• Title/Summary/Keyword: 802.16

Search Result 587, Processing Time 0.028 seconds

Channel Modeling for Mobile-to-Mobile Communications Based on IEEE 802.16n (IEEE 802.16n 기반 단말간 직접통신을 위한 채널 모델링)

  • Lee, Sae-Rom;Lee, Kyu-Bum;Chang, Sung-Cheol;Yoon, Chul-Sik;Choi, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9A
    • /
    • pp.767-775
    • /
    • 2011
  • In this paper, we propose a new multi-input multi-output (MIMO) channel modeling method for mobile-to-mobile (M2M) communications based on IEEE 802.16n. To reflect the mobilities at the transmitter and the receiver, we propose a new channel model by invoking the geometrical two-ring scattering model and modifying the conventional IEEE 802.16m fixed-to-mobile (F2M) channel model considering M2M communication environments. Through computer simulations, we analyze the statistical properties of proposed channel model in terms of the time correlation and the spatial correlation. Finally, the performance of the system using the proposed M2M channel model is compared with that using the conventional 802.16m F2M channel model by link level simulations.

An Improved Backoff Algorithm for the Random Access Protocol for the Ranging Subchannel of IEEE 802.16 Networks (IEEE 802.16 환경의 레인징 부채널에서 랜덤액세스 프로토콜의 Backoff 알고리즘 성능 향상 기법)

  • Kwon, Jeong-Min;Lee, Hyong-Woo;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1267-1275
    • /
    • 2007
  • An improved backoff algorithm for retransmission randomization for OFDMA/CDMA/slotted ALOHA used in the ranging subchannel of IEEE 802.16 network is proposed. Exploiting the fact that a base station coordinates channel access using UL-/DL-MAP in the IEEE 802.16 networks, we propose a minor modification of the existing IEEE 802.16 in order to increase throughput, decrease delay variation and achieve a graceful performance degradation in case of overload channel condition of the random access protocol. The algorithm basically estimates the number of backlogged users and arrival rate using which, the BS calculates retransmission probability for the subscriber stations involved in a collision. Computer simulation is performed to demonstrate the effectiveness of the proposed algorithm and to compare the performance with existing binary exponential backoff algorithm.

Modification to Traffic Indication Method for IEEE 802.16 Sleep Mode Operation (IEEE 802.16 시스템의 슬립모드 동작을 위한 트래픽 인디케이션 방식의 개선)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.6
    • /
    • pp.823-829
    • /
    • 2013
  • IEEE 802.16 standard specifies the broadband wireless access (BWA) system including sleep mode to minimize the power consumption by a mobile station (MS). This paper outlines the overall operation of sleep mode and proposes a method to improve the power saving efficiency of the IEEE 802.16 sleep mode. The proposed method not only decreases the number of bytes that a MS in sleep mode needs to receive during listening interval but allows to indicate a control-specific operation such as periodic ranging.

Performance Comparisons on the Strategies of Sleep Window Size Adjustment for Power Saving in IEEE 802.16e (IEEE 802.16e에서 전력 절약을 위한 수면 윈도우 크기 조정 방법들의 성능 비교)

  • Son, Dae-Hong;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1113-1119
    • /
    • 2007
  • In this paper, first, we proposed various possible candidate schemes for determining initial sleep window size and varying sleep window size in sleep mode for power saving class I of IEEE 802.16e. Then, we analyzed and compared the power saving performances of those schemes. The schemes used for the comparisons are EICV of IEEE 802.16e, and other comparable schemes such as EIED, EILD, LIED and LILD. Experimental results show that LILD and EIED outperform other comparable schemes. Especially, EIED shows the better performances for the case of high traffic intensity environments, while LILD does for the low traffic intensity case.

