Professional Documents
Culture Documents
ISSN: 2319-1163
Abstract
This paper is mainly concern with Quality of service in WI-MAX technology. WI-MAX is providing broadband wireless access to the
masses and presenting alternatives to digital subscriber lines (DSL) and cable broadband access. WI-MAX is based on IEEE 802.16
standard and is scalable. Super narrow lanes can enables a lot of traffic over them without disturbance. Many technologies and
softwares like pathloss4.0,Global Mapper are used for line of sight (LOS) clearance coverage; the technology behind WI-MAX has
been optimized to provide excelled non-line of sight (NLOS) coverage.QOS in broadband wireless access is a difficult and
complicated business, as it adds an unpredictable radio link and potentially heavy user contention to the usual non-deterministic
behavior of IP packet networks. Carriers therefore need to be aware of how QOS works and what it can do in the different flavors
of 802.16, and how it relates to the more familiar 3G technologies. WiMAX quality of service (QOS) depends crucially on the 802.16
Layers 1 and 2, as these govern the all-important base-station/user-terminal radio access an inherently difficult environment
compared to, say, a wireline broadband network. Because the d/e forms of 802.16 are aimed at different applications fixed terminals
only and mobile terminals, respectively there are significant differences in technology between them. In particular, 802.16d used
Orthogonal Frequency Division Multiplexing.
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org
133
Deterministic QOS
Adaptive modulation
(BPSK/QPSK/16QAM/64QAM)
Uplink subchannelization
Frequencies specified as
sub-6GHz
Scalable OFDMA 128,
512, 1024, 2048 (not
256)
Sub channelization
Questions over backward
compatibility
(256-carrier OFDMA not
specified)
ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org
134
WiMax
802.16.
<20
WiMax
802.16e
20
WiFi
Data
rates,Mbit/s
14.4
75
75
11.54
bit/Hz
Multiple
access
Duplexing
2.9
TDMA,
CDMA
FDD
3.75
OFDMA
3.75
OFDMA
2.7
CSMA
TDD
Mobility
FULL
TDD/FDD/
HD-FDD
portable
Coverage
LARGE
Mid
Mid
Bandwidt
h,
MHz
Nomadic/ful
l
20
Portabl
e
Small
ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org
135
ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org
136
5. SUBCHANNELIZATION
The OFDM PHY layer supports UpLink (UL)
subchannelization, with the number of subchannels being 16.
This feature is particularly useful when a power-limited
platform such as a laptop is considered in the subscriber
station in an indoor environment. With a sub-channelization
factor of 1/16, a 12-dB link budget enhancement can be
achieved. Sixteen sets of 12 subcarriers each, are defined,
where one, two, four, eight or all of the sets can be assigned to
ISSN: 2319-1163
REFERENCES
[1] Arbaugh, W.A. Wireless security is different. Computer,
Volume: 36, 9 101, Issue: 8, Aug. 2003.
[2] Arbaugh, W.A. Your 802.11 wireless network has no
clothes. Wireless Communications.
[3] Baghaei, N.; Hunt, R IEEE 802.11 wireless LAN security
performance using multiple clients. Networks, 2004.
[4] Balachandran, A., Voelker, G., Bahl, P. and Rangan V.
Characterizing user behavior and network performance in a
public wireless LAN. In Proceedings of ACM.
[5] Bing, B., & Subramanian, R. A Novel Technique for
Quantitative Performance Evaluation of Wireless LANs.
[6] Bing B. Measured performance of the IEEE 802.11
wireless LAN. In Proceedings
Conference on Local Computer Networks, pages 34-42, 1999.
[7] Borisov, B., I. Goldberg, & D. Wagner.
[8] Brown, B.; 802.11: the security differences between b and
I. Potentials.
[9] M. Beck and E. Tews. Practical Attacks against WEP and
WPA. In Second ACM conference on Wireless Network
Security, 2008.
[10] N. Borisov, I. Goldberg, and D. Wagner. Intercepting
mobile communications: the insecurity of 802.11.
[11] N. Cam-Winget, R. Housley, D.Wagner, and J.Walker.
Security flaws in 802.11 data link protocols.
[12] S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the
Key Scheduling Algorithm of RC4..
[13] C. He and J. C. Mitchell. Analysis of the 802.11i 4-way
handshake. In WiSe 04: Proceedings of the 3rd ACM
workshop on Wireless security, pages 4350, New York, NY,
USA, 2004. ACM.
[14] C. He and J. C. Mitchell. Security Analysis and
Improvements for IEEE 802.11i. In The 12th Annual Network
and Distributed System Security Symposium,
[15]
IEEE
Standard
802.11-1997,
Information
Technologytelecommunications And Information exchange
Between Systems-Local And Metropolitan Area Networksspecific Requirements-part 11: Wireless Lan Medium Access
Control (MAC) And Physical Layer (PHY) Specifications,
1997.
[16] IEEE Standard 802.11-1999, Information technology Telecommunications and information exchange between
systems - Local and metropolitan area networks - Specific
requirements Part 11: Wireless LAN Medium Access Control
(MAC) and Physical Layer (PHY) Specifications, 1999.
[17] IEEE Standard 802.11i-2004, IEEE Standard for
Information technology
Telecommunications and
information exchange between systems Local and
metropolitan area networks Specific requirements, Part 11:
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org
137
ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org
138