74
The 802.16 The 802.16 WirelessMAN WirelessMAN ™ MAC: ™ MAC: It’s Done, but What Is It? It’s Done, but What Is It? creating the IEEE 802.16 creating the IEEE 802.16 WirelessMAN WirelessMAN ™ Standard for Wireless Metropolitan Area Networks ™ Standard for Wireless Metropolitan Area Networks http:// http:// WirelessMAN WirelessMAN .org .org IEEE 802.16-01/58r1 2001-11-12

Mobile WiMAX : A Technical Overview

Embed Size (px)

Citation preview

Page 1: Mobile WiMAX : A Technical Overview

The 80216 The 80216 WirelessMANWirelessMANtrade MACtrade MAC

Itrsquos Done but What Is ItItrsquos Done but What Is It

creating the IEEE 80216 creating the IEEE 80216 WirelessMANWirelessMANtrade Standard for Wireless Metropolitan Area Networkstrade Standard for Wireless Metropolitan Area Networks

httphttpWirelessMANWirelessMANorgorg

IEEE 80216-0158r12001-11-12

Presentation AuthorsPresentation Authors

bullbull Roger B Marks NIST (Chair 80216)Roger B Marks NIST (Chair 80216)

bullbull Carl Carl EklundEklund Nokia (80216 TG1 MAC Chair) Nokia (80216 TG1 MAC Chair)

bullbull Ken Stanwood Ensemble CommunicationsKen Stanwood Ensemble Communications

bullbull Stanley Wang Ensemble CommunicationsStanley Wang Ensemble Communications

OutlineOutline

bullbull Overview IEEE 80216 Air Interface StandardOverview IEEE 80216 Air Interface Standardndashndash P80216P80216 Air Interface (MAC and 10 - 66 GHz PHY)Air Interface (MAC and 10 - 66 GHz PHY)ndashndash P80216aP80216a Amendment 2-11 GHz (licensed)Amendment 2-11 GHz (licensed)ndashndash P80216bP80216b Amendment (license-exempt)Amendment (license-exempt)

bullbull PHY considerations in the 80216 MACPHY considerations in the 80216 MAC

bullbull The 80216 MAC as defined in P80216D5The 80216 MAC as defined in P80216D5

bullbull MAC Enhancements under developmentMAC Enhancements under development

IEEE 80216 HistoryIEEE 80216 History

bullbull SponsorsSponsorsbullbull IEEE Computer SocietyIEEE Computer Society

bullbull IEEE Microwave Theory and Techniques SocietyIEEE Microwave Theory and Techniques Society

bullbull Project Development Summer 1998Project Development Summer 1998

bullbull IEEE 802 Tutorial November 1998IEEE 802 Tutorial November 1998

bullbull IEEE Study GroupIEEE Study Groupbullbull November 1998-March 1999November 1998-March 1999

bullbull Session 1 July 1999Session 1 July 1999

bullbull Session 16 November 2001Session 16 November 2001

IEEE 80216 by the NumbersIEEE 80216 by the Numbers

bullbull 163 Members163 Members

bullbull 67 ldquoPotential Membersrdquo67 ldquoPotential Membersrdquo

bullbull 62 Official Observers62 Official Observers

bullbull 700 different individuals have attended a700 different individuals have attended asessionsession

bullbull 28 Million file downloads in year 200028 Million file downloads in year 2000

bullbull Members and Potential Members fromMembers and Potential Members frombullbull 10 countries10 countries

bullbull gt110 companiesgt110 companies

IEEE 80216 ProjectsIEEE 80216 Projectsbullbull Air Interface (Air Interface (PHYsPHYs with common MAC) with common MAC)

bullbull P80216 10-66 GHzP80216 10-66 GHzbullbull Completed IEEE Sponsor BallotCompleted IEEE Sponsor Ballot

bullbull On On RevCom RevCom agenda for December 5 2001agenda for December 5 2001

bullbull P80216a 2-11 GHzP80216a 2-11 GHzbullbull Licensed bands onlyLicensed bands only

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull P80216b 5-6 GHzP80216b 5-6 GHzbullbull License-exempt (ldquoLicense-exempt (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull CoexistenceCoexistencebullbull IEEE 802162 (10-66 GHz)IEEE 802162 (10-66 GHz)

bullbull Published in September 2001Published in September 2001

bullbull P802162a amendment w 2-11 P802162a amendment w 2-11 GHz GHz licensedlicensed

IEEE P80216IEEE P80216

Standard Air Interface for FixedStandard Air Interface for FixedBroadband Wireless AccessBroadband Wireless Access

SystemsSystems

IEEE P80216 HistoryIEEE P80216 Historybullbull July-September 1999July-September 1999 Functional Requirements Functional Requirements

bullbull November 1999November 1999 Proposals (14 for MAC) Proposals (14 for MAC)

bullbull January 2000January 2000 2 Consolidated Proposals 2 Consolidated Proposalsndashndash 1 MAC proposal based on DOCSIS1 MAC proposal based on DOCSIS

ndashndash 1 not1 not

bullbull May 2000May 2000 Plan to Merge 2 Proposals Plan to Merge 2 Proposals

bullbull August 2000August 2000 Rev 0 Rev 0

bullbull until February 2001until February 2001 Working Group Review Working Group Reviewndashndash formal comment processformal comment process

bullbull February-August 2001February-August 2001 WG Letter Ballot WG Letter Ballot

bullbull August-October 2001August-October 2001 IEEE Sponsor Ballot IEEE Sponsor Ballot

bullbull 5 December 20015 December 2001 RevCom RevCom approval agendaapproval agenda

P80216 ScopeP80216 Scope

Specifies the Specifies the air interfaceair interface including the medium including the mediumaccess control layer (access control layer (MACMAC) and physical layer) and physical layer((PHYPHY) of ) of fixedfixed point-to-multipointpoint-to-multipoint broadband broadbandwireless access systems providing wireless access systems providing multiplemultipleservicesservices The medium access control layer is The medium access control layer iscapable of supporting capable of supporting multiple physical layermultiple physical layerspecifications optimized for the frequency bands ofspecifications optimized for the frequency bands ofthe application The standard includes a the application The standard includes a particularparticularphysical layerphysical layer specification broadly applicable to specification broadly applicable tosystems operating systems operating between 10 and 66 GHzbetween 10 and 66 GHz

Point-to-MultipointPoint-to-Multipoint

Wireless MAN not a LANWireless MAN not a LANbullbull Base Station (BS) connected to public networksBase Station (BS) connected to public networks

bullbull BS serves Subscriber Stations (BS serves Subscriber Stations (SSsSSs))ndashndash BS and SS are stationaryBS and SS are stationary

ndashndash SS typically serves a building (business or residence)SS typically serves a building (business or residence)

ndashndash provide SS with first-mile access to public networksprovide SS with first-mile access to public networks

bullbull Multiple services with different Multiple services with different QoSQoS priority prioritysimultaneouslysimultaneously

Reference ModelReference Model

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 2: Mobile WiMAX : A Technical Overview

Presentation AuthorsPresentation Authors

bullbull Roger B Marks NIST (Chair 80216)Roger B Marks NIST (Chair 80216)

bullbull Carl Carl EklundEklund Nokia (80216 TG1 MAC Chair) Nokia (80216 TG1 MAC Chair)

bullbull Ken Stanwood Ensemble CommunicationsKen Stanwood Ensemble Communications

bullbull Stanley Wang Ensemble CommunicationsStanley Wang Ensemble Communications

OutlineOutline

bullbull Overview IEEE 80216 Air Interface StandardOverview IEEE 80216 Air Interface Standardndashndash P80216P80216 Air Interface (MAC and 10 - 66 GHz PHY)Air Interface (MAC and 10 - 66 GHz PHY)ndashndash P80216aP80216a Amendment 2-11 GHz (licensed)Amendment 2-11 GHz (licensed)ndashndash P80216bP80216b Amendment (license-exempt)Amendment (license-exempt)

bullbull PHY considerations in the 80216 MACPHY considerations in the 80216 MAC

bullbull The 80216 MAC as defined in P80216D5The 80216 MAC as defined in P80216D5

bullbull MAC Enhancements under developmentMAC Enhancements under development

IEEE 80216 HistoryIEEE 80216 History

bullbull SponsorsSponsorsbullbull IEEE Computer SocietyIEEE Computer Society

bullbull IEEE Microwave Theory and Techniques SocietyIEEE Microwave Theory and Techniques Society

bullbull Project Development Summer 1998Project Development Summer 1998

bullbull IEEE 802 Tutorial November 1998IEEE 802 Tutorial November 1998

bullbull IEEE Study GroupIEEE Study Groupbullbull November 1998-March 1999November 1998-March 1999

bullbull Session 1 July 1999Session 1 July 1999

bullbull Session 16 November 2001Session 16 November 2001

IEEE 80216 by the NumbersIEEE 80216 by the Numbers

bullbull 163 Members163 Members

bullbull 67 ldquoPotential Membersrdquo67 ldquoPotential Membersrdquo

bullbull 62 Official Observers62 Official Observers

bullbull 700 different individuals have attended a700 different individuals have attended asessionsession

bullbull 28 Million file downloads in year 200028 Million file downloads in year 2000

bullbull Members and Potential Members fromMembers and Potential Members frombullbull 10 countries10 countries

bullbull gt110 companiesgt110 companies

IEEE 80216 ProjectsIEEE 80216 Projectsbullbull Air Interface (Air Interface (PHYsPHYs with common MAC) with common MAC)

bullbull P80216 10-66 GHzP80216 10-66 GHzbullbull Completed IEEE Sponsor BallotCompleted IEEE Sponsor Ballot

bullbull On On RevCom RevCom agenda for December 5 2001agenda for December 5 2001

bullbull P80216a 2-11 GHzP80216a 2-11 GHzbullbull Licensed bands onlyLicensed bands only

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull P80216b 5-6 GHzP80216b 5-6 GHzbullbull License-exempt (ldquoLicense-exempt (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull CoexistenceCoexistencebullbull IEEE 802162 (10-66 GHz)IEEE 802162 (10-66 GHz)

bullbull Published in September 2001Published in September 2001

bullbull P802162a amendment w 2-11 P802162a amendment w 2-11 GHz GHz licensedlicensed