Security Architecture and Authentication Protocol in Portable Internet (휴대인터넷의 보안 구조 및 인증 프로토콜)

  • Lee, Ji-Yong;Choo, Yeon-Seong;Ahn, Jeong-Cheol;Ryu, Dae-Hyeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.872-875
    • /
    • 2005
  • Portable Internet extended from wireless LAN has a large cell size, similar to a wireless mobile communication, and can provides the seamless service which offers middle-low speed mobility. IEEE 802.16e, the international standard of Portable Internet, uses PKMv2(Privacy Key Management) protocol for authorization and key exchange between a MSS(Mobile Subscriber Station) and a BS(Base Station). This paper first reviews and studies overall security architecture of TTA HPi standard and IEEE 802.16e which supports mobility based on WMAN(Wireless Metropolitan Area Network) standard(IEEE 802.16)

  • PDF

DCCG Algorithm for the IEEE 802.16 BWA System (IEEE 802.16 광대역 무선 액세스 시스템을 위한 DCCG 알고리즘)

  • 김선희;이정규
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.11
    • /
    • pp.10-16
    • /
    • 2003
  • In this paper, a dynamic contention periods based on the collision group(DCCG) algorithm is proposed for collision resolution in the IEEE 802.16 broadband wireless access network. The DCCG algorithm determines the contention periods according to the a number of collided slot and collided requests to the base station(BS). The DCCG algorithm is useful to improve the performance of throughput and system delay characteristic than binary backoff algorithm.

IEEE 802.16 WMAN MAC Protocol for the Coexistence with WLAN in Shared Bands (공유대역에서 무선 LAN과의 공존을 위한 IEEE 802.16 WMAN의 MAC 프로토콜)

  • Han, Ho-Seong;Rhee, Seung-Hyong;Park, Su-Won;Han, Ki-Young;Kang, Hyon-Goo;Yoon, Soon-Young
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.142-149
    • /
    • 2010
  • In this paper, we propose to modify the IEEE 802.16 MAC protocol in order to allow the coexistence of IEEE 802.11 and IEEE 802.16 wireless networks in shared bands. Our suggested protocol enables 802.16 WMAN to control WLAN devices for the coexistence. That is, in the downlink subframes(BS to SS), SS(Subscriber Station) prohibits WLAN to transmit by using CTS(Clear to Send) in order to protect it's burst. In the uplink subframes(SS to BS), on the other hand, BS(Base Station) sends CTS to block WLAN's communications. Our proposals enables the coexistence between WLAN and WMAN, and simulation results show that our protocols enhance the throughput of the entire system.

An Approach for Improving Mobile WiMAX Security - ROSMEX Architecture (안전한 모바일 와이맥스 네트워크를 위한 보안 구조 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Choi, Hyo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.25-34
    • /
    • 2010
  • The IEEE 802.16-2004 standard has a security sub-layer in the MAC layer called, Privacy Key Management (PKM). However, several researches have been published to address the security vulnerabilities of IEEE 802.16-2004. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handoffs and roaming capabilities. PKMv2 in Mobile WiMAX includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, Mobile WiMAX still has a problem of security architecture such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication because Mobile WiMAX security has mainly concentrated on between SS and BS communication. Based on the investigation results, we propose a novel mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX), to prevent the new security vulnerabilities.

Modelling of Differentiated Bandwidth Requests in IEEE 802.16m Systems

  • Yoon, Kang Jin;Kim, Ronny Yongho;Kim, Young Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.726-747
    • /
    • 2013
  • In order to support a large number of mobile stations (MSs) with statistical multiplexing in cellular networks, a random access scheme is widely used for uplink (UL) bandwidth request (BR). In the design of a random access based BR scheme, there are two important requirements: short connection delay and diverse Quality of Services (QoSs) support. Such requirements are crucial for IMT-Advanced systems like IEEE 802.16m to provide various types of fourth generation (4G) data services. IEEE 802.16m provides advanced UL BR schemes for non-real time polling service (nrtPS) and best-effort (BE) service to meet the requirements of short connection time and multiple QoS level support. In order to provide short connection time and multiple QoS support, three-step and differentiated BR procedures are adopted. In this paper, a novel modelling of IEEE 802.16m contention based BR scheme is proposed that uses a 2-dimensional discrete time Markov chain. Both the short access delay three-step BR procedures and normal five-step BR procedure are considered in the model. Our proposed model also incorporates the IEEE 802.16m differentiated BR procedure. With the proposed model, we extensively evaluate the performance of IEEE 802.16m BR for two different service classes by changing QoS parameters, such as backoff window size and BR timer. Computer simulations are performed to corroborate the accuracy of the proposed model for various operation scenarios. With the proposed model, accurate QoS parameter values can be derived for the IEEE 802.16m contention-based BR scheme.