IEEE 802.16 WiMAX 高雄大學資工系 嚴力行 IEEE 802.16 IEEE 802.16 standardizes the air interface and related functions associated with wireless local loop Wireless local loop use of a wireless communications link for “ last mile / first mile”telephone/broadband connection officially called WirelessMAN in IEEE WiMAX Worldwide Interoperability for Microwave Access Commercial name used by the industry alliance called the WiMAX Forum IEEE 802.16 Family 802.16 (2001): the first standard 802.16a (2003): provide “ last mile”fixed broadband access 802.16d (802.16-2004): superseded the earlier 802.16 documents 802.16e-2005: addresses mobility (Mobile WiMAX) Network Architecture Three kinds of Devices • • • Subscriber Station (SS) Base Station (BS) Mobile Subscriber Station (MSS): 802.16e2005 only Network Architecture–PMP Topology (Point-to-MultiPoint) Network Architecture–Mesh Topology IEEE 802.16 Reference Model IEEE 802.16 Reference Model Convergence Sublayer (CS) - Classification of the higher-layer protocol PDU into the appropriate connection - Suppression of payload header information - Delivery of the resulting CS PDU to the MAC SAP associated with the service flow for transport to the peer MAC SAP - Receipt of the CS PDU from the peer MAC SAP - Rebuilding of any suppressed payload header information IEEE 802.16 Reference Model MAC Common Part Sublayer (MAC CPS) - System Access - Bandwidth Request/Allocation - Connection establishment/Maintenance - Quality of Service (QoS) Power saving mechanisms Handover mechanism IEEE 802.16 Reference Model Security Sublayer - Authentication - secure key exchange - Encryption IEEE 802.16 Reference Model Physical Layer WirelessMAN-SC WirelessMAN Single Carrier WirelessMAN-SCa WirelessMAN Single Carrier Access WirelessMAN-OFDM WirelessMAN Orthogonal Frequency Division Multiplexing WirelessMAN-OFDMA WirelessMAN Orthogonal Frequency Division Multiple Access WirelessHUMAN Wireless High-speed Unlicensed Metropolitan Area Network MAC Protocol Data Unit – MAC PDU Formats Each MAC PDU consists of three components A fixed-length Generic MAC Header A variable length Payload A CRC ( Cyclic Redundancy Check ) MAC header Payload 6 Byte variable Management Message 4 Byte MAC Layer Functions Support for integrated voice/data connections Fragmentations Various level of QoS settings Fragmentation and reassemble Retransmissions Using ARQ (Automatic Repeat Request) Two Types of MAC Header HT EC TYPE BR CID HCS Bandwidth Request MAC Header HT EC TYPE RSV CI EKS RSV Generic MAC Header LEN CID HCS Generic MAC Header HT(Header Type)--- 1 bit Generic MAC Header shall be set to zero EC(Encryption Control)--- 1 bit Specify if the payload is encrypted 0=Payload is not encrypted 1=Payload is encrypted TYPE --- 6 bits Indicates the subheader and special payload types present in the message payload Generic MAC Header HT (Header Type) --- 1 bit (1 for Generic MAC Header) EC (Encryption Control) --- 1 bit (1: encrypted) RSV (Reserved) --- 1 bit shall be set to zero CI (CRC Indicator) --- 1 bit 1 = CRC is present 0 = No CRC is included EKS (Encryption Key Sequence) --- 2 bits LEN (Length) --- 11 bits Header + Payload + CRC CID (Connection Identifier) --- 16 bit HCS (Header Check Sequence) --- 8 bits Used to detect errors in the header Bandwidth Request MAC Header HT (Header Type) --- 1 bit (0 for Bandwdith Request MAC Header) EC (Encryption Control) --- 1 bit (always 0, indicating no encryption) TYPE: Indicates the request is incremental or aggregate 000 = for incremental 001 = for aggregate BR (Bandwidth Request) --- 19 bits The number of bytes of uplink bandwidth requested by SS. CID (Connection Identifier) --- 16 bits Indicates the connection for which UL Bandwidth is requested HCS (Header Check Sequence) --- 8 bits Used to detect errors in the header Channel Access Uplink (SS BS) TDMA DAMA (demand assigned multiple access) Downlink (BS SS) TDM (Time Division Multiplexing) Duplexing