IEEE P80216IEEE P80216

Standard Air Interface for FixedStandard Air Interface for FixedBroadband Wireless AccessBroadband Wireless Access

SystemsSystems

IEEE P80216 HistoryIEEE P80216 Historybullbull July-September 1999July-September 1999 Functional Requirements Functional Requirements

bullbull November 1999November 1999 Proposals (14 for MAC) Proposals (14 for MAC)

bullbull January 2000January 2000 2 Consolidated Proposals 2 Consolidated Proposalsndashndash 1 MAC proposal based on DOCSIS1 MAC proposal based on DOCSIS

ndashndash 1 not1 not

bullbull May 2000May 2000 Plan to Merge 2 Proposals Plan to Merge 2 Proposals

bullbull August 2000August 2000 Rev 0 Rev 0

bullbull until February 2001until February 2001 Working Group Review Working Group Reviewndashndash formal comment processformal comment process

bullbull February-August 2001February-August 2001 WG Letter Ballot WG Letter Ballot

bullbull August-October 2001August-October 2001 IEEE Sponsor Ballot IEEE Sponsor Ballot

bullbull 5 December 20015 December 2001 RevCom RevCom approval agendaapproval agenda

P80216 ScopeP80216 Scope

Specifies the Specifies the air interfaceair interface including the medium including the mediumaccess control layer (access control layer (MACMAC) and physical layer) and physical layer((PHYPHY) of ) of fixedfixed point-to-multipointpoint-to-multipoint broadband broadbandwireless access systems providing wireless access systems providing multiplemultipleservicesservices The medium access control layer is The medium access control layer iscapable of supporting capable of supporting multiple physical layermultiple physical layerspecifications optimized for the frequency bands ofspecifications optimized for the frequency bands ofthe application The standard includes a the application The standard includes a particularparticularphysical layerphysical layer specification broadly applicable to specification broadly applicable tosystems operating systems operating between 10 and 66 GHzbetween 10 and 66 GHz

Point-to-MultipointPoint-to-Multipoint

Wireless MAN not a LANWireless MAN not a LANbullbull Base Station (BS) connected to public networksBase Station (BS) connected to public networks

bullbull BS serves Subscriber Stations (BS serves Subscriber Stations (SSsSSs))ndashndash BS and SS are stationaryBS and SS are stationary

ndashndash SS typically serves a building (business or residence)SS typically serves a building (business or residence)

ndashndash provide SS with first-mile access to public networksprovide SS with first-mile access to public networks

bullbull Multiple services with different Multiple services with different QoSQoS priority prioritysimultaneouslysimultaneously

Reference ModelReference Model

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 3: Mobile WiMAX : A Technical Overview

OutlineOutline

bullbull Overview IEEE 80216 Air Interface StandardOverview IEEE 80216 Air Interface Standardndashndash P80216P80216 Air Interface (MAC and 10 - 66 GHz PHY)Air Interface (MAC and 10 - 66 GHz PHY)ndashndash P80216aP80216a Amendment 2-11 GHz (licensed)Amendment 2-11 GHz (licensed)ndashndash P80216bP80216b Amendment (license-exempt)Amendment (license-exempt)

bullbull PHY considerations in the 80216 MACPHY considerations in the 80216 MAC

bullbull The 80216 MAC as defined in P80216D5The 80216 MAC as defined in P80216D5

bullbull MAC Enhancements under developmentMAC Enhancements under development

IEEE 80216 HistoryIEEE 80216 History

bullbull SponsorsSponsorsbullbull IEEE Computer SocietyIEEE Computer Society

bullbull IEEE Microwave Theory and Techniques SocietyIEEE Microwave Theory and Techniques Society

bullbull Project Development Summer 1998Project Development Summer 1998

bullbull IEEE 802 Tutorial November 1998IEEE 802 Tutorial November 1998

bullbull IEEE Study GroupIEEE Study Groupbullbull November 1998-March 1999November 1998-March 1999

bullbull Session 1 July 1999Session 1 July 1999

bullbull Session 16 November 2001Session 16 November 2001

IEEE 80216 by the NumbersIEEE 80216 by the Numbers

bullbull 163 Members163 Members

bullbull 67 ldquoPotential Membersrdquo67 ldquoPotential Membersrdquo

bullbull 62 Official Observers62 Official Observers

bullbull 700 different individuals have attended a700 different individuals have attended asessionsession

bullbull 28 Million file downloads in year 200028 Million file downloads in year 2000

bullbull Members and Potential Members fromMembers and Potential Members frombullbull 10 countries10 countries

bullbull gt110 companiesgt110 companies

IEEE 80216 ProjectsIEEE 80216 Projectsbullbull Air Interface (Air Interface (PHYsPHYs with common MAC) with common MAC)

bullbull P80216 10-66 GHzP80216 10-66 GHzbullbull Completed IEEE Sponsor BallotCompleted IEEE Sponsor Ballot

bullbull On On RevCom RevCom agenda for December 5 2001agenda for December 5 2001

bullbull P80216a 2-11 GHzP80216a 2-11 GHzbullbull Licensed bands onlyLicensed bands only

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull P80216b 5-6 GHzP80216b 5-6 GHzbullbull License-exempt (ldquoLicense-exempt (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull CoexistenceCoexistencebullbull IEEE 802162 (10-66 GHz)IEEE 802162 (10-66 GHz)

bullbull Published in September 2001Published in September 2001

bullbull P802162a amendment w 2-11 P802162a amendment w 2-11 GHz GHz licensedlicensed

IEEE P80216IEEE P80216

Standard Air Interface for FixedStandard Air Interface for FixedBroadband Wireless AccessBroadband Wireless Access

SystemsSystems

IEEE P80216 HistoryIEEE P80216 Historybullbull July-September 1999July-September 1999 Functional Requirements Functional Requirements

bullbull November 1999November 1999 Proposals (14 for MAC) Proposals (14 for MAC)

bullbull January 2000January 2000 2 Consolidated Proposals 2 Consolidated Proposalsndashndash 1 MAC proposal based on DOCSIS1 MAC proposal based on DOCSIS

ndashndash 1 not1 not

bullbull May 2000May 2000 Plan to Merge 2 Proposals Plan to Merge 2 Proposals

bullbull August 2000August 2000 Rev 0 Rev 0

bullbull until February 2001until February 2001 Working Group Review Working Group Reviewndashndash formal comment processformal comment process

bullbull February-August 2001February-August 2001 WG Letter Ballot WG Letter Ballot

bullbull August-October 2001August-October 2001 IEEE Sponsor Ballot IEEE Sponsor Ballot

bullbull 5 December 20015 December 2001 RevCom RevCom approval agendaapproval agenda

P80216 ScopeP80216 Scope

Specifies the Specifies the air interfaceair interface including the medium including the mediumaccess control layer (access control layer (MACMAC) and physical layer) and physical layer((PHYPHY) of ) of fixedfixed point-to-multipointpoint-to-multipoint broadband broadbandwireless access systems providing wireless access systems providing multiplemultipleservicesservices The medium access control layer is The medium access control layer iscapable of supporting capable of supporting multiple physical layermultiple physical layerspecifications optimized for the frequency bands ofspecifications optimized for the frequency bands ofthe application The standard includes a the application The standard includes a particularparticularphysical layerphysical layer specification broadly applicable to specification broadly applicable tosystems operating systems operating between 10 and 66 GHzbetween 10 and 66 GHz

Point-to-MultipointPoint-to-Multipoint

Wireless MAN not a LANWireless MAN not a LANbullbull Base Station (BS) connected to public networksBase Station (BS) connected to public networks

bullbull BS serves Subscriber Stations (BS serves Subscriber Stations (SSsSSs))ndashndash BS and SS are stationaryBS and SS are stationary

ndashndash SS typically serves a building (business or residence)SS typically serves a building (business or residence)

ndashndash provide SS with first-mile access to public networksprovide SS with first-mile access to public networks

bullbull Multiple services with different Multiple services with different QoSQoS priority prioritysimultaneouslysimultaneously

Reference ModelReference Model

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 4: Mobile WiMAX : A Technical Overview

IEEE 80216 HistoryIEEE 80216 History

bullbull SponsorsSponsorsbullbull IEEE Computer SocietyIEEE Computer Society

bullbull IEEE Microwave Theory and Techniques SocietyIEEE Microwave Theory and Techniques Society

bullbull Project Development Summer 1998Project Development Summer 1998

bullbull IEEE 802 Tutorial November 1998IEEE 802 Tutorial November 1998

bullbull IEEE Study GroupIEEE Study Groupbullbull November 1998-March 1999November 1998-March 1999

bullbull Session 1 July 1999Session 1 July 1999

bullbull Session 16 November 2001Session 16 November 2001

IEEE 80216 by the NumbersIEEE 80216 by the Numbers

bullbull 163 Members163 Members

bullbull 67 ldquoPotential Membersrdquo67 ldquoPotential Membersrdquo

bullbull 62 Official Observers62 Official Observers

bullbull 700 different individuals have attended a700 different individuals have attended asessionsession

bullbull 28 Million file downloads in year 200028 Million file downloads in year 2000

bullbull Members and Potential Members fromMembers and Potential Members frombullbull 10 countries10 countries

bullbull gt110 companiesgt110 companies

IEEE 80216 ProjectsIEEE 80216 Projectsbullbull Air Interface (Air Interface (PHYsPHYs with common MAC) with common MAC)

bullbull P80216 10-66 GHzP80216 10-66 GHzbullbull Completed IEEE Sponsor BallotCompleted IEEE Sponsor Ballot

bullbull On On RevCom RevCom agenda for December 5 2001agenda for December 5 2001

bullbull P80216a 2-11 GHzP80216a 2-11 GHzbullbull Licensed bands onlyLicensed bands only

