Professional Documents
Culture Documents
16:
A Technical Overview of the Mobile
WiMAX Air Interface and Beyond
Eyal Verbin
Contents
1.
2.
Physical Layer
3.
Overview of WiMAX
Convergence Sublayer
MAC PDU Construction and Transmission
Bandwidth Request and Allocation
ARQ
4.
Quality of Service
Scheduling
Adaptive Modulation and Coding
Security
Network Entry Procedures
Power saving Modes
Mobility Management
IEEE 802.16 was formed in 1998 to develop LOS point to multipoint for operation in the 10GHz
66GHz band
The original 802.16 standard was based on single carrier
Many of the MAC concepts were adopted from the cable modem DOCSIS
In December 2005 IEEE 802.16e-2005 was approved as a standard for mobile wireless system,
which forms the basis for Mobile WiMAX and adopts multi carrier technology
For practical reasons a smaller set of design choices (profiles) were selected
System profile defines the subset of mandatory and optional PHY and MAC features
WiMAX forum also defines higher layers networking specifications
WiMAX supports a number of modulation and channel coding schemes and allows the scheme to be
changed on a per user and per frame basis
FFT size may scale from 128 bit to 1024 bit FFT allowing channel bandwidths of 1.25MHz to
10MHz.
Typically, using 10MHz spectrum using TDD scheme with 3:1 DL/UL split, the peak PHY data rate is
about 25Mbps (DL) and 7Mbps (UL)
Scalable bandwidth
Auto retransmission requests (ARQ) are supported on top of physical layer error correction schemes
to enable reliable data transmission
Different users can be allocated with different subsets of the OFDM tones
Strong encryption using Advance Encryption Standard (AES) and flexible authentication architecture
based on Extensible Authentication Protocol (EAP)
Connection oriented architecture to support variety of applications, each with its own characteristics.
Robust security
Beamforming, space time coding and spatial multiplexing may be used to improve system capacity
and spectral efficiency
DL and UL resources and transmission schemes are controlled by the scheduler in the base station.
Secure seamless handover for full mobility applications and various power saving mechanisms
IP based architecture
Network architecture is based on an all IP platform. All end to end services are delivered over an IP
architecture
Part I
WiMAX Physical Layer
Fast Fading: different reflection arrive at the receiver with different phases. The
combined effect can be constructive or destructive, which causes very large
observed difference in amplitude of the receive signal
Different symbols arrive at different time to the receiver, resulting in Inter Symbol
Interference (ISI)
Multicarrier transmission
Subcarriers are orthogonal, so that guard bands between subcarriers is not required
Created using inverse discrete Fourier transform (IDFT)
Dividing high bit rate data stream into several parallel lower bit rate streams (subcarriers)
Minimize intersymbol interference (ISI) by making the symbol time substantial larger
than the channel delay spread
The duration of the guard interval is a tradeoff between the delay spread that can be
handled and the power loss associated with it.
Advantages
Drawbacks
High peak to average ratio that causes non linearities and clipping distortion
Channel Coding
From MAC
Randomizer
Channel
Encoder
Interleaver
Symbol
Mapping
Subcarrier
Mapping
and Pilot
Insertion
IFFT
D/A
Subcarrier
Mapping
and Pilot
Insertion
IFFT
D/A
Antenna #0
Space
Time
Encoder
Antenna #1
Channel Coding
Randomizer
Improves FEC performance and synchronization capabilities
Channel Encoder
Convolution Code (CC)
Repetition Code
Further increase signal margin over the modulation and FEC mechanisms
Applies only to QPSK modulation
Interleaver
Improves FEC performance by ensuring that adjacent coded bits are mapped onto non
adjacent subcarriers (frequency diversity) and that adjacent bits are alternately mapped
to less and more significant bits of modulation constellation
Symbol Mapping
QPSK
16QAM
64QAM (optional for UL)
Operates at the FEC block level and combines PHY and MAC (Hybrid)
The FEC encoder is responsible for generating HARQ sub packets.
The sub packets are combined by the receiver FEC decoder as part of the decoding process.
The receiver combines the newly received burst with the formerly received bursts to enhance decoding performance.
Based on 16 bit CRC, the receiver replies with an ACK if the sub packet decoding
In order delivery
Due to the N Stop and Wait scheme, out of order delivery of HARQ packets is possible.