can be FDD or TDD Frame Structure Frame (n-1) Frame n Frame (n+1) Frame (n+2) Time DL PHY DU Contention slot for initial ranging Contention Slot for BW request DL Subframe Preamble DLFP UL PHY PDU From SS#1 … UL PHY PDU From SS#k UL Subframe FCH DL burst #1 Broadcast msgs Eg. DL-MAP, UL-MAP, DCD, UCD FCH: Frame Control Header DLFP: Downlink Frame Prefix DCD: Downlink Channel Descriptor DL burst #2 … DL burst #N Regular MAC PDUs MAC msg 1 (MAC PDU-1) … MAC msg N Pad (MAC PDU-N) UCD: Uplink Channel Descriptor MAC Header Frame Structure ----- TDD (DL) MAC Msg Payload CRC FCH (Frame Control Header) DLFP (Downlink Frame Prefix) specifies the modulation type and number of symbols associated with one or several downlink bursts that follow the FCH The modulation and coding used in the first downlink burst immediately following the FCH is specified in the RateID. The RateID is a 4-b code. The Downlink Interval Usage Code (DIUC) is a 4-b code similar to the RateID and is used for identifying the profiles of the other bursts in the downlink. The DLFP also includes an 8-b Header Check Sequence (HCS) DL Subframe UL Subframe UIUC and DIUC specify the profile (modulation, coding) used in each burst Frame (n-1) Frame n Frame (n+1) Frame (n+2) Time DL PHY PDU Contention slot for initial ranging DL Subframe Contention Slot for BW request UL PHY PDU From SS#1 … UL Subframe Preamble MAC msg 1 (MAC PDU-1) … MAC Header Frame Structure ----- TDD (UL) UL burst #1 MAC msg N Pad (MAC PDU-N) MAC Msg Payload CRC UL PHY PDU From SS#k Network Entry and Initialization Network Entry Procedure—PMP mode Phases Scan for DL channel and establish synchronization with the BS Obtain transmit parameters (form UCD message) Perform initial ranging Negotiate basic capabilities Authorize MS and perform key exchange Establish IP connectivity Establish time of day Transfer operational parameters Set up connections Network Entry Procedure --- Scan for the Downlink Channel On initialization or after signal loss, SS shall acquire a DL channel The SS shall have nonvolatile storage in which the last operational parameters are stored and shall first try to acquire this DL channel If fails , the SS begins to continuously scan the possible channels for the DL frequency band of operation until it finds a valid DL signal Network Entry Procedure: Establish PHY synchronization Identifying the carrier center frequency Acquiring the preamble Reading the FCH (Frame Control Header) Network Entry Procedure: Establish MAC synchronization The SS achieves MAC synchronization once it has received at least one DL-MAP message. An SS MAC remains in synchronization as long as it continues to successfully receive the DLMAP and DCD messages for its channel. If the Lost DL-MAP Interval has elapsed without a valid DL-MAP message or the T1 Interval has elapsed without a valid DCD message, an MS shall try reestablish synchronization Frame (n-1) Frame n Frame (n+1) Frame (n+2) Time DL PHY DU Contention slot for initial ranging Contention Slot for BW request DL Subframe Preamble DLFP UL PHY PDU From SS#1 … UL PHY PDU From SS#k UL Subframe FCH DL burst #1 Broadcast msgs Eg. DL-MAP, UL-MAP, DCD, UCD (MAC PDU-1) Frame Structure ----- TDD (DL) … DL burst #N Regular MAC PDUs MAC msg 1 MAC Header DL burst #2 … MAC msg N Pad (MAC PDU-N) MAC Msg Payload CRC Network Entry Procedure—PMP mode Phases Scan for DL channel and establish synchronization with the BS Obtain transmit parameters (form UCD message) Perform initial ranging Negotiate basic capabilities Authorize MS and perform key exchange Establish IP connectivity Establish time of day Transfer operational parameters Set up connections Network Entry Procedure—PMP mode Phases Scan for DL channel and establish synchronization with the BS Obtain transmit parameters (form UCD message) Perform initial ranging Negotiate basic capabilities Authorize MS and perform key exchange Establish IP connectivity Establish