Wimax standards and Security The Wimax



Download 2,02 Mb.
bet145/186
Sana29.05.2022
Hajmi2,02 Mb.
#619147
1   ...   141   142   143   144   145   146   147   148   ...   186
Bog'liq
CRC - WiMAX.Standards.and.Security

Network Aspects

WiMAX/802.16 defines two layers of the protocol stack, physical (PHY) and medium access control (MAC). The MAC layer manages connections and security. The PHY handles signal connectivity and error correction, as well as initial ranging, registration, bandwidth requests, and connection channels for management and data. The PHY layer consists of a sequence of equal- length frames transmitted through the coding and modulation of RF signals. Physical frames, and also MAC frames, do not necessarily begin or end on boundaries of higher layer frames—this is handled by intermediate map- ping layers. Intermediate mapping gives 802.16 flexibility to support a wide variety of traffic types and profiles in the transport layer and above, including IP, Ethernet, and ATM, with a high level of efficiency [4].
SSs communicate with a BS through wireless links. Before connecting, a SS scans its frequency list to find a BS, observes BS traffic to determine parameters for timing, modulation, error correction, and power, and finally identifies time slots (maintenance windows) to use for an initial request. The initial sequence of packets (ranging requests) between the SS and BS are used to refine power and timing settings, and to establish connection reservations (time slot profiles and connection IDs or CIDs). The SS obtains multiple CIDs for different management and data connections with differ- ent quality of service (QoS) criteria. Subsequent management messages can change connection profiles in response to changing QoS needs and signal quality.
A communication is divided into frames. Frames from BS to SS (down- link frames) and SS to BS (uplink frames) contain a frame header and a body (Figure 10.1). The header has two slot maps, a downlink map (DL_MAP) and an uplink map (UL_MAP). The maps describe the use of the slots and their location. Each slot is part of some connection, identified by a CID. Management connections are used to set up connections and contain aspects such as bandwidth requests and other administration information. On con- nection, an SS is assigned three management connections (basic, primary, and secondary) for management messages with different QoS needs. Short






Download 2,02 Mb.

Do'stlaringiz bilan baham:
1   ...   141   142   143   144   145   146   147   148   ...   186




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish