Wireless Communication Unit - 3
Wireless Communication Unit - 3
OP
Cordless Systems
Time Division Duplex
DECT Operation
Adaptive Differential Pulse Code Modulation
Wireless Local Loop
The Role of WLL
Propagation Considerations for WLL
Orthogonal Frequency Division Multiplexing
Multichannel Multipoint Distribution Service
Local Multipoint Distribution Service
WiMAX and IEEE 802.16 Broadband Wireless Access Standards
IEEE 802.16 Architecture
Services
IEEE 802.16 MAC Layer
IEEE 802.16 Physical Layer
IEEE 802.16a
Recommended Readings and Web Sites
11.5 Key Terms, Review Questions, and Problems
Key Terms
Review Questions
Problems
Appendix ItA Linear Predictive Filters
317
318 CHAPTER 11 ! CORDLESS SYSTEMS AND \VIRELESS LOCAL LOOP
In this chapter, we look at two technologies that bring wireless access into the resi-
dence and office: cordless systems and wireless local loop (WLL).
Base
station -+--+--t-+---+------'\---+--+-----
I
I
I
-l H f- Time~
Tp Tb Tg
Tp = Propagation delay
Tb = Burst transmission time
Tg = Guard time
Figure 11.1 Transmission Using Time Division Duplex
can be transmitted by either side is only 1I[2(Tp + T b + Tg )]. We can relate this
tothe effective data rate, R, as seen by the two end points as follows. Let B be the
size of a block in bits. Then the effective number of bits transmitted per second,
or effective data rate, is
A = ( TT+ T)
2R 1 + p
b
g
L
11.1 ! CORDLESS SYSTEMS 321
TDlVIA/TDD TDD was developed for use on wired subscriber systems but has
now found application in wireless configurations. In a wireless configuration, TDD
involves transmitting and receiving on the same carrier frequency but at different
times. Wireless TDD is typically used with TDMA, in which a number of users
receive forward (base to handset) channel signals in turn and then transmit reverse
(handset to base) channel signals in turn, all on the same carrier frequency.
Two important advantages of TDD over using a TDMA system with two
different carriers, one in each direction, are improved ability to cope with fast fading
and improved capacity allocation.
With respect to fast fading, the pattern of fading changes as the frequency
changes. 2 It is possible for a mobile unit receiving on one frequency and trans-
mitting on another to experience strong fade in one direction only. One way to
cope with fast fading is spatial diversity of the antennas. In this scheme, a receiver
employs two antennas, spaced ideally at least one wavelength apart. With such a
configuration there is a good chance that if one of the antennas is experiencing
significant fade, the other is not. The receiver can then select the strongest incom-
ing signal for demodulation. This approach is fine for the base station but is not
practical for small, inexpensive handsets. Further, we wish to avoid complex
adaptive equalization algorithms or forward error control algorithms. With TDD
however, spatial diversity can still be used. For each forward channel burst arriv-
ing at the base station, the base station selects the antenna with the stronger sig-
nal for reception. The base station then uses that same antenna for the next
transmission on the corresponding forward channel. Because the same frequency
is used in both directions, this antenna should provide the strongest signal back at
the handset.
The other advantage of TDMA/TDD over TDMAIFDMA is in the area of
capacity allocation. For many data-oriented (as opposed to voice oriented) applica-
tions, it is likely that the volume of traffic will be greater in the forward direction
than in the reverse direction. If a conventional FDMA scheme is used, with equal
bandwidth on forward and reverse channels, then the system must be sized for the
forward channel and capacity on the reverse channel is wasted. On a TDD system, it
is possible for a controller to allocate dynamically the number of TDMA slots in
each direction so that more slots are available on the forward channel when needed.
DEeT Operation
Figure 11.2 indicates the protocol architecture that supports DECT operations.
At the physical layer, data are transmitted in the TDMA-TDD frames over one of
10 RF carriers. The modulation method is Gaussian-filtered FSK, with a nominal
deviation of 288 kHz. This is essentially the same as the GMSK technique used for
GSM (Chapter 10). The ratio of data rate to transmission bandwidth is 2 (compare
Table 6.2), and the data rate is 1.152 Mbps.
The medium access control (MAC) layer selects the physical channels and
then establishes or releases connections on those channels. It also multiplexes
.-
~ ~
'0
....""c:
""
~
....en
~
OIl
<::
en
en
~
.- :>
.-
~
C.J E
~
OIl '0
....""c:
""
~
....en
~
OIl
<::
en
en
~
.- :>
o""
~
C.J E
~
OIl
~
""o ""en~
<::
c: ~ ""en
~
<::
c:
0 ....""<::c: E <::
DECT messages 0 ....""<::c: E <::
Physical Physical
Radio link
information into the TDMA-TDD frame format. The MAC layer supports three
serVIces:
4> Broadcast: Broadcast messages sent in the A field
4& Connection oriented: Transfer of user data in the B field
vice will segment longer messages into smaller blocks for transmission and
reassemble at reception, if necessary.
.. Connection-oriented message service: Support of connection-oriented messages.
4Before proceeding, the reader may wish to review the discussion of PCM in Section 6.4.
324 CHAPTER 11 ! CORDLESS SYSTEMSAND\X7IRELESS LOCAL LOOP
Current Next
sample sample
I n leveb
Coding
region
m levels
Differential PCM The scheme that has just been described is based on the
assumption that difference values will be less than sample values. We can do even
better than that by recognizing that voice signals change relatively slowly and there-
fore we can fairly accurately estimate, or predict, the value of the kth sample m(k)
from the values of the preceding samples. For an estimate of the kth sample, m(k),
we then transmit the difference d(k) = m(k) - m(k). If we use an accurate esti-
mator, this difference value should be less than the difference between successive
samples. At the receiver, the same estimation function is used and the incoming
difference value is added to the estimate of the current sample. This is the principle
behind differential PCM (DPCM). Note that the simple difference scheme of the
preceding paragraph is just a special case of DPCM in which we use the estimator
m(k) = m(k - 1).
Figure 11.4a is a block diagram of the transmitter. An understanding of this
diagram takes some discussion. To begin, an analog sample m(k) is taken of the voice
signal get); this is a pulse amplitude modulation (PAM) sample. We are now faced
with a difficulty. We could construct a predicted value m(k), take the difference,
and transmit that. However, at the receiving end, instead of the past analog samples
m (k - 1), m (k - 2), and so on, what we have is the sequence of quantized differences
from which we could construct a sequence of quantized samples, mq(k). So we cannot
reconstruct m(k) but can only determine mq(k), the estimate of the quantized sample
mq(k), with the estimate based on the preceding quantized samples mq(k - 1),
mq(k - 2), and so on. If the transmitter is basing its prediction on values of m(k) and
the receiver is basing its prediction on values of mq(k), there is an error introduced in
reconstruction. Instead, the transmitter should also determine mq(k) and transmit the
difference d(k) = m(k) - mq(k). As we have just seen, the receiver can also generate
mq(k), and from the received dq(k), the receiver can reconstruct mq(k).
11.1 I CORDLESS SYSTEMS 325
g(t) dik )
Sample I---~ Quantizer 1---....:....----.---..
r---- ------------------------1
I
I
1-----------......., 1
1
I I
I
: mik) I
I 1
I
I
1
1- _
1----------------------------- 1
: dik ) + mq(k) : Smoothing g(t)
--+----+1 I 1---------.....-....-+-1
+ : OOu
I
I
I
L...-------l Predictor 1
1
I I
I -----------------------~
It remains to show that Figure llAa produces the desired quantized differ-
ences. The output of the predictor is designated mq(k), the predicted value of m(k).
The difference is taken to produce
d(k) = m(k) - mq(k)
This difference is then quantized to produce dq(k). We can express this as
dq(k) = d(k) + e(k)
where e(k) is the quantization error that results from approximating the analog
d(k) by the digital dq(k). The input to the predictor consists of this quantized dif-
ference plus the predictor output, which is fed back to become part of the input:
_The predictor is often the linear weighted sum of previous samples, imple-
mented using shift registers, and a delay equal to the sample interval (Figure 11.5).
The predictor implements the equation
N
mik) = ~ Aimq(k - i) (11.1)
i=l
50eneral Aspects of Digital Transmission Systems; Terminal Equipments: 40,32,20,16 kbit/s ADPCM.
1990.