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull P80216b 5-6 GHzP80216b 5-6 GHzbullbull License-exempt (ldquoLicense-exempt (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull CoexistenceCoexistencebullbull IEEE 802162 (10-66 GHz)IEEE 802162 (10-66 GHz)

bullbull Published in September 2001Published in September 2001

bullbull P802162a amendment w 2-11 P802162a amendment w 2-11 GHz GHz licensedlicensed

IEEE P80216IEEE P80216

Standard Air Interface for FixedStandard Air Interface for FixedBroadband Wireless AccessBroadband Wireless Access

SystemsSystems

IEEE P80216 HistoryIEEE P80216 Historybullbull July-September 1999July-September 1999 Functional Requirements Functional Requirements

bullbull November 1999November 1999 Proposals (14 for MAC) Proposals (14 for MAC)

bullbull January 2000January 2000 2 Consolidated Proposals 2 Consolidated Proposalsndashndash 1 MAC proposal based on DOCSIS1 MAC proposal based on DOCSIS

ndashndash 1 not1 not

bullbull May 2000May 2000 Plan to Merge 2 Proposals Plan to Merge 2 Proposals

bullbull August 2000August 2000 Rev 0 Rev 0

bullbull until February 2001until February 2001 Working Group Review Working Group Reviewndashndash formal comment processformal comment process

bullbull February-August 2001February-August 2001 WG Letter Ballot WG Letter Ballot

bullbull August-October 2001August-October 2001 IEEE Sponsor Ballot IEEE Sponsor Ballot

bullbull 5 December 20015 December 2001 RevCom RevCom approval agendaapproval agenda

P80216 ScopeP80216 Scope

Specifies the Specifies the air interfaceair interface including the medium including the mediumaccess control layer (access control layer (MACMAC) and physical layer) and physical layer((PHYPHY) of ) of fixedfixed point-to-multipointpoint-to-multipoint broadband broadbandwireless access systems providing wireless access systems providing multiplemultipleservicesservices The medium access control layer is The medium access control layer iscapable of supporting capable of supporting multiple physical layermultiple physical layerspecifications optimized for the frequency bands ofspecifications optimized for the frequency bands ofthe application The standard includes a the application The standard includes a particularparticularphysical layerphysical layer specification broadly applicable to specification broadly applicable tosystems operating systems operating between 10 and 66 GHzbetween 10 and 66 GHz

Point-to-MultipointPoint-to-Multipoint

Wireless MAN not a LANWireless MAN not a LANbullbull Base Station (BS) connected to public networksBase Station (BS) connected to public networks

bullbull BS serves Subscriber Stations (BS serves Subscriber Stations (SSsSSs))ndashndash BS and SS are stationaryBS and SS are stationary

ndashndash SS typically serves a building (business or residence)SS typically serves a building (business or residence)

ndashndash provide SS with first-mile access to public networksprovide SS with first-mile access to public networks

bullbull Multiple services with different Multiple services with different QoSQoS priority prioritysimultaneouslysimultaneously

Reference ModelReference Model

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 5: Mobile WiMAX : A Technical Overview

IEEE 80216 by the NumbersIEEE 80216 by the Numbers

bullbull 163 Members163 Members

bullbull 67 ldquoPotential Membersrdquo67 ldquoPotential Membersrdquo

bullbull 62 Official Observers62 Official Observers

bullbull 700 different individuals have attended a700 different individuals have attended asessionsession

bullbull 28 Million file downloads in year 200028 Million file downloads in year 2000

bullbull Members and Potential Members fromMembers and Potential Members frombullbull 10 countries10 countries

bullbull gt110 companiesgt110 companies

IEEE 80216 ProjectsIEEE 80216 Projectsbullbull Air Interface (Air Interface (PHYsPHYs with common MAC) with common MAC)

bullbull P80216 10-66 GHzP80216 10-66 GHzbullbull Completed IEEE Sponsor BallotCompleted IEEE Sponsor Ballot

bullbull On On RevCom RevCom agenda for December 5 2001agenda for December 5 2001

bullbull P80216a 2-11 GHzP80216a 2-11 GHzbullbull Licensed bands onlyLicensed bands only

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull P80216b 5-6 GHzP80216b 5-6 GHzbullbull License-exempt (ldquoLicense-exempt (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull CoexistenceCoexistencebullbull IEEE 802162 (10-66 GHz)IEEE 802162 (10-66 GHz)

bullbull Published in September 2001Published in September 2001

bullbull P802162a amendment w 2-11 P802162a amendment w 2-11 GHz GHz licensedlicensed

IEEE P80216IEEE P80216

Standard Air Interface for FixedStandard Air Interface for FixedBroadband Wireless AccessBroadband Wireless Access

SystemsSystems

IEEE P80216 HistoryIEEE P80216 Historybullbull July-September 1999July-September 1999 Functional Requirements Functional Requirements

bullbull November 1999November 1999 Proposals (14 for MAC) Proposals (14 for MAC)

bullbull January 2000January 2000 2 Consolidated Proposals 2 Consolidated Proposalsndashndash 1 MAC proposal based on DOCSIS1 MAC proposal based on DOCSIS

ndashndash 1 not1 not

bullbull May 2000May 2000 Plan to Merge 2 Proposals Plan to Merge 2 Proposals

bullbull August 2000August 2000 Rev 0 Rev 0

bullbull until February 2001until February 2001 Working Group Review Working Group Reviewndashndash formal comment processformal comment process

bullbull February-August 2001February-August 2001 WG Letter Ballot WG Letter Ballot

bullbull August-October 2001August-October 2001 IEEE Sponsor Ballot IEEE Sponsor Ballot

bullbull 5 December 20015 December 2001 RevCom RevCom approval agendaapproval agenda

P80216 ScopeP80216 Scope

Specifies the Specifies the air interfaceair interface including the medium including the mediumaccess control layer (access control layer (MACMAC) and physical layer) and physical layer((PHYPHY) of ) of fixedfixed point-to-multipointpoint-to-multipoint broadband broadbandwireless access systems providing wireless access systems providing multiplemultipleservicesservices The medium access control layer is The medium access control layer iscapable of supporting capable of supporting multiple physical layermultiple physical layerspecifications optimized for the frequency bands ofspecifications optimized for the frequency bands ofthe application The standard includes a the application The standard includes a particularparticularphysical layerphysical layer specification broadly applicable to specification broadly applicable tosystems operating systems operating between 10 and 66 GHzbetween 10 and 66 GHz

Point-to-MultipointPoint-to-Multipoint

Wireless MAN not a LANWireless MAN not a LANbullbull Base Station (BS) connected to public networksBase Station (BS) connected to public networks

bullbull BS serves Subscriber Stations (BS serves Subscriber Stations (SSsSSs))ndashndash BS and SS are stationaryBS and SS are stationary

ndashndash SS typically serves a building (business or residence)SS typically serves a building (business or residence)

ndashndash provide SS with first-mile access to public networksprovide SS with first-mile access to public networks

bullbull Multiple services with different Multiple services with different QoSQoS priority prioritysimultaneouslysimultaneously

Reference ModelReference Model

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 6: Mobile WiMAX : A Technical Overview

IEEE 80216 ProjectsIEEE 80216 Projectsbullbull Air Interface (Air Interface (PHYsPHYs with common MAC) with common MAC)

bullbull P80216 10-66 GHzP80216 10-66 GHzbullbull Completed IEEE Sponsor BallotCompleted IEEE Sponsor Ballot

bullbull On On RevCom RevCom agenda for December 5 2001agenda for December 5 2001

bullbull P80216a 2-11 GHzP80216a 2-11 GHzbullbull Licensed bands onlyLicensed bands only

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull P80216b 5-6 GHzP80216b 5-6 GHzbullbull License-exempt (ldquoLicense-exempt (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

bullbull Expect OK to launch WG Letter Ballot this weekExpect OK to launch WG Letter Ballot this week

bullbull CoexistenceCoexistencebullbull IEEE 802162 (10-66 GHz)IEEE 802162 (10-66 GHz)

bullbull Published in September 2001Published in September 2001

bullbull P802162a amendment w 2-11 P802162a amendment w 2-11 GHz GHz licensedlicensed

IEEE P80216IEEE P80216

Standard Air Interface for FixedStandard Air Interface for FixedBroadband Wireless AccessBroadband Wireless Access

SystemsSystems

IEEE P80216 HistoryIEEE P80216 Historybullbull July-September 1999July-September 1999 Functional Requirements Functional Requirements

bullbull November 1999November 1999 Proposals (14 for MAC) Proposals (14 for MAC)

bullbull January 2000January 2000 2 Consolidated Proposals 2 Consolidated Proposalsndashndash 1 MAC proposal based on DOCSIS1 MAC proposal based on DOCSIS

ndashndash 1 not1 not

bullbull May 2000May 2000 Plan to Merge 2 Proposals Plan to Merge 2 Proposals

bullbull August 2000August 2000 Rev 0 Rev 0

bullbull until February 2001until February 2001 Working Group Review Working Group Reviewndashndash formal comment processformal comment process

bullbull February-August 2001February-August 2001 WG Letter Ballot WG Letter Ballot

bullbull August-October 2001August-October 2001 IEEE Sponsor Ballot IEEE Sponsor Ballot

bullbull 5 December 20015 December 2001 RevCom RevCom approval agendaapproval agenda

P80216 ScopeP80216 Scope

Specifies the Specifies the air interfaceair interface including the medium including the mediumaccess control layer (access control layer (MACMAC) and physical layer) and physical layer((PHYPHY) of ) of fixedfixed point-to-multipointpoint-to-multipoint broadband broadbandwireless access systems providing wireless access systems providing multiplemultipleservicesservices The medium access control layer is The medium access control layer iscapable of supporting capable of supporting multiple physical layermultiple physical layerspecifications optimized for the frequency bands ofspecifications optimized for the frequency bands ofthe application The standard includes a the application The standard includes a particularparticularphysical layerphysical layer specification broadly applicable to specification broadly applicable tosystems operating systems operating between 10 and 66 GHzbetween 10 and 66 GHz

