List of Figures

List of Figures

Chapter 1: Introduction to Broadband Wireless Access

Figure 1.1: Illustration of network types. For each category, the most well known technologies are given. To this figure, some people add a smaller ‘egg’ in the WPAN (Wireless Personal Area Network), representing the WBAN (Wireless Body Area Network), with a coverage of the magnitude of a few metres, i.e. the proximity of a given person
Figure 1.2: Local loop of a classical (voice) phone system
Figure 1.3: Coverage of a given zone by a BS
Figure 1.4: Broadband Wireless Access (BWA) applications with a fixed access. The two main applications of a fixed BWA are wireless last-mile for high data rate and (more specifically) WiFi backhauling
Figure 1.5: Nomadic or portable BWA
Figure 1.6: Mobile Broadband Wireless Access (BWA). A mobile WiMAX device can move over all the cells in a seamless session

Chapter 3: Protocol Layers and Topologies

Figure 3.1: The seven-layer OSI model for networks. In WiMAX/802.16, only the two first layers are defined
Figure 3.2: Protocol layers of the 802.16 BWA standard. (From IEEE Std. 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 3.3: IEEE 802.16 common MAC Layer can be used with two possible PHYsical layers in WiMAX
Figure 3.4: Network management reference model as defined in 802.16f. (From IEEE Std 802.16f-2005 . Copyright IEEE 2005, IEEE. All rights reserved.)
Figure 3.5: PMP topology
Figure 3.6: Mesh topology. The BS is no longer the centre of the topology, as in the classical PMP mode

Chapter 4: Frequency Utilisation and System Profiles

Figure 4.1: Illustration of a Public Land Mobile Network (PLMN) offering a cellular service
Figure 4.2: The cellular concept. simple and so powerful!
Figure 4.3: Omnidirectional antennas and trisectorisation
Figure 4.4: Illustration of a useful signal and interference signal as used for SNR calculations
Figure 4.5: Example of a (theoretical) regular hexagonal network. Cluster size = 3. In each cluster all the operator frequencies are used once and only once
Figure 4.6: Possible frequency reuse schemes in WiMAX
Figure 4.7: Example of operating frequencies for each geographical zone in a fractional frequency reuse scheme. The users close to the base station operate with all subchannels available. (Based on Reference )
Figure 4.8: Illustration of handover in a cellular network
Figure 4.9: Transmit spectral mask (see also Table 4.2). (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)

Chapter 5: Digital Modulation, OFDM and OFDMA

Figure 5.1: Digital modulation principle
Figure 5.2: The BPSK constellation
Figure 5.3: Example of a QPSK constellation
Figure 5.4: A 64-QAM constellation
Figure 5.5: Illustration of link adaptation. A good radio channel corresponds to a high-efficiency Modulation and Coding Scheme (MCS)
Figure 5.6: Time and frequency representation of the SC and OFDM. In OFDM, N data symbols are transmitted simultaneously on N orthogonal subcarriers
Figure 5.7: Generation of an OFDM signal (simplified)
Figure 5.8: Presentation of the OFDM subcarrier frequency
Figure 5.9: Cyclic Prefix insertion in an OFDM symbol
Figure 5.10: WiMAX OFDM subcarriers types. (Based on Reference .)
Figure 5.11: Illustration of the OFDMA principle. (Based on Reference .)
Figure 5.12: Illustration of OFDMA multiple access
Figure 5.13: Example of the data region that defines the OFDMA burst allocation
Figure 5.14: Example of different permutation zones in uplink and downlink frames
Figure 5.15: Illustration of the downlink PUSC Cluster and subcarrier allocation
Figure 5.16: Cluster allocation
Figure 5.17: Cluster structure. (Based on Reference .)
Figure 5.18: Uplink PUSC Tile is made of 12 subcarriers. (Based on Reference .)
Figure 5.19: Illustration of a FUSC subchannel
Figure 5.20: Bin structure
Figure 5.21: Illustration of the global principle of AMC subcarrier allocation (the number of guard subcarriers is for 1024-FFT)

