10.1 - WiMAX and Mobile WIMAX
10.1 - WiMAX and Mobile WIMAX
10.1 - WiMAX and Mobile WIMAX
Mobile WiMAX Rel 1.0 ((TDD,, 10 MHz Channel BW)) has higher
g peak
p
rate & 2x to 3x greater DL sector throughput than
HSPA Rel-6
3
HSPA+ (HSPA Rel-7 and Rel-8)
The Next Step in 3GPP Evolution
4
5
IP e2e Network
3GPP IMT
IMT-
HSPA HSPA+ Advanced
Rel-6 Rel-7 & Rel-8
IP e2e
Mobile WiMAX
time to market
Network
advantage
CDMA-Based OFDMA-Based
Comparable CAPEX for WiMAX Conversion to all-IP core & increased backhaul
today or LTE in 2+ years. capacity
it required
i d iin either
ith case
Both require new spectrum
6
Introduction
d i to WIMAX
` The Worldwide Interoperability for Microwave Access
(WiMAX) is a technology that aims to provide wireless
long-distance broadband access for a variety of
applications.
` It is intended primarily as an alternative to wire
technologies ( such as Cable Modems, DSL and T1/E1
li k ) to provide
links id broadband
b db d access to customer
premises.
WiMAX as a Wireless Network
` WiMAX would operate similar to WiFi but:
` At higher speeds
` Over greater distances
` For a greater number of users.
` WiMAX
W MAX air interface
f is based
b d on a IEEE standard
d d
emerged from 802.16 working group.
` IEEE 802.16d
802 16d – 2004 Æ Fixed WiMAX
` IEEE 802.16e – 2005 Æ Mobile WiMAX
WiMAX vs. Wi
Wi-Fi
Fi
Transmission
T i i Single
Si l carrier,
i 256 OFDM
scheme or scalable OFDM with
128, 512, 1,024, or 2,048
subcarriers
Modulation QPSK, 16 QAM, 64 QAM
Multiplexing
p g Burst TDM/TDMA/
OFDMA
Duplexing TDD and FDD
Air-interface
Ai i t f WirelessMAN-SCa
Wi l MAN SC
designation WirelessMAN-OFDM
WirelessMAN-OFDMA
WirelessHUMANa
WiMAX Scalable OFDMA as
implementation Mobile WiMAX
Salient Features of Mobile WiMAX
` Robust security:
` WiMAX supports strong encryption, using Advanced
Encryption Standard (AES), and has a robust privacy and
key-management
key management protocol.
` The system also offers a very flexible authentication
architecture based on Extensible Authentication Protocol
(EAP), which allows for a variety of user credentials,
including username/password, digital certificates, and
smart cards.
` Support for mobility:
` The mobile WiMAX variant of the system has
mechanisms to support secure seamless handovers for
delay tolerant full-mobility
delay-tolerant full mobility applications
applications, such as VoIP.
VoIP
Salient Features of Mobile WiMAX
` IP-based architecture:
` The WiMAX Forum has defined a reference
network architecture that is based on an all-IP
platform. All end-to-end services are delivered
over an IP architecture
hit t relying
l i on IPIP-based
b d
protocols for end-to-end transport, QoS,
session management
management, security,
security and mobility.
mobility
Physical Layer Block Diagram
802.16m : Gigabit WiMAX
` Release 2.0
2 0 is based on the IEEE 802.16m
802 16m System
Requirements Document
` 802.16m Mirrors IMT-Advanced Requirements
` K Performance
Key P f Targets
T t are:
` Increased DL peak channel & user data rate
` Increased UL peak channel & user data rate
` 2x DL spectral efficiency of Release 1.0 (2.6 bps/Hz)
` 2x cell-edge DL user throughput of Release 1.0 (0.09 bps/Hz)
` 2x UL spectral efficiency of Release 1.0 (1.3 bps/Hz)
` 2x cell-edge UL user throughput of Release 1.0 (0.05 bps/Hz)
` R d i off the
Reduction h connection
i setup, RAN delay,
d l & handover
h d
interruption time
` >60 concurrent sessions per MHz per sector for the AMR 12.2 kbps
speech codec
` M l i C i support ffor contiguous
Multi-Carrier i or non-contiguous
i channels
h l ((up
to 100 MHz operating BW with band aggregation)
` Mobility support up to 500 km/hr
` Mobile WiMAX Rel 2.0 is backwards compatible with
Rel 1.5 and Rel 1.0
Further Performance Enhancements
Planned for Mobile WiMAX Release 2.0
29
WIMAX Detailed
Coding and Multiplexing
Techniques
Data Randomization
` Used to encrypt the signal at the beginning of every FEC
block
` Implemented by using a maximal-length shift register
Channel Coding
` The channel coding stage consists of:
` Randomization
` FEC (Forward Error Correction) Coding
` HARQ
` Interleaving
` Repetition
p
` Symbol Mapping
Symbol
Randomizer FEC Interleaver Repetition
Mapping
HARQ
Convolutional Coding
G
Generator
t polynomial
l i l ffor Y
Y: G2=(1011011)
(1011011)2=(133)
(133)oct
Interleaving & Symbol Mapping
` The first step of interleaving is mapping the adjacent bits
into non
non-adjacent
adjacent subcarriers. This provides frequency
diversity. The second step maps adjacent bits alternately
to LSB and MSB of the modulation constellation. This
reduces burst errors.
` After interleaving, the binary bit stream is converted to
complex value bits,
complex-value bits so as to match a certain constellation
(e.g. QPSK)
Tailbiting
` The 6 bits from the end of the data block are appended to
the beginning,
g g to be used as flush bits.