Point-to-MultipointPoint-to-Multipoint

Wireless MAN not a LANWireless MAN not a LANbullbull Base Station (BS) connected to public networksBase Station (BS) connected to public networks

bullbull BS serves Subscriber Stations (BS serves Subscriber Stations (SSsSSs))ndashndash BS and SS are stationaryBS and SS are stationary

ndashndash SS typically serves a building (business or residence)SS typically serves a building (business or residence)

ndashndash provide SS with first-mile access to public networksprovide SS with first-mile access to public networks

bullbull Multiple services with different Multiple services with different QoSQoS priority prioritysimultaneouslysimultaneously

Reference ModelReference Model

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 7: Mobile WiMAX : A Technical Overview

IEEE P80216IEEE P80216

Standard Air Interface for FixedStandard Air Interface for FixedBroadband Wireless AccessBroadband Wireless Access

SystemsSystems

IEEE P80216 HistoryIEEE P80216 Historybullbull July-September 1999July-September 1999 Functional Requirements Functional Requirements

bullbull November 1999November 1999 Proposals (14 for MAC) Proposals (14 for MAC)

bullbull January 2000January 2000 2 Consolidated Proposals 2 Consolidated Proposalsndashndash 1 MAC proposal based on DOCSIS1 MAC proposal based on DOCSIS

ndashndash 1 not1 not

bullbull May 2000May 2000 Plan to Merge 2 Proposals Plan to Merge 2 Proposals

bullbull August 2000August 2000 Rev 0 Rev 0

bullbull until February 2001until February 2001 Working Group Review Working Group Reviewndashndash formal comment processformal comment process

bullbull February-August 2001February-August 2001 WG Letter Ballot WG Letter Ballot

bullbull August-October 2001August-October 2001 IEEE Sponsor Ballot IEEE Sponsor Ballot

bullbull 5 December 20015 December 2001 RevCom RevCom approval agendaapproval agenda

P80216 ScopeP80216 Scope

Specifies the Specifies the air interfaceair interface including the medium including the mediumaccess control layer (access control layer (MACMAC) and physical layer) and physical layer((PHYPHY) of ) of fixedfixed point-to-multipointpoint-to-multipoint broadband broadbandwireless access systems providing wireless access systems providing multiplemultipleservicesservices The medium access control layer is The medium access control layer iscapable of supporting capable of supporting multiple physical layermultiple physical layerspecifications optimized for the frequency bands ofspecifications optimized for the frequency bands ofthe application The standard includes a the application The standard includes a particularparticularphysical layerphysical layer specification broadly applicable to specification broadly applicable tosystems operating systems operating between 10 and 66 GHzbetween 10 and 66 GHz

Point-to-MultipointPoint-to-Multipoint

Wireless MAN not a LANWireless MAN not a LANbullbull Base Station (BS) connected to public networksBase Station (BS) connected to public networks

bullbull BS serves Subscriber Stations (BS serves Subscriber Stations (SSsSSs))ndashndash BS and SS are stationaryBS and SS are stationary

ndashndash SS typically serves a building (business or residence)SS typically serves a building (business or residence)

ndashndash provide SS with first-mile access to public networksprovide SS with first-mile access to public networks

bullbull Multiple services with different Multiple services with different QoSQoS priority prioritysimultaneouslysimultaneously

Reference ModelReference Model

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 8: Mobile WiMAX : A Technical Overview

IEEE P80216 HistoryIEEE P80216 Historybullbull July-September 1999July-September 1999 Functional Requirements Functional Requirements

bullbull November 1999November 1999 Proposals (14 for MAC) Proposals (14 for MAC)

bullbull January 2000January 2000 2 Consolidated Proposals 2 Consolidated Proposalsndashndash 1 MAC proposal based on DOCSIS1 MAC proposal based on DOCSIS

ndashndash 1 not1 not

bullbull May 2000May 2000 Plan to Merge 2 Proposals Plan to Merge 2 Proposals

bullbull August 2000August 2000 Rev 0 Rev 0

bullbull until February 2001until February 2001 Working Group Review Working Group Reviewndashndash formal comment processformal comment process

bullbull February-August 2001February-August 2001 WG Letter Ballot WG Letter Ballot

bullbull August-October 2001August-October 2001 IEEE Sponsor Ballot IEEE Sponsor Ballot

bullbull 5 December 20015 December 2001 RevCom RevCom approval agendaapproval agenda

P80216 ScopeP80216 Scope

Specifies the Specifies the air interfaceair interface including the medium including the mediumaccess control layer (access control layer (MACMAC) and physical layer) and physical layer((PHYPHY) of ) of fixedfixed point-to-multipointpoint-to-multipoint broadband broadbandwireless access systems providing wireless access systems providing multiplemultipleservicesservices The medium access control layer is The medium access control layer iscapable of supporting capable of supporting multiple physical layermultiple physical layerspecifications optimized for the frequency bands ofspecifications optimized for the frequency bands ofthe application The standard includes a the application The standard includes a particularparticularphysical layerphysical layer specification broadly applicable to specification broadly applicable tosystems operating systems operating between 10 and 66 GHzbetween 10 and 66 GHz

Point-to-MultipointPoint-to-Multipoint

Wireless MAN not a LANWireless MAN not a LANbullbull Base Station (BS) connected to public networksBase Station (BS) connected to public networks

bullbull BS serves Subscriber Stations (BS serves Subscriber Stations (SSsSSs))ndashndash BS and SS are stationaryBS and SS are stationary

ndashndash SS typically serves a building (business or residence)SS typically serves a building (business or residence)

ndashndash provide SS with first-mile access to public networksprovide SS with first-mile access to public networks

bullbull Multiple services with different Multiple services with different QoSQoS priority prioritysimultaneouslysimultaneously

Reference ModelReference Model

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 9: Mobile WiMAX : A Technical Overview

P80216 ScopeP80216 Scope

Specifies the Specifies the air interfaceair interface including the medium including the mediumaccess control layer (access control layer (MACMAC) and physical layer) and physical layer((PHYPHY) of ) of fixedfixed point-to-multipointpoint-to-multipoint broadband broadbandwireless access systems providing wireless access systems providing multiplemultipleservicesservices The medium access control layer is The medium access control layer iscapable of supporting capable of supporting multiple physical layermultiple physical layerspecifications optimized for the frequency bands ofspecifications optimized for the frequency bands ofthe application The standard includes a the application The standard includes a particularparticularphysical layerphysical layer specification broadly applicable to specification broadly applicable tosystems operating systems operating between 10 and 66 GHzbetween 10 and 66 GHz

Point-to-MultipointPoint-to-Multipoint

Wireless MAN not a LANWireless MAN not a LANbullbull Base Station (BS) connected to public networksBase Station (BS) connected to public networks

bullbull BS serves Subscriber Stations (BS serves Subscriber Stations (SSsSSs))ndashndash BS and SS are stationaryBS and SS are stationary

ndashndash SS typically serves a building (business or residence)SS typically serves a building (business or residence)

ndashndash provide SS with first-mile access to public networksprovide SS with first-mile access to public networks

bullbull Multiple services with different Multiple services with different QoSQoS priority prioritysimultaneouslysimultaneously

Reference ModelReference Model

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 10: Mobile WiMAX : A Technical Overview

Point-to-MultipointPoint-to-Multipoint

Wireless MAN not a LANWireless MAN not a LANbullbull Base Station (BS) connected to public networksBase Station (BS) connected to public networks

bullbull BS serves Subscriber Stations (BS serves Subscriber Stations (SSsSSs))ndashndash BS and SS are stationaryBS and SS are stationary

ndashndash SS typically serves a building (business or residence)SS typically serves a building (business or residence)

ndashndash provide SS with first-mile access to public networksprovide SS with first-mile access to public networks

bullbull Multiple services with different Multiple services with different QoSQoS priority prioritysimultaneouslysimultaneously

Reference ModelReference Model

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 11: Mobile WiMAX : A Technical Overview

Reference ModelReference Model

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 12: Mobile WiMAX : A Technical Overview

PHY Considerations thatPHY Considerations that

Effect the MAC (10-66 Effect the MAC (10-66 GHzGHz))bullbull Broadband ChannelsBroadband Channels

ndashndash Wide channels (20 25 or 28 MHz)Wide channels (20 25 or 28 MHz)ndashndash High capacity ndash Downlink High capacity ndash Downlink AND AND UplinkUplink

bullbull Multiple AccessMultiple Accessndashndash TDMTDMATDMTDMAndashndash High rate burst modemsHigh rate burst modems

bullbull Adaptive Burst Profiles onAdaptive Burst Profiles on Uplink Uplink and and Downlink Downlinkbullbull Duplex scheme agnosticDuplex scheme agnostic

ndashndash Time-Division Duplex (TDD)Time-Division Duplex (TDD)ndashndash Frequency-Division Duplex (FDD) [including Burst FDD]Frequency-Division Duplex (FDD) [including Burst FDD]

bullbull Support for Half-Duplex TerminalsSupport for Half-Duplex Terminals

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 13: Mobile WiMAX : A Technical Overview

Adaptive PHYAdaptive PHY

(burst-by-burst(burst-by-burst adaptivity adaptivity not shown) not shown)

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 14: Mobile WiMAX : A Technical Overview

Adaptive Burst ProfilesAdaptive Burst Profiles

bullbull Burst profileBurst profilendashndash Modulation and FECModulation and FEC

bullbull Dynamically assigned according to link conditionsDynamically assigned according to link conditionsndashndash Burst by burst per subscriber stationBurst by burst per subscriber station

ndashndash Trade-off capacity vs robustness in Trade-off capacity vs robustness in real timereal time

bullbull Roughly doubled capacity for the same cell areaRoughly doubled capacity for the same cell area

bullbull Burst profile for Burst profile for downlinkdownlink broadcast channel is well- broadcast channel is well-knownknownndashndash All other burst profiles could be configured ldquoon the flyrdquoAll other burst profiles could be configured ldquoon the flyrdquo

ndashndash Subscriber station capabilities recognized at registrationSubscriber station capabilities recognized at registration

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 15: Mobile WiMAX : A Technical Overview

