPEG video, that generate variable-size data
packets on a periodic basis

The mandatory service flow parameters that define this


service are minimum reserved traffic rate, maximum
sustained traffic rate, maximum latency, and
request/transmission policy.

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Non-real-time polling service
(nrtPS)
This service is designed to support delay-tolerant data streams,
such as an FTP, that require variable-size data grants at a
minimum guaranteed rate

The mandatory service flow parameters to define this service are


minimum reserved traffic rate, maximum sustained traffic rate,
traffic priority, and request/transmission policy

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Extended real-time variable
rate service - (ERT-VR)
This service is designed to support real-time applications,
such as VoIP with silence suppression, that have variable
data rates but require guaranteed data rate and delay

This service is defined only in IEEE 802.16e- 2005, not in


IEEE 802.16-2004. This is also referred to as extended
real-time polling service (ErtPS)

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Best-effort (BE) service:
This service is designed to support data streams, such as Web
browsing, that do not require a minimum service-level
guarantee

The mandatory service flow parameters to define this service


are maximum sustained traffic rate, traffic priority, and
request/transmission policy

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Service flow supported in Mobile Wimax

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Mobility Support in Mobile
Wimax
In addition to fixed Wimax , Mobile Wimax envision four mobility
related usage scenarios

Nomadic

The user is allowed to take a fixed subscriber station and reconnect


from different point

Portable

Nomadic access is provided to portable devices, such as PCI card ,


USB dongle , with expectation of best effort handover
Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Mobility Support in Mobile
Wimax
Simple Mobility

The Subscribers may move at a speed up to 60Kmph with brief


interruptions during handoff

Full Mobility

Up to 120 Kmph mobility and seamless handoff is supported

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Security Functions in Mobile
Wimax
Unlike Wi-Fi, Wimax systems were designed at the outset
with robust security

The Standard includes state of art for ensuring user data


privacy and preventing unauthorized access, with additional
protocol optimization for mobility

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Security Functions in Mobile
Wimax Cont…
The Key aspects of Mobile Wimax security are as follows,

Support for privacy

• The user data is encrypted using cryptographic


schemes of proven robustness to provide privacy

Both AES and 3DES are supported in Mobile Wimax

Most system implementation will likely use AES

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Security Functions in Mobile Wimax
Cont…

Device / User authentication

• Mobile Wimax provides flexible means for authenticating


subscriber stations and users to prevent from unauthorized use

• The authentication is based on the IETF, which supports a variety


credentials
• Username/password
• Digital certificates

• Smart cards

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Security Functions in Mobile
Wimax Cont…

Flexible and key Management protocol

• The privacy and key management protocol version 2


(PKMPv2) is used for securely transferring keying
material from BS to the MS

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Performance Enhancement in
Mobile Wimax
The Mobile Wimax defines the number of optional advance
features to improve the performance, such as
• Multiple antenna techniques
• Hybrid ARQ
• Enhanced frequency reuse

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Performance Enhancement in Mobile
Wimax Cont…
AAS – Advanced Antenna System :

This solution improves the system performance

Significant gains in overall capacity and in spectral efficiency

AAS includes support for variety of multiantenna solutions


• Transmit diversity
• Beamforming
• Spatial multiplexing

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Performance Enhancement in
Mobile Wimax Cont…
Transmit Diversity

• It defines number of space-time block coding schemes


• Space – time block coding can be used to provide
transmit diversity in the D/L

• There would be two or more Tx antennas and one or


more Rx antennas

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Performance Enhancement in Mobile
Wimax Cont…
Beamforming

• Multiple antenna in Wimax may be used to transmit


the same signal to focus the transmitted beam in the
same direction of the receiver and away from the
interference, This improves

• CINR
• Coverage Range
• Capacity
• Reliability
Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Performance Enhancement in
Mobile Wimax Cont…
Spatial Multiplexing

• Wimax also supports Spatial Multiplexing, where multiple


independent streams are transmitted across multiple
Antennas
• Multiple antennas are used in this case to increase the data
rate or capacity of the system
• In rich Multipath environment, the capacity of the system
can be increased linearly with the number of antennas
when performing spatial multiplexing

A 2x2 MIMO system doubles the peak throughput capability of


Wimax
Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Mobility Management
Architecture
Minimize Packet loss and handover latency.
Maintain packet ordering to support seamless handover at
vehicular speeds.
Supports macro diversity handover and fast base station
switching.
Minimize signaling to execute handover.
Accommodate multiple IP address and simultaneous
connections.

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Mobile WiMAX Beamforming Innovation
Beamforming uses antenna array and signal processing techniques to
maximize signal strength for subscriber devices
No Beamforming
 Energy is dispersed across an entire
90° or 120° sector
Sector  Gain decreases quickly with
Antenna
0 dB
distance, degrading performance
 Limited coverage. Cells must be
tightly spaced for good performance
 Inter-cell interference adversely
affects frequency reuse
 Array is recalibrated every 5ms,
Beamforming Implementation energy is focused at individual
subscribers
+9 dB
 Gain remains high over long
distances, improving performance
 Expanded Coverage. Cells can be
+18 dB widely spaced while providing good
performance
8-Element 120°  Inter-cell interference is minimized,
Beamforming Array
Ver 01 allowing maximum frequency reuse
© Gemini Communication – Company Confidential Ver 1.0 081010_Cisco_Connected_Life.pptwww.gcl.in
MIMO vs (Beamforming + MIMO)
Summary Animation
MIMO-only Beamforming + MIMO

Closer data packets indicating Larger Screen due Less MIMO-B beam overlap = Stronger green halo Greater
higher order modulation= to higher data less noise, more de- reflecting stronger coverage
higher data rates rates correlation, higher data rate signal even behind perimeter
buildings

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 081010_Cisco_Connected_Life.pptwww.gcl.in
Tunneling in Mobile Wimax
IP datagram to the mobile node are tunneled from the
home agent to the foreign Agent
The 802.16 convergence sub layer (CS) provides tunneling
over the Air
Tunnels are Identified by the CID
Assignment of CID’s is performed in the BS/MS
CIDs are used for differentiating QoS

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Ethernet & VLAN in Mobile
Wimax
Ethernet services may be mainly based on stationary
deployment model of NRM
The CSN deploys a bridge for forwarding the user traffic
• L2 instead of L3

AAA/PF ( Policy Function) support needed for dynamic


estabilshment,configuration and accounting of Ethernet
services inside Mobile WiMAX network

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Network Entry Process

Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in
Thank You
Contact : sk@gcl.in
51
Ver 01
© Gemini Communication – Company Confidential Ver 1.0 www.gcl.in

You might also like