11.1 / CORDLESS SYSTEMS 327
32 kbps
Difference ADPCM
64 kbps + signal d(k) I Adaptive I I(k)
PCM
s(k) -
I I quantizer I
1---- ----------------------------------- - - - - - - - 1
I I
I I
I I
1 Inverse I
I I
I adaptive 1
I I
I quantizer I
I Signal
I estimate
+ I
1 I Adaptive I Quantized:
I s.(k)
I I predictor I Reconstructed
I + difference I
I signal dik) :
I signal I
I I
I I
Il JI
predictor f+-
I I
I Signal I
I 1
I estimate 1
I I
I I
I I
I
IL ~
The inverse adaptive quantizer takes the 4-bit signal I(k) and produces a dif-
ference signal dq(k), which serves as input to the adaptive predictor. The second and
third columns of Table 11.3 show the mapping.
The adaptive predictor has the structure of a linear predictor (Figure 11.5) but
is more complex than for DPCM. For ADPCM, the structure is a combination of a
second-order recursive filter and a sixth-order nonrecursive filter. The equation is
[compare Equation (11.1)]
2 6
seek) = 2: Ai(k - i)se(k - i) + 2: Bi(k - i)dq(k - i) (11.2)
i=1 i=1
where the coefficients A and B are updated using algorithms that adapt to the rate
of change of the Se and dq samples. Thus, the adaptive predictor is adjusted to adapt
to the rate of change of the difference samples as well as the rate of change of the
signal estimates.
5r-----------------------,
4
----
V'l
0
~
'-"
Q,l
;..
Q
~
[IJ
3
....=
Q
....=
c:.
Q
=
eo=
Q,l
~
2
1
Coder Uncoded PCM ADPCM LD-CELP CELP CELP LPC
speech
Bit rate (kbps) 64 32 16 8 4.2 2.4
sample that ideally deserves a 5 [JAYA84]. With this phenomenon in mind, a score
of 4.0 to 4.5 is a very useful indicator of high-quality digitization.
Traditionally, the provision of voice and data communications to the end user, over
the local loop, or subscriber loop, has been provided by wired systems. For residen-
tial subscribers, twisted pair has been and continues to be the standard means of
connection. For business and government subscribers, twisted pair, coaxial cable,
and optical fiber are in use.
As subscribers have demanded greater capacity, particularly to support Internet
use, traditional twisted pair technology has become inadequate. Telecommunications
providers have developed a number of technologies to meet the need, including ISDN
330 CHAPTER 11 / CORDLESS SYSTEMS AND WIRELESS LOCAL LOOP
(integrated services digital network), and a family of digital subscriber loop technolo-
gies, known as xDSL. In addition, cable operators have introduced two-way high-
speed service using cable modem technology. Thus, wired technologies are responding
to the need for reliable, high-speed access by residential, business, and government
subscribers.
However, increasing interest is being shown in competing wireless tech-
nologies for subscriber access. These approaches are generally referred to as
wireless local loop (WLL), or fixed wireless access. WLL alternatives are narrow-
band, which offer a replacement for existing telephony services, and broadband,6
which provide high-speed two-way voice and data service. Table 11.4, based
on one in [WEBBOO] , compares WLL and other alternatives for fixed sub-
scriber support.
In this section, we provide an overview of WLL, then look at some technical
issues, and finally examine two specific WLL approaches. Section 11.3 is devoted to
an evolving standard for WLL known as IEEE 802.16.
6The term broadband is not precise. Generally, it refers to systems that provide user data rates of greater
than 2 Mbps, up to 100s of Mbps.
1l.2 / WIRELESS LOCi\L LOOP 331
Wireless
links
Base station
antenna _------- _--. _~..
. .. I Residence
'"------- III ,m I
"", "
,, , ' " ,
,, " ,
,, '"
Wire ,, '"
link ,,, '"
,, Office
Switching ,, building
center ,,
,,
,,
,,
,
~~===~-, (;overnunent
agency
• Selective installation: Radio units are installed only for those subscribers who
want the service at a given time. With a wired system, typically cable is laid out
in anticipation of serving every subscriber in a local area.
WLL needs to be evaluated with respect to two alternatives:
41Wired scheme using existing installed cable: A large fraction of the earth's
inhabitants do not have a telephone line. For high-speed applications, many
subscribers with telephone lines do not have a line of sufficient quality or are
too far from the central office to effectively use xDSL. Many of these same
subscribers also do not have cable TV or their cable provider does not offer
two-way data services. Finally, because WLL has become cost-competitive
with wired schemes, new installations face a genuine choice between the wired
and wireless approaches.