time of day Transfer operational parameters Set up connections Network Entry Procedure --- Perform Ranging Purpose The process by which the SS and BS maintain of RF communication link between them How RNG-REQ / RNG-RSP MAC management message Special CDMA code modulated message Ranging Procedures A. B. C. D. Initial Ranging Periodic Ranging Contention Ranging Non-Contention Ranging Network Entry Procedure --- Perform Ranging Initial Ranging •Acquire correct transmission parameters (Power adjustment, timing offset estimation, and synchronization) to communicate with the BS Periodic Ranging •To maintain uplink communication with the BS •Adjust transmission parameters Contention Ranging •Required by the SS to access the system for the first time •No dedicated connection resources assigned to the SS Non-Contention Ranging •Regulated by the BS to allow the SS to finish system access earlier when dedicated channel is provided •Polled initial ranging Frame (n-1) Frame n Frame (n+1) Frame (n+2) Time DL PHY PDU Contention slot for initial ranging DL Subframe Contention Slot for BW request UL PHY PDU From SS#1 … UL Subframe Preamble MAC msg 1 (MAC PDU-1) … MAC Header Frame Structure ----- TDD (UL) UL burst #1 MAC msg N Pad (MAC PDU-N) MAC Msg Payload CRC UL PHY PDU From SS#k Network Entry Procedure—PMP mode Phases Scan for DL channel and establish synchronization with the BS Obtain transmit parameters (form UCD message) Perform initial ranging Negotiate basic capabilities Authorize MS and perform key exchange Establish IP connectivity Establish time of day Transfer operational parameters Set up connections Initialization Procedure --- Negotiate Basic Capabilities Purpose The SS informs the BS of its basic capabilities How SBC-REQ / SBC-RSP management message •SBC-REQ stands for SS Basic Capabilities Request •SBC-RSP stands for SS Basic Capabilities Response Procedure 1. After completion of ranging ,the BS will wait for SBC-REQ message transmitted by the SS 2. If SBC-REQ message are not received within T9 ,the BS shall release and age out Basic and Primary Management CIDs Network Entry Procedure—PMP mode Phases Scan for DL channel and establish synchronization with the BS Obtain transmit parameters (form UCD message) Perform initial ranging Negotiate basic capabilities Authorize MS and perform key exchange Establish IP connectivity Establish time of day Transfer operational parameters Set up connections Initialization Procedure --- Authorization & Key Exchange Purpose For authorization procedure How PKM ( Privacy Key Management ) Protocol •PKM-REQ /PKM-RSP management message Initialization Procedure --Registration Purpose The process by which the SS is allowed entry into network and becomes manageable How REG-REQ / REG-RSP management message Procedure SS sends a REG-REQ message to the BS BS responds with a REG-RSP message, including secondary management CID if the SS is managed SS A managed SS shall establish secondary management connection and configure its IP connectivity A unmanaged SS shall set up provisioned connections Network Entry Procedure—PMP mode Phases Scan for DL channel and establish synchronization with the BS Obtain transmit parameters (form UCD message) Perform initial ranging Negotiate basic capabilities Authorize MS and perform key exchange Establish IP connectivity Establish time of day Transfer operational parameters Set up connections Initialization Procedure --- Establish IP Connectivity SS and BS shall negotiate IP version during REG REQ/RSP exchange if the SS is managed. After registration, SS shall invoke DHCP mechanisms (on SS’ s Secondary management Connection) to obtain an IP address and any other parameters for IP connectivity. Initialization Procedure --- Establish Provisioned Connection Purpose Create a provisioned service flow Procedure The BS shall send DSA-REQ message to the SS to set up connections for pre-provisioned service flows belonging to the SS