Duplex Scheme SupportDuplex Scheme Support

bullbull OnOn downlink downlink SS is associated with a specific burst SS is associated with a specific burstbullbull OnOn uplink uplink SS is allotted a variable length time slot SS is allotted a variable length time slot

for their transmissionsfor their transmissionsbullbull Time-Division Duplex (TDD)Time-Division Duplex (TDD)

ndashndash DownlinkDownlink amp amp Uplink Uplink time share the same RF channel time share the same RF channelndashndash Dynamic asymmetryDynamic asymmetryndashndash SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

bullbull Frequency-Division Duplex (FDD)Frequency-Division Duplex (FDD)ndashndash DownlinkDownlink amp amp Uplink Uplink on separate RF channels on separate RF channelsndashndash Static asymmetryStatic asymmetryndashndash Half-duplex Half-duplex SSsSSs supported supported

bullbull SS does not transmit amp receive simultaneously (low cost)SS does not transmit amp receive simultaneously (low cost)

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 16: Mobile WiMAX : A Technical Overview

TDD Frame (10-66 TDD Frame (10-66 GHzGHz))

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 17: Mobile WiMAX : A Technical Overview

TDD Downlink TDD Downlink SubframeSubframe

DIUC Downlink Interval Usage Code

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 18: Mobile WiMAX : A Technical Overview

Burst FDD FramingBurst FDD Framing

frame

Broadcast

Full Duplex Capable User

Half Duplex Terminal 1

Half Duplex Terminal 2

UPLINK

DOWNLINK

Allows scheduling flexibility

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 19: Mobile WiMAX : A Technical Overview

FDD Downlink FDD Downlink SubframeSubframe

TDMA portion transmits data to some half-duplex SSs (the onesscheduled to transmit earlier in the frame than they receive)

bull Need preamble to re-sync (carrier phase)

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 20: Mobile WiMAX : A Technical Overview

Baud Rates amp Channel SizeBaud Rates amp Channel Size

(10-66 (10-66 GHzGHz))bullbull Flexible plan - allows equipmentFlexible plan - allows equipment

manufactures to choose according tomanufactures to choose according tospectrum requirementsspectrum requirements

QPSK QPSK 16-QAM16-QAM 64-QAM64-QAMChannelChannel SymbolSymbol Bit Rate Bit Rate Bit Rate Bit Rate Bit RateBit RateWidthWidth RateRate (MHz)(MHz) ((MsymMsyms)s) ((MbitMbits) s) ((MbitMbits)s) ((MbitMbits)s)

2020 1616 3232 6464 969625 25 2020 40 40 80 80 12012028 28 224224 448 448 896 896 13441344

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 21: Mobile WiMAX : A Technical Overview

MAC RequirementsMAC Requirementsbullbull Provide Network AccessProvide Network Accessbullbull Address the Address the Wireless Wireless environmentenvironment

ndashndash eg very efficient use of spectrum eg very efficient use of spectrum

bullbull Broadband servicesBroadband servicesndashndash Very high bit rates downlink and uplinkVery high bit rates downlink and uplinkndashndash A range of QoS requirementsA range of QoS requirementsndashndash Ethernet IPv4 IPv6 ATM Ethernet IPv4 IPv6 ATM

bullbull Likelihood of terminal being sharedLikelihood of terminal being sharedndashndash Base Station may be heavily loadedBase Station may be heavily loaded

bullbull SecuritySecuritybullbull Protocol-Independent EngineProtocol-Independent Engine

ndashndash Convergence layers to ATM IP Ethernet Convergence layers to ATM IP Ethernet

bullbull Support both TDD and FDD in the PHYSupport both TDD and FDD in the PHY

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 22: Mobile WiMAX : A Technical Overview

80216 MAC Overview80216 MAC Overviewbullbull Point-to-MultipointPoint-to-Multipointbullbull Metropolitan Area NetworkMetropolitan Area Networkbullbull Connection-orientedConnection-orientedbullbull Supports difficult user environmentsSupports difficult user environments

ndashndash High bandwidth hundreds of users per channelHigh bandwidth hundreds of users per channelndashndash Continuous and burst trafficContinuous and burst trafficndashndash Very efficient use of spectrumVery efficient use of spectrum

bullbull Protocol-Independent core (ATM IP Ethernet hellip)Protocol-Independent core (ATM IP Ethernet hellip)bullbull Balances between stability of Balances between stability of contentionlesscontentionless and and

efficiency of contention-based operationefficiency of contention-based operationbullbull Flexible QoS offeringsFlexible QoS offerings

ndashndash CBR CBR rtrt-VBR -VBR nrtnrt-VBR BE with granularity within classes-VBR BE with granularity within classes

bullbull Supports multiple 80216 Supports multiple 80216 PHYsPHYs

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 23: Mobile WiMAX : A Technical Overview

Relationship to DOCSISRelationship to DOCSIS

bullbull ManagementManagementndashndash Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)Dynamic service ldquoeditingrdquo protocol (AddChangeDelete)ndashndash Management message payload formatManagement message payload format

bullbull SecuritySecurityndashndash Authentication and PrivacyAuthentication and Privacy

bullbull Polling categoriesPolling categoriesbullbull Initial AccessInitial Access

ndashndash Slightly modified allowing terminal capability negotiationSlightly modified allowing terminal capability negotiation

bullbull Core MAC protocol engine is new design forCore MAC protocol engine is new design forWireless Metropolitan Area NetworksWireless Metropolitan Area Networks

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 24: Mobile WiMAX : A Technical Overview

DefinitionsDefinitionsbullbull Service Data Unit (SDU)Service Data Unit (SDU)

ndashndash Data units exchanged between adjacent layersData units exchanged between adjacent layers

bullbull Protocol Data Unit (PDU)Protocol Data Unit (PDU)ndashndash Data units exchanged between peer entitiesData units exchanged between peer entities

bullbull Connection and Connection IDConnection and Connection IDndashndash a unidirectional mapping between MAC peersa unidirectional mapping between MAC peers

over the over the airlinkairlink (uniquely identified by a CID) (uniquely identified by a CID)

bullbull Service Flow and Service Flow IDService Flow and Service Flow IDndashndash a unidirectional flow of MAC a unidirectional flow of MAC PDUsPDUs on a on a

connection that provides a particular QoSconnection that provides a particular QoS(uniquely identified by a SFID)(uniquely identified by a SFID)

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 25: Mobile WiMAX : A Technical Overview

ATM Convergence SublayerATM Convergence Sublayer

bullbull Support forSupport forndashndash VP (Virtual Path) switched connectionsVP (Virtual Path) switched connections

ndashndash VC (Virtual Channel) switched connectionsVC (Virtual Channel) switched connections

bullbull Support for end-to-end signaling ofSupport for end-to-end signaling ofdynamically created connectionsdynamically created connectionsndashndash SVCsSVCs

ndashndash soft soft PVCsPVCs

bullbull ATM header suppressionATM header suppression

bullbull Full QoS supportFull QoS support

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 26: Mobile WiMAX : A Technical Overview

Packet Convergence SublayerPacket Convergence Sublayer

bullbull Initial support for Ethernet IPv4 and IPv6Initial support for Ethernet IPv4 and IPv6

bullbull Payload header suppressionPayload header suppressionndashndash generic plus IP-specificgeneric plus IP-specific

bullbull Full QoS supportFull QoS support

bullbull Possible future support forPossible future support forndashndash PPPPPP

ndashndash MPLSMPLS

ndashndash etcetc

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 27: Mobile WiMAX : A Technical Overview

MAC AddressingMAC Addressing

bullbull SS has 48-bit IEEE MAC AddressSS has 48-bit IEEE MAC Address

bullbull BS has 48-bit Base Station IDBS has 48-bit Base Station IDndashndash Not a MAC addressNot a MAC address

ndashndash 24-bit operator indicator24-bit operator indicator

bullbull 16-bit Connection ID (CID)16-bit Connection ID (CID)ndashndash Used in MAC Used in MAC PDUsPDUs

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 28: Mobile WiMAX : A Technical Overview

MAC PDU TransmissionMAC PDU Transmission

bullbull MACMAC PDUs PDUs are transmitted in PHY bursts are transmitted in PHY bursts

bullbull A single PHY burst can contain multipleA single PHY burst can contain multipleConcatenated Concatenated MACMAC PDUs PDUs

bullbull The PHY burst can contain multiple FECThe PHY burst can contain multiple FECblocksblocks

bullbull MAC MAC PDUsPDUs may span FEC block boundaries may span FEC block boundaries

bullbull The TC layer between the MAC and theThe TC layer between the MAC and thePHY allows for capturing the start of the nextPHY allows for capturing the start of the nextMAC PDU in case of erroneous FEC blocksMAC PDU in case of erroneous FEC blocks

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 29: Mobile WiMAX : A Technical Overview

MAC PDU TransmissionMAC PDU Transmission

Preamble FEC block

Burst

MAC PDUs PDU 1 PDU 2 PDU 3 PDU 4 PDU 5

FEC 1 FEC 2 FEC 3

MAC PDUs

P

P

MAC Message SDU 1 SDU 2

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 30: Mobile WiMAX : A Technical Overview

MAC PDU formatMAC PDU format

bullbull The Generic MAC header has fixed formatThe Generic MAC header has fixed formatbullbull One or more MAC sub-headers may be part of theOne or more MAC sub-headers may be part of the

payloadpayloadbullbull The presence of sub-headers is indicated by a TypeThe presence of sub-headers is indicated by a Type

field in the Generic MAC headerfield in the Generic MAC header

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 31: Mobile WiMAX : A Technical Overview

Generic MAC HeaderGeneric MAC Header

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 32: Mobile WiMAX : A Technical Overview

FragmentationFragmentationbullbull Partitioning a MAC SDU into fragments transportedPartitioning a MAC SDU into fragments transported

in multiple MACin multiple MAC PDUs PDUs

bullbull Each connection can be in only a singleEach connection can be in only a singlefragmentation state at any timefragmentation state at any time

bullbull Contents of the fragmentation sub-headerContents of the fragmentation sub-header

ndashndash 2-bit Fragmentation Control (FC)2-bit Fragmentation Control (FC)bullbull UnfragmentedUnfragmented Last fragment First fragment Last fragment First fragment