Since some applications are sensitive to the delivery order, e.g. TCP, there is an option to
guarantee in order delivery by using PDU SN subheaders.
Symbol Structure
Frequency Domain
Representation
(e.g. 10MHz)
(e.g. 840 for 10MHz)
(e.g. 720 for 10MHz)
(e.g. 28/25 for 10MHz)
(1/8)
Data Rate
Spectral Efficiency
R Ndata bm cr / Ts
N databm cr n
R
Efficiency
BW (1 CP) N FFT
5
35Mbps 720 6 /102.9
6
Provides frequency diversity and inter cell interference averaging. Includes two
permutations:
Contiguous Permutation: Groups a block of contiguous subcarriers to form a
subchannel. Enables multi user diversity by choosing the subchannel with the best
frequency response.
In general, distributed permutation perform well in mobile applications, while
contiguous permutation are well suited for fixed or low mobility environments.
Clusters are mapped to six major groups as a function of Cell ID and DL Permutation Base
parameters
Logical subchannels are created from a permutation of cluster pairs such that each group is
made up of clusters that are distributed throughout the subcarriers space
Slot is one subchannel by two OFDM symbols. It contains 48 data subcarriers and eight pilot
subcarriers
1024 FFT
512 FFT
Guard subcarriers
183
91
Data subcarriers
720
360
Pilot subcarriers
120
60
14
14
Clusters
60
30
48
48
Subchannels
30
15
DC subcarriers
Parameter
1024 FFT
512 FFT
Guard subcarriers
183
103
Used subcarriers
840
408
Tiles
210
102
48
48
Subchannels
35
17
DC subcarriers
estimation.
Preamble subcarriers are boosted BPSK modulated with a specific PN code
To generate the preamble the PHY uses a series of 114 binary PN sequences. The
sequence to be used is determined by the segment number and the Cell ID. It is
mapped to every third subcarrier except the DC carrier.
Enables MS to obtain signal measurements and extract Cell ID for multiple co-
DL Subframe (1)
Multiplexing: OFDMA
Preamble
Used for time and frequency
DL Burst #12
DL Burst #2
DL Burst #9
DL MAP
(Contd)
DL Burst #1
(UL MAP)
DL Burst #10
DL MAP
DL Burst #13
DL Burst #3
DL Burst #11
DL Burst #14
Preamble
DL Burst #8
FCH
Frequency
Time
Not Allocated
DL Burst #15
DL Burst #16
DL Subframe (2)
DL MAP and UL MAP are broadcast
DL Burst #12
DL Burst #2
DL Burst #9
DL MAP
(Contd)
DL Burst #1
(UL MAP)
DL Burst #10
DL MAP
DL Burst #13
DL Burst #3
DL Burst #11
DL Burst #14
Preamble
Standard DL IE includes:
Connection Identifier (CID)
Downlink Interval Usage Code (DIUC), which
defines the MCS and the FEC used for the
burst
Repetition coding indication
Burst boundaries
DL Burst #8
FCH
Frequency
Time
Not Allocated
DL Burst #15
DL Burst #16
UL Subframe
Multiple Access: OFDMA
Time
No Preambles
Frequency
Standard UL IE includes:
3 Symbols
6 SC
Initial
Ranging/HO
Ranging
3 Symbols
Perio
dic
Rang
ing/
BWR
UL Burst #1
CQICH
6 SC
12 SC
ACK
UL Burst #2
UL Burst #3
Not Allocated
UL Ranging
Not Allocated
Noise Burst
Zone #1
Segmented PUSC
Zone #2
Un-Segmented PUSC
10 SC
F1
F2
F2
F1
F3
F3
F2
(1x3x3)
Segmentation
F3
F1
F1
F1
F1
F1
F1
F1
F1
F1
F1
(1x1x3)
F1
{Seg. 0}
F1
{Seg. 0}
F1
{Seg. 2}
F1
{Seg. 2}
F1
{Seg. 1}
F1
{Seg. 0}
F1
{Seg. 2}
(1x3x3)
F1
{Seg. 1}
F1
{Seg. 1}
Fractional Frequency Reuse (FFR): By exploiting the frequency time grid structure
of the OFDM frame it is possible to combine Reuse 1 and Reuse 3
FFR can be implemented in both time and frequency domain
Time domain FFR
Subframe is divided into two zones
R3 zone in which a single segment is allocated and subcarriers are boosted
by 5dB
R1 zone in which all subcarriers are allocated
The zones boundary is static across the whole coverage area
Users are allocated dynamically to one of the zones based on their CINR reports
Cell ID
DL Permutation Base
If R1 is used, DL Permutation Base should be set to a unique value among neighbors (range: 0..31)
UL Permutation Base