Chapter 6: The Physical Layer of WiMAX

Figure 6.1: OFDM PHY transmission chain
Figure 6.2: OFDMA PHY transmission chain
Figure 6.3: PRBS generator used for data randomisation in OFDM and OFDMA PHY. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 6.4: OFDM randomiser downlink initialisation vector for burst 2,,N. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 6.5: Illustration of the RS-CC encoder of OFDM PHY
Figure 6.6: Convolutional encoder of rate 1/2. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 6.7: Turbo coded sequence generation
Figure 6.8: OFDMA PHY Convolutional Turbo Code (CTC) encoder. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 6.9: Block diagram of subpacket generation. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 6.10: BTC and shortened BTC structure. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 6.11: Format of the downlink Transmission Convergence sublayer PDU. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)

Chapter 7: Convergence Sublayer (CS)

Figure 7.1: Protocol layers of the 802.16 BWA standard. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 7.2: Correspondence between the CID and SFID
Figure 7.3: Illustration of service flows and connections
Figure 7.4: Possible transitions between service flows
Figure 7.5: Model structure of the service flow types. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 7.6: Classification and CID mapping. The principle is the same for both ways: BS to SS and SS to BS. (From IEEE Std 802. 16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 7.7: Header suppression at the sending entity. Suppression of parts of the header leads to a compressed header. This allows the economy of a precious radio resource that would have been used for redundant information
Figure 7.8: Header suppression mechanism at the receiving entity. The receiver has to restore the header before properly using the received packet
Figure 7.9: Illustration of PHS operation. In the Packet CS mode and for each MAC SDU, the PHSI (Payload Header Suppression Index) references the suppressed PHSF (Payload Header Suppression Field)
Figure 7.10: DSC MAC management message used for the signalling of a PHS rule. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)

Chapter 8: MAC Functions and MAC Frames

Figure 8.1: General format of a MAC frame or MAC PDU. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 8.2: Header format of the Generic MAC frame . The number in parentheses is the number of bits in the indicated field
Figure 8.3: Generic MAC frame may have one or many subheaders
Figure 8.4: Header format without payload Type I. (Based on Reference .)
Figure 8.5: Illustration of the fragmentation of an MAC SDU giving three MAC PDUs (or MAC frames)
Figure 8.6: Illustration of the packing of MAC SDUs in one MAC PDU
Figure 8.7: Illustration of the concatenation for an uplink burst transmission. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 8.8: General format of a MAC management message (payload of a MAC PDU)
Figure 8.9: Illustration of the cumulative ARQ process
Figure 8.10: Incremental Redundancy (IR) HARQ
Figure 8.11: Scheduling mechanisms in a station (BS or SS). (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)

Chapter 9: Multiple Access and Burst Profile Description

Figure 9.1: Illustration of different FDD mode operations: broadcast, full duplex and half duplex. Half duplex SSs as SS 1 and 2 in this figure can listen to the channel or (exclusively) send information. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 9.2: TDD frame: uplink and downlink transmissions share the same frequency but have different transmission times. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 9.3: General format of a TDD frame (OFDM PHY). (Based on Reference .) In the FDD mode, the downlink subframe and uplink subframes are transmitted on two separate frequencies as the uplink frame and downlink frame. The contents are the same for FDD and TDD.
Figure 9.4: Details of the OFDM PHY downlink subframe. Each downlink burst may be sent to one (unicast) or more SSs (multicast or broadcast).
Figure 9.5: Details of the OFDM PHY uplink subframe.
Figure 9.6: Example of an OFDMA frame in the TDD mode. (Based on References and .)
Figure 9.7: Illustration of the OFDMA frame with multiple zones. (Based on Reference .
Figure 9.8: DL-MAP and UL-MAP indicate the use of downlink and uplink subframes (the FDD mode). (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 9.9: DL-MAP MAC management message general from for OFDM PHY. Each DL-MAP IE indicates the start time of a downlink burst and the burst profile (channel details including physical attributes) of this burst.
Figure 9.10: DL-MAP IE fields for the OFDM (WiMAX) PHY Layer.
Figure 9.11: UL-MAP MAC management message general form. For the sake of simplicity, not all the fields are shown in this figure. Each UL-MAP IE indicates the start time of an uplink burst and the burst profile (channel details including physical attributes) of this burst.
Figure 9.12: Use of thresholds for a given burst profile.
Figure 9.13: Illustration of burst profile threshold values for three neighbouring profiles. Burst profile X is the most robust. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 9.14: General format of the DCD (Downlink Channel Descriptor) message
Figure 9.15: Illustration of the DCD message transmission period and DIUC use. The value of 1000 frames between two DCD messages is an order of magnitude.
Figure 9.16: Mesh frame global structure. According to the standard, Mesh networks can only use the TDD mode
Figure 9.17: The two parts of the Network Control subframe of the Mesh subframe. The network configuration contains the Network Descriptor
Figure 9.18: The three parts of the Schedule Control subframe of the Mesh subframe

Chapter 10: Uplink Bandwidth Allocation and Request Mechanisms

Figure 10.1: Grant management subheader for the QoS class = UGS (Unsolicited Grant Services)
Figure 10.2: Grant management subheader for the QoS class = UGS (Unsolicited Grant Services). The piggyback request field is the number of bytes of the uplink bandwidth requested by the SS
Figure 10.3: Unsolicited bandwidth grants in the uplink
Figure 10.4: Illustration of the unicast polling mechanism. If the SS has no needs, the allocated slots are padded
Figure 10.5: Illustration of contention-based group polling. The three SSs shown are group (multicast or broadcast) polled. They all have a bandwidth request. SS 2 wins the contention and then receives a bandwidth allocation
Figure 10.6: Example of a backoff mechanism. The SS has to wait 11 transmission opportunities (a randomly selected number between 0 and the internal backoff window). In this figure, only the Request IE (contention slot) is represented and not the rest of the uplink (sub-) frame
Figure 10.7: Illustration of the bandwidth stealing principle
Figure 10.8: Example of Bandwidth Request IE (bandwidth request contention slots). The BS must allocate a bandwidth for Bandwidth Request IE in integer multiples of individual transmission opportunity values (indicated in the UCD message)
Figure 10.9: Uplink bursts in the uplink subframe described in Table 10.1
Figure 10.10: Example of the subcarriers of a focused contention transmission opportunity (contention channel index = 20). The SS transmits zero amplitude on all other subcarriers

Chapter 11: Network Entry and Quality of Service (QoS) Management

Figure 11.1: DBPC-REQ MAC management message format. The required burst profile for downlink traffic is indicated by its corresponding DIUC (as defined in the DCD message)
Figure 11.2: DBPC-RSP MAC management message format. If the DIUC parameter is the same as requested in the DBPC-REQ message, the request was accepted
Figure 11.3: Illustration of DBPC Request and Response messages operation
Figure 11.4: Illustration of the initial ranging process
Figure 11.5: Transition to a more robust burst profile. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.
Figure 11.6: Transition to a less robust burst profile. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 11.7: UGS scheduling service uplink grants allocation mechanism
Figure 11.8: rtPS scheduling service uplink grants allocation and request mechanism
Figure 11.9: Illustration of the nrtPS scheduling service uplink grants allocation and request mechanism. The SS may use contention request opportunities as well as unicast request opportunities
Figure 11.10: Illustration of the BE scheduling service uplink grants allocation and request mechanism. The BS does not have any unicast uplink request polling obligation for a BE SS
Figure 11.11: The BS decides for bandwidth and burst profile allocations according to many entry parameters
Figure 11.12: BS scheduler operation for the uplink
Figure 11.13: BS scheduler operation for the downlink
Figure 11.14: Possible transitions between service flows. A BS may choose to activate a provisioned service flow directly or may choose to take the path to active service flows passing by the admitted service flows
Figure 11.15: Dynamic service flow operations. (Based on Reference .)
Figure 11.16: Successful service flow creation procedure messages and attributes. Some of the parameters in this figure are not included in some DSx messages depending on whether the service creation is BS or SS initiated. (Figure from Reference modified by G. Assaf.)
Figure 11.17: The general format of DSA-REQ, DSA-RSP and DSA-ACK MAC management messages
Figure 11.18: SS Network Entry procedures. (Figure by G. Assaf and L. Nuaymi.)
Figure 11.19: Initial ranging until registration part of the SS Network Entry process. This figure shows the case of a managed SS, i.e. having a secondary management connection
Figure 11.20: Transfer of the SS configuration file (operational procedure)
Figure 11.21: General format of the REG-REQ message. Not all possible TLV encodings are represented in this figure
Figure 11.22: General format of the REG-RSP message. Not all possible TLV encodings are represented in this figure