` These appended bits flush out the bits left in the encoder
by the previous FEC block.
block
` The first 12 parity bits that are generated by the
convolutional encoder which depend on the 6 bits left in
the encoder by the previous FEC block are discarded.
Puncturing:
` It is used to change the code rate of the
encoded code.
` It removes some parity bits to increase the
code rate.
` It allows the same low rate and low
complexity decoder to be used for the high
rate encoded signal.
` Example: For a code rate=1/2
` Omitting 2 out of 6 bits Æ code rate=3/4
` Omitting
O itti 1 outt off 4 bits
bit Æ code
d rate=2/3
t =2/3
` Puncturing patterns for convolutional coding:
` Example:
` For code rate=3/4:
` Instead of transmitting X1Y1X2Y2X3Y3 we transmit X1Y1Y2X3
` At the receiver we insert zeros in the locations of the
punctured bits Æ X1Y10Y2X30
` The sequence is then decoded with a Viterbi Decoder, as usual.
Concatenated Reed
Reed-Solomon
Solomon
Convolutional Code (RS-CC)
` FEC: concatenation of an outer RS code and a rate-
rate
compatible inner convolutional code supported on both UL
and DL.
` Reed--Solomon Coding:
Reed
` Systematic RS code (N=255, K=239, T=8) using GF(28)
` Code Generator Polynomial: g(x)=(x+λ0)(x+λ1)(x+λ2)...(x+λ15) where
2t-1=15
` Field Generator Polynomial:
p(x)=x8+x4+x3+x2+1
Mandatory Channel
Modulation Uncoded CodedCoding Per Modulation
Overall RS Code CC Code
Block Size Block Size Coding Rate
(bytes) (bytes) Rate
⎛ NC ⎞ ⎛k⎞
mk = ⎜ ⎟k mod( d ) + floor ⎜ ⎟
⎝ d ⎠ ⎝d ⎠
` Second Permutation:
⎛ mk ⎞ ⎛⎜ ⎛ d .mk ⎞⎞
jk = s. floor ⎜ ⎟ + ⎜ mk + N C − floor ⎜⎜ ⎟⎟ ⎟
⎝ s ⎠ ⎝ ⎟
⎝ NC ⎠ ⎠ mod(d )
` NC : total number of bits per block
` s=M/2 , M: Modulation index
` d=16 (arbitrary parameter)
` First Permutation:
Disadvantages of Interleaving:
` Increases latency (time taken for a sent data packet to reach the
receiver).
` When convolutional turbo codes are used, the interleaver
is bypassed,
bypassed since a sub
sub-block
block interleaver is used within the
encoder.
Symbol Mapping
` The sequence of binary bits is converted to a sequence of
complex-valued
complex valued symbols.
QPSK 64 QAM
16 QAM
` The modulation schemes used are QPSK, 16QAM and
64QAM.
Q
` For the downlink, QPSK, 16QAM and 64QAM are used.
` For the uplink, 64QAM is optional.
` The IEEE 802.16e-2005 air-interface supports both TDD and FDD modes
,however, the initial release of mobile WiMAX profiles only includes the
TDD mode of operation.
Mobile WiMAX TDD Details
The TDD mode is preferred for the following reasons:
` TDD enables adjustment of the DL/UL ratio to efficiently support
symmetric and asymmetric broadband traffic. while with FDD, DL
and UL always have fixed and generally, equal bandwidths.
` The downlink-to-uplink-subframe
p ratio mayy be varied from 3:1 to 1:1 to support
pp
different traffic profiles.
` In a frame,
frame many control information are used to ensure optimal system operation:
Preamble:
The preamble is the first OFDM symbol of the frame .
The preamble can be used for a variety of PHY layer procedures
such as time and frequency synchronization, initial channel estimation, and noise
and interference estimation.
To create the preamble BPSK modulation is used.
FCH(Frame control header):
` It provides the frame configuration information such as the modulation and
codingg scheme and usable sub-channels.
DL-MAP and UL-MAP:
` They provide subchannel allocation and Multiple users data regions within the
frame and other control information for the DL and UL sub-frames respectively.
It is often sent over a very reliable link,
link such as BPSK with rate 1/2 coding and
repetition coding .
DL-channel descriptor (DCD) and UL-channel descriptor (UCD)
` It contains additional control information to describe the channel structure and
the various burst profiles that are allowed within the given BS.
UL Ranging:
` The UL ranging sub-channel is allocated for mobile stations (MS) to perform
closed-loop time,
time frequency,
frequency and power adjustment as well as bandwidth requests
requests.
UL CQICH:
` The UL CQICH channel is allocated for the MS to feedback channel state
information.
UL ACK:
` The UL ACK is allocated for the MS to feedback DL HARQ ( Hybrid Automatic
Repeat Request ) acknowledge.
` Burst Regions is used as Data regions from different users.
users
Calculation of the total number of bits in one TDD frame:
TTG & RTG :
` Frame duration is almost 5 ms (it is variable from 2 ms to 20 ms).
` Each frame has 47 OFDM symbols each symbol duration is 102.9 μs.
1.UL-PUSC
No of bits in the UL subframe = No of Data Symbols × Mi × Rc
Where Mi is 1 in case of BPSK , 2 in case of QPSK,
Where, QPSK 4 in case of 16QAM,
16QAM 6 in case of
64QAM
No of Data symbols= No of Data Symbols/slot × No of Slots