If R1 is used, UL Permutation Base should be set to a unique value among neighbors (range: 0..127)
If R1 is not used
UL Permutation Base for neighbor BS with the same FA should be set with an offset of 35 (e.g. 0, 35,
70, 115)
UL Permutation Base the three sectors in the same BS should be set to the same value (to maintain
orthogonality)
transmitter
Space Time Block Coding (STBC) Matrix A
Spatial Multiplexing Matrix B
Collaborative UL MIMO (CSM)
Diversity
Spatial Multiplexing
Beamforming
Ranging
IR codes
PR codes
BR codes
HO codes
Power control mechanisms are supported in the UL to maintain the quality of the
link. Basic requirements of the power control mechanism are:
MS maintains the same transmitted power spectral density (PSD), regardless of the
number of assigned subchannels. Therefore, transmission power level is proportionally
decrease or increased with the subchannel assignment without specific power control
messages
The requirements calls for a complex link adaptation algorithm that makes a
joint decision regarding MCS, resource allocation and power adjustment
MS reports available power headroom periodically and on a per demand basis
MS adjust its PSD independently, based on changes in the DL signal level according
the following formula
C/N: Carrier to noise for the burst profile in the current transmission
R: repetition rate
Offset SS per SS: Correction factor employed by the SS (set to zero for passive mode)
Closed loop power control may be combined with open loop as an outer mechanism,
using the Offset BS per SS parameter
Feedback can be carried over the Channel Quality Indication Channel (CQICH) in a special UL region
or over MAC control message
1.
2.
26/21
3.
4.
5.
6.
7.
8.
DL: 28.8Mbps
UL: 4Mbps
Part II
Medium Access Control Layer
MAC Functions
Segment or concatenate service data units (SDU) received from higher layers
Con #2
Con #n
MAC-CPS
Fragmentation
BW Request
ARQ
Manager
Scheduler
Link
Maintenance
AMC
Security
Data Encryption
PHY and RF
ACK
Feedback
PHY module
UL ACK channel
DL burst
Link Quality
Feedback
(e.g. CINR)
Ranging channel
CQICH channel
Radio
Resource
Control
802.3 (Ethernet)
802.1/Q VLAN
SDU
SAP
SAP
CID 1
CID 2
Classification
Reconstruction
(e.g. undo
text PHS)
text
CID n
{SDU, CID,...}
{SDU, CID,...}
SAP
SAP
WiMAX MAC is connection oriented. Each unidirectional logical connection between MS and BS is
identified by a Connection Identifier (CID). Connection can carry user plane data and control plane
information
CS performs many-to-one mapping between higher layer applications and a specific connection.
Applications with different QoS requirements are mapped to different connections.
The mapping is performed on the basis of the header fields of the higher layer protocol, e.g. VLAN,
IP source address.
Classification may be performed at the BS or at the ASN-GW
Repetitive portion of the packet header may be suppressed by the transmitter and restored by the
receiver
Improves efficiency of the network, especially for applications with small packet size (e.g. VoIP)
PHS rules at the transmitter and the receiver are synchronized during service flow initiation and
modification
PHS may be performed at the BS or at the ASN-GW
Robust Header Compression (ROHC) is an alternative to PHS, which is transparent to the MAC
operation. Defined by RFC 3095, ROHC compress the IP, UDP, RTP and TCP headers of IP packets
(can compress 60 bytes of overhead into 3 bytes)
Fragment 1
Header
Fragment 1
PDU 1
SDU 2
ARQ Block
Fragment 2
Header
10
11
Fragment 1
Fragment 2
PDU 2
DL/UL Burst
Fragment 1
12
13
14
15
16
17
Fragment 2
Header
Fragment 2
PDU 3
ARQ
For application sensitive to packet error (TCP), ARQ can be used on top of
The length of the ARQ blocks and the ARQ window size (number of blocks managed by the
transmitter and receiver at an given time) are set during connection establishment.
Once SDU is partitioned into ARQ blocks, the partition remains in effect until all the blocks have
been received and acknowledged by the receiver
ARQ enable connection are limited in throughput by Block Size x Window Size / ACK Latency
For ARQ enabled connection, fragmentation and packing subheader contains the
MSB
Generic MAC
Header
6 bytes
CRC
(Optional)
4 bytes
Generic MAC Header (GMH) is used for carrying user plane data and MAC
Type (6)
EKS
(2)
Rsv (1)
Rsv (1)
CI (1)
HT=0 (1)
control messages
LEN
MSB (3)
HCS (8)
per CID basis. BS schedules MAC PDUs based on the connection QoS requirements.
The allocation is indicated in the DL MAP.
MS requests UL BW in bytes on a per connection basis by using either stand alone
UL grants are done on a per MS basis and indicated in the UL MAP. MS UL scheduler
Multicast polling is based on contention mechanism, in which MS sends a randomly selected code in a
dedicated UL region.
Quality of Service
Each service flow is associated with QoS parameters: maximum traffic rate,
guaranteed traffic rate, maximum latency and Priority. MAC layer is responsible
to ensure QoS requirements subject to loading conditions.
Each service flow is mapped to a certain transport connection with its own QoS
Basic management connection: Used to transfer short, time-critical MAC and radio control messages
Primary management connection: Used to transfer longer, more delay-tolerant messages such as
authentication and connection setup
QoS Architecture
Data Packet
(SDU)
Classification
Classification
IP Protocol
Source/Dest IP Address
ToS
Source/Dest MAC Address
VLAN
Scheduler
Scheduler
Select PDU based on SF
attributes and subject to
available resources
Provisioned
SF defined in BS/MS
SFID assigned
Traffic disabled
Transient stage
CID assigned
Traffic disabled
Traffic enabled
Admitted
Active
Real time applications with variable rate, guaranteed rate and latency, e.g. VoIP with silence
suppression
Similar to UGS, but allows dynamic adaptation of grant size based on MS feedback
Scheduling Algorithms
The scheduler prioritizes the backlogged SDUs in the DL and the pending BWR in the UL.
Prioritization is done on a per SF basis based on the various attributes associated with the
service flow.
Scheduler target: Maximize system capacity subject to service requirements of each flow.
Scheduling procedure is outside the scope of the WiMAX standard and has been left to the
equipment manufacturers to implement. It has a profound impact on the overall capacity and
performance of the system, thus it serves as a key differentiator among vendors.
Classical scheduling algorithm
Strict Priority (SP)
SFi = argmax(iPi)
Proportional Fairness (PF)
SFi = argmin(iri /Ri)
Adaptive PFS takes into account link condition (spectral efficiency) in order to maximize
system capacity
APFS metric
SFi = argmin((1+wi)ri /Ri)
The weight i is inversely proportional to the link quality
The parameter can be controlled by the operator in order to balance between absolute
fairness and maximization of capacity
Combination of different algorithms is possible, e.g. SP for the guaranteed rate and APFS for
the excess bandwidth
Adaptive PFS
=0
=100
WiMAX supports dynamic adaptation of modulation and coding scheme as well as MIMO
mode on a per connection and per frame basis.