Continuing fragmentContinuing fragment

ndashndash 3-bit Fragmentation Sequence Number (FSN)3-bit Fragmentation Sequence Number (FSN)bullbull required to detect missing continuing fragmentsrequired to detect missing continuing fragments

bullbull continuous counter across continuous counter across SDUsSDUs

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 33: Mobile WiMAX : A Technical Overview

PackingPacking

bullbull The process of combining multiple MACThe process of combining multiple MAC SDUs SDUs(or fragments thereof) into a single MAC PDU(or fragments thereof) into a single MAC PDU

bullbull On connections with variable length MAC On connections with variable length MAC SDUsSDUsndashndash Packed PDU contains a sub-header for each packedPacked PDU contains a sub-header for each packed

SDU (or fragment thereof)SDU (or fragment thereof)

bullbull On connections with fixed length MAC On connections with fixed length MAC SDUsSDUsndashndash No packing sub-header neededNo packing sub-header needed

bullbull Packing and fragmentation can be combinedPacking and fragmentation can be combined

bullbull Can in certain situations save up to 10 ofCan in certain situations save up to 10 ofsystem bandwidthsystem bandwidth

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 34: Mobile WiMAX : A Technical Overview

Packing Fixed-Length Packing Fixed-Length SDUsSDUs

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 35: Mobile WiMAX : A Technical Overview

Packing Variable-Length Packing Variable-Length SDUsSDUs

bullbull2 Byte Packing Sub-Header before each SDU2 Byte Packing Sub-Header before each SDUbullbullLength of the SDU 11 bitsLength of the SDU 11 bitsbullbullfragmentation control (FC) 2 bitsfragmentation control (FC) 2 bitsbullbullfragmentation sequence number (FS) 3 bitsfragmentation sequence number (FS) 3 bits

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 36: Mobile WiMAX : A Technical Overview

Packing with FragmentationPacking with Fragmentation

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 37: Mobile WiMAX : A Technical Overview

Downlink transmissionsDownlink transmissionsbullbull Two kinds of bursts TDM and TDMATwo kinds of bursts TDM and TDMA

bullbull All bursts are identified by a DIUCAll bursts are identified by a DIUC

ndashndash DownlinkDownlink Interval Usage Code Interval Usage Code

bullbull TDMA bursts haveTDMA bursts have resync resync preamble preamblendashndash allows for more flexible schedulingallows for more flexible scheduling

bullbull Each terminal listens to all bursts at its operationalEach terminal listens to all bursts at its operationalIUC or at a more robust one except when told toIUC or at a more robust one except when told totransmittransmit

bullbull Each burst may contain data for several terminalsEach burst may contain data for several terminals

bullbull SS must recognize the SS must recognize the PDUsPDUs with known CIDs with known CIDs

bullbull DL-MAP message signals downlink usageDL-MAP message signals downlink usage

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 38: Mobile WiMAX : A Technical Overview

Downlink Channel DescriptorDownlink Channel Descriptor

bullbull Used for advertising downlink burst profilesUsed for advertising downlink burst profiles

bullbull Burst profile of DL broadcast channel is well-Burst profile of DL broadcast channel is well-knownknown

bullbull All others are acquiredAll others are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the flywithout interrupting the servicewithout interrupting the servicendashndash Not intended as super-adaptive modulationNot intended as super-adaptive modulation

bullbull Establishes association between DIUC andEstablishes association between DIUC andactual PHY parametersactual PHY parameters

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 39: Mobile WiMAX : A Technical Overview

Burst profilesBurst profilesbullbull Each burst profile hasEach burst profile has

mandatory exit thresholdmandatory exit thresholdand minimum entryand minimum entrythresholdthreshold

bullbull SS allowed to request a lessSS allowed to request a lessrobust DIUC once above therobust DIUC once above theminimum entry levelminimum entry level

bullbull SS must request fall back toSS must request fall back tomore robust DIUC once atmore robust DIUC once atmandatory exit thresholdmandatory exit threshold

bullbull Requests to change DIUCRequests to change DIUCdone with DBPC-REQ ordone with DBPC-REQ orRNG-REQ messagesRNG-REQ messages

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 40: Mobile WiMAX : A Technical Overview

Downlink Map MessageDownlink Map Message

bullbull DL-MAP message defines usage ofDL-MAP message defines usage ofdownlink and contains carrier-specific datadownlink and contains carrier-specific data

bullbull DL-MAP is first message in each frameDL-MAP is first message in each frame

bullbull Decoding very time-criticalDecoding very time-criticalndashndash typically done in hardwaretypically done in hardware

bullbull Entries denote instants when the burstEntries denote instants when the burstprofile changesprofile changes

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 41: Mobile WiMAX : A Technical Overview

Uplink TransmissionsUplink Transmissionsbullbull Invited transmissionsInvited transmissions

bullbull Transmissions in contention slotsTransmissions in contention slotsndashndash Bandwidth requestsBandwidth requests

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Transmissions in initial ranging slotsTransmissions in initial ranging slotsndashndash Ranging Requests (RNG-REQ)Ranging Requests (RNG-REQ)

ndashndash Contention resolved using truncated exponential Contention resolved using truncated exponential backoffbackoff

bullbull Bursts defined by Bursts defined by UIUCsUIUCs

bullbull Transmissions allocated by the UL-MAP messageTransmissions allocated by the UL-MAP message

bullbull All transmissions have synchronization preambleAll transmissions have synchronization preamble

bullbull Ideally all data from a single SS is concatenated intoIdeally all data from a single SS is concatenated intoa single PHY bursta single PHY burst

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 42: Mobile WiMAX : A Technical Overview

Uplink Channel DescriptorUplink Channel Descriptor

bullbull Defines uplink burst profilesDefines uplink burst profiles

bullbull Sent regularlySent regularly

bullbull All Uplink Burst profiles are acquiredAll Uplink Burst profiles are acquired

bullbull Burst profiles can be changed on the flyBurst profiles can be changed on the fly

bullbull Establishes association between UIUCEstablishes association between UIUCand actual PHY parametersand actual PHY parameters

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 43: Mobile WiMAX : A Technical Overview

Uplink MAP MessageUplink MAP Message

bullbull UL-MAP message defines usage of the uplinkUL-MAP message defines usage of the uplink

bullbull Contains the grantsContains the grants

bullbull Grants addressed to the SSGrants addressed to the SS

bullbull Time given in mini-slotsTime given in mini-slotsndashndash unit ofunit of uplink uplink bandwidth allocation bandwidth allocation

ndashndash 22mm physical slots physical slotsbullbull in 10-66in 10-66 GHz GHz PHY physical slot is 4 symbols PHY physical slot is 4 symbols

bullbull TTime expressed as arrival time at BSime expressed as arrival time at BS

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 44: Mobile WiMAX : A Technical Overview

Classes of Uplink ServiceClasses of Uplink ServiceCharacteristic of the Service FlowCharacteristic of the Service Flow

bullbull Unsolicited Grant Services (UGS)Unsolicited Grant Services (UGS)ndashndash for constant bit-rate (CBR) or CBR-like servicefor constant bit-rate (CBR) or CBR-like service

flows (flows (SFsSFs) such as T1E1) such as T1E1

bullbull Real-time Polling Services (Real-time Polling Services (rtPSrtPS))ndashndash for for rtrt-VBR-like -VBR-like SFsSFs such as MPEG video such as MPEG video

bullbull Non-real-time Polling Services (Non-real-time Polling Services (nrtPSnrtPS))ndashndash for for nrtnrt SFsSFs with better than best effort service with better than best effort service

such as bandwidth-intensive file transfersuch as bandwidth-intensive file transfer

bullbull Best Effort (BE)Best Effort (BE)ndashndash for best-effort trafficfor best-effort traffic

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 45: Mobile WiMAX : A Technical Overview

Uplink Services - UGSUplink Services - UGS

bullbull No explicit bandwidth requests issued by SSNo explicit bandwidth requests issued by SS

bullbull Prohibited from using any contention requestsProhibited from using any contention requests

bullbull No No unicast unicast request opportunity providedrequest opportunity provided

bullbull May include a Grant Management (GM) sub-May include a Grant Management (GM) sub-header containingheader containingndashndash Slip indicator indicates that there is an backlog inSlip indicator indicates that there is an backlog in

the buffer due to clock skew or loss of mapsthe buffer due to clock skew or loss of maps

ndashndash Poll-me bit indicates that the terminal needs to bePoll-me bit indicates that the terminal needs to bepolled (allows for not polling terminals with UGS-polled (allows for not polling terminals with UGS-only services)only services)

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 46: Mobile WiMAX : A Technical Overview

Uplink Services - Uplink Services - rtPSrtPS

bullbull Intended for Intended for rtrt-VBR-like service flows such as-VBR-like service flows such asMPEG videoMPEG video

bullbull Prohibited from using any contention requestsProhibited from using any contention requestsbullbull Terminals polled frequently enough to meetTerminals polled frequently enough to meet

the delay requirements of the the delay requirements of the SFsSFsbullbull Bandwidth requested with BW requestBandwidth requested with BW request

messages (a special MAC PDU header)messages (a special MAC PDU header)bullbull May use Grant Management sub-headerMay use Grant Management sub-header

ndashndash new request can be piggybacked with eachnew request can be piggybacked with eachtransmitted PDUtransmitted PDU

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 47: Mobile WiMAX : A Technical Overview

Uplink Service - Uplink Service - nrtPSnrtPS

bullbull Intended for non-real-time service flows withIntended for non-real-time service flows withbetter than best effort servicebetter than best effort servicendashndash eg bandwidth-intensive file transfer eg bandwidth-intensive file transfer

bullbull Works like Works like rtrt-polling except that polls are-polling except that polls areissued less frequentlyissued less frequently

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 48: Mobile WiMAX : A Technical Overview

Uplink Service - BEUplink Service - BE

bullbull Generic dataGeneric datandashndash eg HTTP SMTP etceg HTTP SMTP etc

bullbull No QoS guaranteesNo QoS guarantees

bullbull Allowed to use contention requestsAllowed to use contention requests

bullbull May use Grant Management sub-headerMay use Grant Management sub-headerndashndash new request can be piggybacked with eachnew request can be piggybacked with each

transmitted PDUtransmitted PDU

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 49: Mobile WiMAX : A Technical Overview

RequestGrant SchemeRequestGrant Scheme

bullbull Self CorrectingSelf Correctingndashndash No acknowledgementNo acknowledgement

ndashndash All errors are handled in the same way ieAll errors are handled in the same way ieperiodical aggregate requestsperiodical aggregate requests

bullbull Bandwidth Requests are always per ConnectionBandwidth Requests are always per Connection

bullbull Grants are either per Connection (GPC) or perGrants are either per Connection (GPC) or perSubscriber Station (GPSS)Subscriber Station (GPSS)

ndashndash Grants (given as Grants (given as durationsdurations) are carried in the) are carried in theUL-MAP messagesUL-MAP messages

ndashndash SS needs to convert the time to amount of dataSS needs to convert the time to amount of datausing information about the UIUCusing information about the UIUC

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 50: Mobile WiMAX : A Technical Overview

GPSS vs GPCGPSS vs GPCbullbull Bandwidth Grant per Subscriber Station (GPSS)Bandwidth Grant per Subscriber Station (GPSS)

ndashndash Base station grants bandwidth to the subscriber stationBase station grants bandwidth to the subscriber stationndashndash Subscriber station may re-distribute bandwidth among itsSubscriber station may re-distribute bandwidth among its

connections maintaining QoS and service-levelconnections maintaining QoS and service-levelagreementsagreements

ndashndash Suitable for many connections per terminal off-loadingSuitable for many connections per terminal off-loadingbase stationrsquos workbase stationrsquos work

ndashndash Allows more sophisticated reaction to QoS needsAllows more sophisticated reaction to QoS needsndashndash Low overhead but requires intelligent subscriber stationLow overhead but requires intelligent subscriber stationndashndash Mandatory for P80216 10-66 GHz PHYMandatory for P80216 10-66 GHz PHY

bullbull Bandwidth Grant per Connection (GPC)Bandwidth Grant per Connection (GPC)ndashndash Base station grants bandwidth to a connectionBase station grants bandwidth to a connectionndashndash Mostly suitable for few users per subscriber stationMostly suitable for few users per subscriber stationndashndash Higher overhead but allows simpler subscriber stationHigher overhead but allows simpler subscriber station

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 51: Mobile WiMAX : A Technical Overview

Bandwidth RequestsBandwidth Requestsbullbull Come from the Come from the ConnectionConnection

bullbull Several kinds of requestsSeveral kinds of requestsndashndash Implicit requests (UGS)Implicit requests (UGS)

bullbull No actual messages negotiated at connection setupNo actual messages negotiated at connection setup

ndashndash BW request messagesBW request messagesbullbull Uses the special BW request headerUses the special BW request header

bullbull Requests up to 32 KB with a single messageRequests up to 32 KB with a single message

bullbull Incremental or aggregate as indicated by MAC headerIncremental or aggregate as indicated by MAC header

ndashndash Piggybacked request (for non-UGS services only)Piggybacked request (for non-UGS services only)bullbull Presented in GM sub-header and always incrementalPresented in GM sub-header and always incremental

bullbull Up to 32 KB per request for the CIDUp to 32 KB per request for the CID

ndashndash Poll-Me bit (for UGS services only)Poll-Me bit (for UGS services only)bullbull Used by the SS to request a bandwidth poll for non-UGS servicesUsed by the SS to request a bandwidth poll for non-UGS services

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 52: Mobile WiMAX : A Technical Overview

BW Request MessageBW Request Message

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 53: Mobile WiMAX : A Technical Overview

Maintaining QoS in GPSSMaintaining QoS in GPSSbullbull Semi-distributed approachSemi-distributed approachbullbull BS sees the requests for each connectionBS sees the requests for each connection

based on this grants bandwidth (BW) to thebased on this grants bandwidth (BW) to theSSsSSs (maintaining QoS and fairness) (maintaining QoS and fairness)

bullbull SS scheduler maintains QoS among itsSS scheduler maintains QoS among itsconnections and is responsible to share theconnections and is responsible to share theBW among the connections (maintaining QoSBW among the connections (maintaining QoSand fairness)and fairness)

bullbull Algorithm in BS and SS can be very differentAlgorithm in BS and SS can be very differentSS may use BW in a way unforeseen by theSS may use BW in a way unforeseen by theBSBS

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 54: Mobile WiMAX : A Technical Overview

SS initializationSS initializationbullbull Scan forScan for downlink downlink channel and establish channel and establish

synchronization with the BSsynchronization with the BS

bullbull Obtain transmit parameters (from UCD message)Obtain transmit parameters (from UCD message)

bullbull Perform rangingPerform ranging

bullbull Negotiate basic capabilitiesNegotiate basic capabilities

bullbull Authorize SS and perform key exchangeAuthorize SS and perform key exchange

bullbull Perform registrationPerform registration

bullbull Establish IP connectivityEstablish IP connectivity

bullbull Establish time of dayEstablish time of day

bullbull Transfer operational parametersTransfer operational parameters

bullbull Set up connectionsSet up connections

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 55: Mobile WiMAX : A Technical Overview

RangingRanging

bullbull For uplink transmissions times are measured at BSFor uplink transmissions times are measured at BS

bullbull At startup SS sends a RNG-REQ in a rangingAt startup SS sends a RNG-REQ in a rangingwindowwindow

bullbull BS measures arrival time and signal powerBS measures arrival time and signal powercalculates required advance and power adjustmentcalculates required advance and power adjustment

bullbull BS sends adjustment in RNG-RSPBS sends adjustment in RNG-RSP

bullbull SS adjusts advance and power sends newSS adjusts advance and power sends newRNG-REQRNG-REQ

bullbull Loop is continued until power and timing is okLoop is continued until power and timing is ok

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 56: Mobile WiMAX : A Technical Overview

RegistrationRegistration

bullbull Registration is a form of capability negotiationRegistration is a form of capability negotiation

bullbull SS sends a list of capabilities and parts of theSS sends a list of capabilities and parts of theconfiguration file to the BS in the REG-REQconfiguration file to the BS in the REG-REQmessagemessage

bullbull BS replies with the REG-RSP messageBS replies with the REG-RSP messagendashndash tells which capabilities are supportedallowedtells which capabilities are supportedallowed

bullbull SS acknowledges the REG-RSP withSS acknowledges the REG-RSP withREG-ACK messageREG-ACK message

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 57: Mobile WiMAX : A Technical Overview

IP connectivity andIP connectivity and

configuration file downloadconfiguration file download

bullbull IP connectivity established via DHCPIP connectivity established via DHCP

bullbull Configuration file downloaded via TFTPConfiguration file downloaded via TFTP

bullbull contains provisioned informationcontains provisioned informationndashndash operational parametersoperational parameters

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 58: Mobile WiMAX : A Technical Overview

Initial Connection SetupInitial Connection Setup

bullbull BS passes Service Flow BS passes Service Flow EncodingsEncodings to the SS to the SSin multiple DSA-REQ messagesin multiple DSA-REQ messages

bullbull SS replies with DSA-RSP messagesSS replies with DSA-RSP messages

bullbull Service FlowService Flow Encodings Encodings contain either contain eitherndashndash full definition of service attributes (omittingfull definition of service attributes (omitting

defaultabledefaultable items if desired) items if desired)

ndashndash service class nameservice class namebullbull ASCII string which is known at the BS and whichASCII string which is known at the BS and which

indirectly specifies a set ofindirectly specifies a set of QoS QoS Parameters Parameters

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 59: Mobile WiMAX : A Technical Overview

Privacy and EncryptionPrivacy and Encryptionbullbull Secures over-the-air transmissionsSecures over-the-air transmissionsbullbull AuthenticationAuthentication

ndashndash X509 certificates with RSA PKCSX509 certificates with RSA PKCSndashndash Strong authentication of Strong authentication of SSs SSs (prevents theft of service)(prevents theft of service)ndashndash Prevents cloningPrevents cloning

bullbull Data encryptionData encryptionndashndash Currently 56-bit DES in CBC modeCurrently 56-bit DES in CBC modendashndash IV based on frame numberIV based on frame numberndashndash Easily exportableEasily exportable

bullbull Message authenticationMessage authenticationndashndash Key MAC management messages authenticated with one-Key MAC management messages authenticated with one-

way hashing (HMAC with SHA-1)way hashing (HMAC with SHA-1)

bullbull Designed to allow newmultiple encryption algorithmsDesigned to allow newmultiple encryption algorithmsbullbull Protocol descends from BPI+ (from DOCSIS)Protocol descends from BPI+ (from DOCSIS)

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 60: Mobile WiMAX : A Technical Overview

Security AssociationsSecurity Associations

bullbull A set of privacy informationA set of privacy informationndashndash shared by a BS and one or more of its client shared by a BS and one or more of its client SSsSSs

share in order to support securedshare in order to support securedcommunicationscommunications

ndashndash includes traffic encryption keys and CBC IVsincludes traffic encryption keys and CBC IVs

bullbull Security Association EstablishmentSecurity Association Establishmentndashndash Primary SA established during initial registrationPrimary SA established during initial registration

ndashndash other other SAsSAs may be provisioned or dynamically may be provisioned or dynamicallycreated within the BScreated within the BS

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 61: Mobile WiMAX : A Technical Overview

Key Management MessagesKey Management MessagesPKM Message

AuthenticationInformation

AuthorizationRequest

AuthorizationReply

AuthorizationReject

AuthorizationInvalid

Key Request

Key Reply

Key Reject

TEK Invalid

Description

contains the manufacturer s X509 Certificate issued by an externalauthoritysent from an SS to its BS to request an AK and list of authorizedSAIDssent from a BS to an SS to reply an AK and a list of authorized SAIDs

send from a BS to an SS in rejection of an Authorization Requestmessage sent by the SSsend from a BS to an SS as an unsolicited indication or a responseto a message received from that SS

sent from an SS to its BS requesting a TEK for the privacy of one ofits authorized SAIDssent from a BS to an SS carrying the two active sets of traffic keyingmaterial for the SAIDsent from a BS to an SS indicating that the SAID is no longer validand no key will be sentsent from a BS to an SS if it determines that the SS encrypted uplinktraffic with an invalid TEK