The SS responds with DSA-RSP messages to the BS Network Entry Procedure—PMP mode Phases Scan for DL channel and establish synchronization with the BS Obtain transmit parameters (form UCD message) Perform initial ranging Negotiate basic capabilities Authorize MS and perform key exchange Establish IP connectivity Establish time of day Transfer operational parameters Set up connections Initialization Procedure --- Establish Time of day Purpose For retrieving Time-stamping logged events Procedure The protocol by which the time of day shall retrieved is defined in IETF RFC 868 Establishment of time of day shall be performed on the SS’ s Secondary management Connection Network Entry Procedure—PMP mode Phases Scan for DL channel and establish synchronization with the BS Obtain transmit parameters (form UCD message) Perform initial ranging Negotiate basic capabilities Authorize MS and perform key exchange Establish IP connectivity Establish time of day Transfer operational parameters Set up connections Initialization Procedure --- Transfer Operational parameters When the configuration file is successfully downloaded, the SS shall notify the BS by transmitting a TFTP-CPLT message on SS’ s Primary management connection (The BS shall response a TFTP-RSP message. TFTPRSP stands for Config File TFTP Complete Response) Network Entry Procedure—PMP mode Phases Scan for DL channel and establish synchronization with the BS Obtain transmit parameters (form UCD message) Perform initial ranging Negotiate basic capabilities Authorize MS and perform key exchange Establish IP connectivity Establish time of day Transfer operational parameters Set up connections <= Final Step! How to set up contention? Contention Resolution Algorithm (1/2) 1. Contention resolution is based on a truncated binary exponential back-off The initial back-off window and maximum back-off window are controlled by the BS These values are as part of the UCD message and power-of-two. E.g. 4 for (0, 15) window; 10 for (0,1023) 2. The SS shall randomly select a number of contention within its back-off window 3. The random value is the number of contention transmission opportunities that the SS shall defer before transmitting Contention Resolution Algorithm (2/2) 4. After a contention transmission, the SS waits for a Data Grant Burst Type IE in a subsequent map ( or waits for a RNG-RSP message for initial ranging). 5. Once received, the contention resolution is complete 6. The SS shall consider the connection transmission lost if no data grant had been given within T16 (or T3 for initial ranging) The SS shall increase its back-off window by a factor of two, as long as it is less than the maximum back-off Frame 2 TxOP SS1 send BW Request 第一次Initial Ranging 要競爭,先聽UL-MAP 知道每個frame 有2個TXOP 及CWmin, CWmax 再用random back-off 搶,並等回應 SS2 send BW Request SS3 send BW Request Assume that 1. Three SS (SS1,SS2 and SS3) compete to send BW Request 2. The Broadcast Request IE = 2 transmission opportunities (the Broadcast Request IE is part of UL-MAP determined by BS) 3. The initial back-off window is 0 to 15 4. The random values for each SS are: 2 (SS1), 3 (SS2) and 5 (SS3) How does BS allocate bandwidth to SS? Five QoS Levels Unsolicited Grant Service (UGS): used for real-time data with fixed packet size and periodic arrivals (T1/E1, VoIP). Extended Real-time Polling Service (ertPS): used for real-time data with variable-sized packets and periodic arrivals (VoIP with silence suppression). Real-time Polling Service (rtPS): used for near real-time data with variable-sized packets and periodic arrivals (MPEG). Non-real-time Polling Service (nrtPS): used for delay tolerant traffic requiring some minimum data rate (FTP). Best Effort (BE): used for streams with no rate guarantees (HTTP). Classification and CID Mapping IEEE 802.16 QoS Architecture Proposed architecture to provide QoS in IEEE 802.16 standards Unicast Polling Multicast and Broadcast Polling