Link adaption algorithms aim to maximize spectral efficiency while maintaining link quality
metric (typically target packet error rate)
DL adaptation
Input:
HARQ error rate based on MS feedback received on the HARQ ACK UL channel
Output:
MCS
DL Adaptation
Phase I (current) Algorithm
Select MCSA if MS reported CINR margin(fixed, global) > Threshold(MCSA) and no higher order MCS
meets this requirement
Select Matrix B if MS reported CINR margin(fixed, global) > Matrix B Threshold AND MS reported
Matrix B as its preferred MIMO mode. Otherwise, select Matrix A
Phase II Algorithm
Adds HARQ error rate feedback into consideration, by adjusting both the MCS and the margins in case
HARQ error rate goes outside a certain window
This approach makes the system much less sensitive to the configured CINR thresholds
Select MCSA if MS reported CINR margin(dynamic, per MS) > Threshold(MCSA) and no higher order
MCS meets this requirement
Select Matrix B if MS reported CINR margin(dynamic, per MS) > Matrix B Threshold AND MS
reported Matrix B as its preferred MIMO mode. Otherwise, select Matrix A
If HARQ error rate falls below a HARQ Error Low threshold, decrease margin and increase MCS by one
step (e.g. From 16QAM to 16QAM ) or based on CINR, whichever provides better spectral
efficiency
If HARQ error rate rises above HARQ Error High threshold, increase margin and decrease MCS by one
step or base on CINR, whichever provides better link budget
UL Adaptation (1)
Input:
Output:
MCS
Power adjustment
MIMO mode
UL Adaptation (2)
For each MS with each UL CINR measurement, for each supported MCS calculate
The required power adjustment is based on the difference between measured CINR and the CINR
threshold of the specific MCS, including margins
The expected power headroom is the difference between MS reported maximum power per MCS and the
MS transmission power following the required adjustment
Expected power headroom is updated by the BS based on periodic power headroom reports from the
MS
Two modes of operation are supported: The first selects a solution that maximize the
spectral efficiency (highest order possible MCS) and the second selects a solution
that maximizes the user throughput, i.e. the spectral efficiency multiplied by the
maximum number of subchannels:
In Spectral Efficiency Mode: From the list of MCS for which the calculated number of subchannels is not
less then the minimum configuration (typically 2) Select MCSi = argmaxi(bi)
UL Adaptation - Example
Assumptions:
CINR thresholds are 2, 5, 8 and 11 dB for QPSK , QPSK , 16QAM and 16QAM , respectively.
MS maximum TX power 25dBm and 23dBm for QPSK and 16QAM, respectively
Required power offset is -2dB, +1dB, +4dB and +7dB for QPSK , QPSK ,
Security
Security architecture of mobile WiMAX support the following requirements:
Privacy: Provide protection from eavesdropping as the user data traverse the network
Data integrity: Ensure the user data and control messages are protected from being modified
while in transit
Authentication: A mechanism to ensure that a given user/device is the one it claims to be.
Conversely, the user/device should be able to verify the authenticity of the network that it is
connecting to (mutual authentication)
Access control: Ensure that only authorized users are allowed to get access to the offered
services
Based on a public key and a private key that are generated simultaneously using the same algorithm,
RSA
Ciphertext that is encrypted with one key can be decrypted by the other key
Message integrity
Digital certificates
User A
User B
Send (Random Number A, My Name) encrypted with public key of B
Send (Random Number A, Random Number B, Session Key) encrypted with public key of A
Send (Random Number B) encrypted with session key
Begin transferring data encrypted with session key
Authentication server: an entity that decides whether the supplicant should be admitted
Based on a set of negotiated messages that are exchanged between the supplicant and the
authentication server
EAP includes a number of EAP methods, which define the rules for authenticating a user and/or a
device and the set of credentials.
EAP Transport Layer Security (TLS) defines a certificate based strong mutual authentication.
In WiMAX, EAP runs from the MS to the BS over PKMv2 (Privacy Key Management) security
protocol. The BS relays the authentication protocol to the authenticator in the ASN-GW. From the
authenticator to the authentication server, EAP is carried over RADIUS or DIAMETER.
Encryption
Mobile WiMAX encryption is based on Advanced Encryption Standard (AES)
authentication
AES data encryption provides a built in data authentication capability
AES encryption adds 12 bytes of overhead.