SA Add sent from a BS to an SS to establish one or more additional SAs

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 62: Mobile WiMAX : A Technical Overview

SS AuthorizationSS Authorization

bullbull Authentication and AuthorizationAuthentication and Authorizationndashndash SS manufacturerSS manufacturerrsquorsquos X509 certificates X509 certificate binding the SSbinding the SSrsquorsquoss

public key to its other identifying informationpublic key to its other identifying information

ndashndash Trust relation assumed between equipmentTrust relation assumed between equipmentmanufacturer and network operatormanufacturer and network operator

ndashndash Possibility to accommodate ldquoroot authorityrdquo if requiredPossibility to accommodate ldquoroot authorityrdquo if required

bullbull Authorization Key Update ProtocolAuthorization Key Update Protocolndashndash The SS is responsible for maintaining valid keysThe SS is responsible for maintaining valid keys

ndashndash Two active Two active AKsAKs with overlapping lifetimes at all times with overlapping lifetimes at all times

ndashndash Reauthorization process done periodicallyReauthorization process done periodically

ndashndash AK lifetime (7 days) amp grace time timer (1 hr)AK lifetime (7 days) amp grace time timer (1 hr)

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 63: Mobile WiMAX : A Technical Overview

Auth FSM Transition MatrixAuth FSM Transition MatrixState

˚Event orRcvd msg

(A)Start

(B)Auth Wait

(C)Authorized

(D)Reauth

Wait

(E)Auth

Reject Wait

(F)Silent

(1)Provisioned

Auth Wait ˚ ˚ ˚ ˚ ˚

(2)Auth Reject(non-perm)

˚ Auth RejectWait

˚ Auth RejectWait

˚ ˚

(3)Auth Reject

(perm)

˚ Silent ˚ Silent ˚ ˚

(4)Auth Reply

˚ Authorized ˚ Authorized ˚ ˚

(5)Timeout

˚Auth Wait

˚ ReauthWait Start

˚

(6)Auth Grace

Timeout

˚ ˚ ReauthWait

˚ ˚ ˚

(7)Auth Invalid

˚ ˚ ReauthWait

ReauthWait

˚ ˚

(8)Reauth

˚ ˚ ReauthWait

˚ ˚ ˚

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 64: Mobile WiMAX : A Technical Overview

AuthAuth FSM Flow Diagram FSM Flow Diagram

Start Auth RejectWait

Silent

Auth Wait

Provisioned Authent InfoAuth Request

Timeout

Auth Reject (non-perm)

Auth Reject (perm)

Timeout Authent InfoAuth Request

Authorized

Auth Reply [TEK] Authorized

Reauth Wait

Auth Reject (perm) [TEK] Stop

Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Auth Reject (non-perm) [TEK] Stop

Auth Grace Timeout Auth Request

Auth Invalid Auth Request

[TEK] Auth Pend

Reauth Auth Request

Auth Reply [TEK] Auth Comp

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 65: Mobile WiMAX : A Technical Overview

Traffic Encryption KeyTraffic Encryption Key

ManagementManagementbullbull Two-level key exchange protocolTwo-level key exchange protocol

ndashndash Key Encryption Key (symmetric) established with RSAKey Encryption Key (symmetric) established with RSAndashndash Traffic Encryption Keys (TEK) Traffic Encryption Keys (TEK) exhangedexhanged with symmetric with symmetric

algorithm negotiated at SA establishment (currently onlyalgorithm negotiated at SA establishment (currently only3-DES supported)3-DES supported)

ndashndash Two sets of overlapping keying material maintainedTwo sets of overlapping keying material maintainedndashndash No explicit key acknowledgementsNo explicit key acknowledgementsndashndash Key synchronization maintained by 2-bit key sequenceKey synchronization maintained by 2-bit key sequence

number in the MAC PDU headernumber in the MAC PDU header

bullbull Traffic Encryption Key Exchange ProtocolTraffic Encryption Key Exchange Protocolndashndash Defined by the TEK FSM Transition MatrixDefined by the TEK FSM Transition Matrix

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 66: Mobile WiMAX : A Technical Overview

TEK FSM Transition MatrixTEK FSM Transition MatrixState

Event orRcvd msg

(A)Start

(B)Op Wait

(C)Op Reauth

Wait

(D)Opera-tional

(E)Rekey Wait

(F)Rekey

Reaut Wait

(1)Stop

˚ Start Start Start Start Start

(2)Authorized

Op Wait ˚ ˚ ˚ ˚ ˚

(3)Auth Pend

˚ Op ReauthWait

˚ ˚ RekeyReauth

Wait

˚

(4)Auth Comp

˚ ˚ Op Wait ˚ ˚ Rekey Wait

(5)TEK

Invalid

˚ ˚ ˚ Op Wait Op Wait Op ReauthWait

(6)Timeout

˚Op Wait

˚ ˚Rekey Wait

˚

(7)TEK

RefreshTimeout

˚ ˚ ˚ Rekey Wait ˚ ˚

(8)Key Reply

˚ Operational

˚ ˚ Operational

˚

(9)Key Reject

˚ Start ˚ ˚ Start ˚

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 67: Mobile WiMAX : A Technical Overview

TEK FSM Flow DiagramTEK FSM Flow Diagram

Start

Authorized Key Request

Op ReauthWait

Stop

Op Wait

Auth Pend

Auth Comp Key Request

Key RejectStop

Operational

Key Reply

Timeout Key Request

Stop

TEK Invalid Key Request

Rekey Wait

RekeyReaauth

Wait

Auth Pend

Auth Comp Key Request

Timeout Key Request

TEK Refresh Timeout Key Request

Key Reply

TEK Invalid Key Request

TEK Invalid

Stop

Key RejectStop

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 68: Mobile WiMAX : A Technical Overview

Data EncryptionData Encryption

bullbull DES in CBC mode with IV derived from the frame numberDES in CBC mode with IV derived from the frame number

bullbull Hooks defined for other stronger algorithms eg AESHooks defined for other stronger algorithms eg AES

bullbull Two simultaneous keys with overlapping and offsetTwo simultaneous keys with overlapping and offsetlifetimes allow for uninterrupted servicelifetimes allow for uninterrupted servicendashndash Rules for key usageRules for key usage

bullbull AP encryption (older key) decryption (both keys)AP encryption (older key) decryption (both keys)bullbull AT encryption (newer key) decryption (both keys)AT encryption (newer key) decryption (both keys)

bullbull Key sequence number carried in MAC headerKey sequence number carried in MAC header

bullbull Only MAC PDU payload (including sub-headers) isOnly MAC PDU payload (including sub-headers) isencryptedencrypted

bullbull Management messages are unencryptedManagement messages are unencrypted

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 69: Mobile WiMAX : A Technical Overview

Amendment ProjectAmendment Project

IEEE P80216aIEEE P80216a

Media Access ControlMedia Access ControlModifications and AdditionalModifications and AdditionalPhysical Layer for 2-11 GHzPhysical Layer for 2-11 GHz

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 70: Mobile WiMAX : A Technical Overview

Amendment ProjectAmendment Project

IEEE P80216bIEEE P80216b

Media Access Control Modifications andMedia Access Control Modifications andAdditional Physical Layer for License-ExemptAdditional Physical Layer for License-Exempt

FrequenciesFrequencies

Wireless High-Speed Unlicensed MetropolitanWireless High-Speed Unlicensed MetropolitanArea Network (ldquoArea Network (ldquoWirelessHUMANWirelessHUMANTMTMrdquo)rdquo)

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 71: Mobile WiMAX : A Technical Overview

Key 80216a80216bKey 80216a80216b

EnhancementsEnhancements

bullbull OFDM SupportOFDM Support

bullbull ARQARQ

bullbull 80216b Mesh Mode80216b Mesh Modendashndash Optional topologyOptional topology

ndashndash Subscriber-to-Subscriber communicationsSubscriber-to-Subscriber communications

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 72: Mobile WiMAX : A Technical Overview

BWA in ETSI BRANBWA in ETSI BRAN

bullbull HIPERACCESSHIPERACCESSndashndash Above 11 GHzAbove 11 GHzndashndash HIPERACCESS began before 80216HIPERACCESS began before 80216ndashndash Difficulty in resolving processesDifficulty in resolving processesndashndash IEEE now well ahead in scheduleIEEE now well ahead in schedule

bullbull HIPERMANHIPERMANndashndash Below 11 GHzBelow 11 GHzndashndash IEEE went firstIEEE went firstndashndash Signs of healthy cooperationSigns of healthy cooperationndashndash Recently selected 80216 MAC as baselineRecently selected 80216 MAC as baseline

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 73: Mobile WiMAX : A Technical Overview

SummarySummarybullbull The IEEE 80216The IEEE 80216 WirelessMAN WirelessMAN Air Interface Air Interface

designed within the 80216 Working Groupdesigned within the 80216 Working Groupaddresses worldwide BWA market needsaddresses worldwide BWA market needs

bullbull The outcome is due to successful cooperationThe outcome is due to successful cooperationbetween BWA leadersbetween BWA leaders

bullbull The 80216 MAC is flexible and powerfulThe 80216 MAC is flexible and powerfulenough to support any fixed BWA technologyenough to support any fixed BWA technologyvariant in any spectrum in any marketvariant in any spectrum in any market

bullbull The 80216 Air Interface provides greatThe 80216 Air Interface provides greatopportunities for vendor differentiation at bothopportunities for vendor differentiation at boththe base station and subscriber station withoutthe base station and subscriber station withoutcompromising interoperabilitycompromising interoperability

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg

Page 74: Mobile WiMAX : A Technical Overview

IEEE 80216 ResourcesIEEE 80216 Resources

IEEE 80216 Working Group on BroadbandIEEE 80216 Working Group on BroadbandWireless AccessWireless Access

info documents email lists etcinfo documents email lists etc

httphttpWirelessMANWirelessMANorgorg