Chapter 12: Efficient Use of Radio Resources

Figure 12.1: Example of a simplified process flowchart for a WiMAX system implementing DFS
Figure 12.2: Example of a block diagram of a beamforming receiver with an N-element antenna array
Figure 12.3: Example of a block diagram of a beamforming transmitter with an N-element antenna array
Figure 12.4: Range extension with beamforming
Figure 12.5: Interference reduction with beamforming
Figure 12.6: Example of a frame with regions supporting AAS operation
Figure 12.7: Generic MIMO block diagram for the downlink
Figure 12.8: Downlink MIMO support in IEEE 802.16e (based on Reference ). STTD=Space Time Transmit Diversity, SM=Spatial Multiplexing (*SM mode requires at least two antennas at the MS side), FHDC = Frequency Hopped Diversity Coding, FRFD = Full Rate Full Diversity. SFTC = Space Frequency Time Code and H-SFTC = Hybrid SFTC
Figure 12.9: Uplink MIMO support in IEEE 802.16e-2005. (Based on Reference .)
Figure 12.10: Example of a frame with regions supporting the MIMO operation
Figure 12.11: Example of MBS zone deployment and MBS_ZONE allocations. All the MS registered to an MBS_ZONE can receive MBS signals from any BS of the MBS_ZONE
Figure 12.12: Example of the 802.16 frame with the MBS service zone. The presence of the MBS zone is indicated in the DL-MAP message (in a MBS_MAP_IE field). The exact details of the MBS zone are then described in the MBS_MAP message at the beginning of the MBS zone

Chapter 13: WiMAX Architecture

Figure 13.1: WiMAX network reference model with components (MS/ASN/CSN), reference points (R 1 to R5) and actors (NAP/NSP/ASP)
Figure 13.2: Generic ASN reference model. R3 is between the ASN and CSN while the external R4 is between ASNs
Figure 13.3: The ASN profiles A, B and C

Chapter 14: Mobility, Handover and Power-Save Modes

Figure 14.1: Illustration of handover process stages. (Figure by B. Souhaid and L. Nuaymi.)
Figure 14.2: Summary of network re-entry steps
Figure 14.3: Illustration of an anchor BS in a diversity set
Figure 14.4: Illustration of an MDHO operation mode
Figure 14.5: Example of paging groups. (Based on Reference .)

Chapter 15: Security

Figure 15.1: Security sublayer components. (Based on Reference .)
Figure 15.2: PKM-REQ MAC management message format
Figure 15.3: PKM-RSP MAC management message format
Figure 15.4: Authentication and Authorisation Key allocation by the BS. The BS is the server and the SS is the client
Figure 15.5: MAC management messages as used for PKM protocol-based authentication and key exchange in the 802.16 standard. Some of the parameters are shown. (Figure by L. Rouillé. X. Lagrange and L. Nuaymi.)
Figure 15.6: Authorisation keys management between the BS and an SS
Figure 15.7: The SS asks the BS for encryption keys TEK0 and TEK1
Figure 15.8: Traffic Encryption Keys (TEKs) management. (From IEEE Std 802.16-2004 . Copyright IEEE 2004, IEEE. All rights reserved.)
Figure 15.9: Traffic Encryption Keys (TEKs) management
Figure 15.10: Illustration of the key generation process in PKMv1 and PKMv2. (Figure by M. Boutin, M. Jubin and L. Nuaymi.)
Figure 15.11: DES algorithm in its CBC mode
Figure 15.12: Encrypted payload format in the AES-CCM mode. (Based on Reference .)
Figure 15.13: Illustration of HMAC or CMAC generation. The MAC is also called keyed hash or MAC Digest
Figure 15.14: HMAC/CMAC/KEK derivation from the AK. (Based on Reference .)