Network Entry
Frequency Scanning
Authentication
DL & UL Synchronization
Registration
Initial Ranging
Service Provisioning
Frequency Scanning
Authentication
DL & UL Synchronization
Registration
Initial Ranging
Service Provisioning
Frequency Scanning
Authentication
DL & UL Synchronization
Registration
Initial Ranging
Service Provisioning
To make a valid DCD and DL-MAP BSID and NAI should match MS configuration and
DCD and DL MAP should indicate the same DCD change counter
To maintain DL SYNC MS should periodically receive DL-MAP and DCD
To make a valid UCD and UL-MAP UCD and UL MAP should indicate the same UCD
change counter
To maintain UL SYNC MS should periodically receive UL-MAP and UCD
Frequency Scanning
Authentication
DL & UL Synchronization
Registration
Initial Ranging
Service Provisioning
MS
CDM
( IR C A
ode)
(A
MS makes adjustments
-RSP
e)
RNG Continu
nt ,
e
m
t
djus
CDM
( IR C A
ode)
-RSP
RNG ess)
c
c
(Su
on I E
ocati
l
l
A
A
CDM
R
(MS NG-REQ
MAC
A ddr
ess)
-RSP
D)
RNG imary CI
r
P
d
ic an
(Bas
BS
MS
BS
SBC-R
EQ
-RSP
C
B
S
Frequency Scanning
Authentication
DL & UL Synchronization
Registration
Initial Ranging
Service Provisioning
Authenticator
(ASN)
BS
SBC-REQ
SBC-RSP
Frequency Scanning
Authentication
DL & UL Synchronization
Registration
Initial Ranging
Service Provisioning
AAA Server
MS Status Update
EAP Request/Identity
Negotiate Basic Capabilities
EAP Response/Identity
(my ID, e.g. MS MAC address)
EAP Request/EAP TLS
(TLS Start)
EAP Response/EAP TLS
(TLS Client Hello)
EAP Request/EAP TLS
(TLS Server Hello, TLS Certificate)
MSK Established
MSK
PMK, AK
Established
AK Transferred to BS
SA-TEK Challenge
SA-TEK Request
SA-TEK Response
Key Request
Key Reply
Frequency Scanning
Authentication
DL & UL Synchronization
Registration
Initial Ranging
Service Provisioning
MS
BS
REG-R
EQ
-RSP
REG
MS
BS
DSA
-REQ
DSA-R
SP
-A
DSA
CK
Frequency Scanning
Authentication
DL & UL Synchronization
Registration
Initial Ranging
Service Provisioning
Sleep Mode
Idle Mode
Sleep Mode
The BS are divided into logical groups called paging groups. A BS may
be a member of one or more paging groups.
On a periodic basis, the MS shall scan and synchronize on the DL for the
preferred BS in order to decode any BS broadcast paging message
Paging-unavailable: MS is not available for paging and can power down or scan for
neighbouring BS.
Paging-listen interval: MS listens to DCD and DL MAP of the serving BS to
determine when the broadcast paging message is scheduled
Paging broadcast message can indicate pending DL traffic and instruct the MS to
perform network re-entry, request MS to perform location update or indicate to the
MS to return to paging unavailable state.
Mobility Management
Handover: The migration of the MS from the air interface of one BS to the air
The message provides channel information for neighbouring base stations, which is
normally provided by each BS own DCD/UCD message. The BS obtains that information
over the backbone.
purpose of monitoring and measuring the radio conditions of neighbouring BS. The
time during which the MS scans for available BS will be referred to as a scanning
interval.
Handover may be MS initiated (typically in order to improve link quality) or BS
Handover Process
Scanning and target cell selection
Based on certain triggers (e.g. CINR of target BS falls below 20dB, MS scans link quality of neighbouring BS
Handover Initiation
MS initiated using MOB_MSHO-REQ
BS initiated using MOB_BSHO-REQ
Serving BS
Target BS
ASN-GW
Operational
MOB_N
MOB_S
V
BR-AD
CN-REQ
MOB_S
CN-RSP
MOB_M
SHO-RE
Q
MOB_B
SHO-RS
MOB_H
O-IND
Network re-entry
Operational
Obtain MS operational
parameters
Part IV
Network Architecture
entities. The architecture shall specify open and well defined reference points
between the functional entities.
Deployment modularity and flexibility: The architecture shall support a broad
range of deployment options. It shall scale from the simple case of a single
operator with a single base station to a large scale deployment by multiple
operators with roaming agreements
Support of variety of usage models: Architecture shall support fixed, nomadic,
portable and mobile usage models. Both Ethernet and IP services shall be
supported.
Decoupling of access and connectivity services: The architecture shall allow
decoupling of the access network from the IP connectivity network and services
Support for a variety of business models: The architecture shall allow for logical
separation between the network access provider (NAP), the network service
provider (NSP) and the application service provider (ASP)
Extensive use of IETF protocols: Network layer procedures and protocols used
across the reference points shall be based on appropriate IETF RFCs.
AAA proxy: transfer of device and/or user credentials to selected NSP AAA and temporary
storage of user profiles.
Mobility related functions, such as handover, location management and paging within the
ASN, including support for mobile IP
ASN comprises network elements such as one or more Base Stations and one or more
ASN Gateways.
BS is defined as representing one sector with one frequency assignment implementing
connectivity services to the WiMAX subscribers. CSN provides the following functions:
AAA proxy or server for user and/or device authentication, authorization and accounting
Connectivity infrastructure for services such as Internet access, VPN and IP multimedia
CSN comprises network elements such as routers, AAA proxy/servers and subscribers
database.
Protocol Layering
Control plane is based on UDP/IP
Data plane is based on GRE tunnelling within the ASN and IP in IP tunnelling
GRE Tunneling
access networks are available and multiple service providers are offering services over
those networks. Mobile WiMAX specifies a process for network discovery and selection
NAP discovery
NSP discovery
ASN attachment
Mobile IP only
Mobile IP or Simple IP
Simple IP only
Mobile IP or Simple IP
Simple IP
IP address is either assigned from local address pool, or retrieved as RADIUS attributes from
AAA Server
framework.
Supports both user and device authentication
In addition, AAA framework is used for service flow authorization, QoS policy
ASN
NAS forwards the request to the service provider AAA server (NAS acts as
an AAA client on behalf of the user)
AAA server evaluates the request and returns an appropriate response to
the NAS
NAS sets up a service and notifies the MS
Functional entity that relays EAP packets to the authenticator via an authentication relay protocol
Functional entity that holds the keys (MSK and PMK) generated during the EAP exchange
The MSK is sent to the Key Distributor from the home AAA server, and the PMK is derived
locally from the MSK.
Derives AK and creates AKID for an <MS, BS> pair and distributes the AK and its context to the
Key Receiver in a BS via an AK Transfer protocol
Holds the AK and responsible for generation of IEEE 802.16e specified keys from AK
Authentication Protocols
PKMv2 is used to perform over-the-air user/device authentication. PKMv2 transfers EAP over the
IEEE 802.16 air interface between MS and BS in ASN.
Depending on the Authenticator location in the ASN, a BS may forward EAP messages over
authentication relay protocol (e.g. over R6 reference point) to Authenticator.
The AAA client on the Authenticator encapsulates the EAP in AAA protocol packets and forwards
them via one or more AAA proxies to the AAA Server in the CSN of the home NSP
Authentication Procedure
Initial network entry and
negotiation
Exchange of EAP messages
MS
Authenticator
(ASN)
BS
Network Entry
Link Activation
EAP Request/Id
entity
EAP Response/
Identity
Generation of authentication
key (AK)
MSK and EMSK Establish
Transfer of authentication
key
Transfer of security
associations
AK
SA-TEK Challenge
SA-TEK Request
SA-TEK Response
AAA Server
Key Request
Key Reply
ement
MSK
AAA server
Based on Resource
Reservation
Request/Response
HA
BS2
BS3
R8
R1
BS1
R1
ASNGW2
R4
R1
ASNGW1
R6
R3
R3
R6
R6
Handover Procedures
MS Initiated preparation phase
Handover Procedures
MS Initiated action phase
MS
Serving/
Target
ASN-GW
Serving BS
Anchor ASNGW
Target BSs
MOB_HO-IND
HO_cnf
HO_cnf
HO_Ack
HO_Ack
Context_Req
Context_Req
Context_Rpt
Context_Rpt
Path_Prereg_Req
Path_Prereg_Req
Path_Prereg_Rsp
Path_Prereg_Rsp
Path_Prereg_Ack
Path_Prereg_Ack
RNG-REQ
Path_Reg_Req
Path_Reg_Req
Path_Reg_Rsp
Path_Reg_Rsp
RNG-RSP
CMAC_Key_Count_Update
CMAC_Key_Count_Update
CMAC_Key_Count_Update_Ack
CMAC_Key_Count_Update_Ack
Path_Dereg_Req
Path_Dereg_Req
Path_Dereg_Rsp
Path_Dereg_Rsp
Path_Dereg_Ack
Path_Dereg_Ack
HO_Complete
HO_Complete
Authenticator
BS functional entity that handles interaction between PC and air interface related paging functionalities
One or more PA can form a Paging Group (PG), which is managed by the network operator. PA may
belong to more than one PG
A database containing information on idle mode MS (e.g. PGID, paging cycle, paging offset, SF
information)
Contents
1.
2.
Physical Layer
3.
Overview of WiMAX
Convergence Sublayer
MAC PDU Construction and Transmission
Bandwidth Request and Allocation
ARQ
4.
Quality of Service
Scheduling
Adaptive Modulation and Coding
Security
Network Entry Procedures
Power saving Modes
Mobility Management
Thank You