• Mobile cellular technology: Current cellular systems are too expensive and do
not provide sufficient facilities to act as a realistic alternative to WLL. Even
when 3G systems become available, they are likely to be more expensive and
less functional than broadband WLL alternatives. A major advantage of WLL
over mobile cellular is that, because the subscriber unit is fixed, the subscriber
can use a directional antenna pointed at the base station antenna, providing
improved signal quality in both directions.
In the United States, the Federal Communications Commission has set aside
15 frequency bands for use in commercial fixed wireless service, at frequencies of 2 to
40 GHz. In other countries, similar frequency bands have been allocated. Note that
these frequencies are considerably higher than those used for cellular systems. At
these frequencies, often referred to as millimeter wave frequencies, propagation
characteristics are quite different from those in the MHz ranges. We look at propaga-
tion considerations next. Then we introduce a technique that is used in a number of
WLL systems, known as orthogonal FDM (OFDM). Finally, we examine the two
approaches of most interest for the WLL application: local multipoint distribution
service (LMDS) and multichannel multipoint distribution service (MMDS).
7The free space wavelength at 10 GHz is 30 mm, and at 300 GHz is 1 mm.
11.2 I WIRELESS LOCAL LOOP 333
i
Transmitter f - - - - - - - - - - - - - - - + - - - L - + - - - - - - - - - - - - - - - i Receiver
1 + - - - - - - S - - - - - - - 0 . _ <- - - - - - D - - - - - - - - + - 1
R = (TSD
\jS+i5
where R, S, D, and A are in the same units, and A is the wavelength of the signal aloI
the path. For convenience, this can be restated as
R
m
= 17.3 1_1_ SkmDkm
\j fGHz Skm + D km
where R is expressed in meters, the two distances are in kilometers, and the sign;
frequency is in gigahertz.
It has been found that if there is no obstruction within about 0.6 times the ractin:
of the first Fresnel zone at any point between the two transceivers, then attenuation duc
to obstructions is negligible [FREE97]. One noteworthy example of an obstruction i1
the ground. Hence, the height of the two antennas must be such that there is no POinl
along the path at which the ground is within 0.6 times the radius of the first Fresnel zone
Atmospheric Absorption At frequencies above 10 GHz, radio waves propa-
gating through the atmosphere are subject to molecular absorption. The absorption
as a function of frequency is very uneven, as shown in Figure 11.10. There is a peak
of water vapor absorption at around 22 GHz and a peak of oxygen absorption near
60 GHz. This figure suggests that there is a favorable window for communication
roughly from 28 GHz to 42 GHz, where the attenuation is on the order of
0.13 dB/km, and another favorable window from 75 GHz to 95 GHz, where the
attenuation is on the order of 0.4 dB/km.
However, Figure 11.10 only shows the absorption effects at a particular tem-
perature, relative humidity, and atmospheric pressure. Although the shapes of these
two curves remain the same, the actual values vary, especially with temperature and
relative humidity. Table 11.5, taken from [DALK96], shows the effects of tempera-
ture and humidity.
Effect of Rain One of the most serious concerns for millimeter wave propaga-
tion is attenuation due to rain. The presence of raindrops can severely degrade the
11.2 / WIRELESS LOCAL LOOP 335
100
50
20
,
02
11
10
2
e
~
'C 1
'-'
::::=
0
ell
=
=
0.5
,
t1
-<
H2O I I~
0.2
~ ~
V
0.1
1 1/1
1
I II
0.05
I
I /
0.02 / /
0.01 /
..,
/
0.005
1
---- 2 5
II
10 20 50 100
Frequency (GHz)
Figure 11.10 Absorption Due to Atmospheric Gas (atmospheric
pressure: 1013 mb; temperature: 15°C; water vapor:
7.5 glm 3 )
where the attenuation is in units of dB/km, the rain rate R is measured in mm/hr,
and the parameters a and b depend on the distribution of drop sizes and on
336 CHAPTER II/CORDLESS SYSTEMS ANDWTIULESS LOCAL LOOP
Relative Humidity
---
U
° 0°
0%
·0.02
50%
0.05
100%
·0:08
~
...
-=...
= 10°
20°
0.02
• 0.02
0.08
0.12 I
0.14
0.25
e
~
Effects ofVegetation Through part of its path, a WLL link may run through
vegetation, particularly foliage of tall trees. In some suburban and small town
areas, such obstacles may be unavoidable for some subscribers, even with
rooftop subscriber antennas. A study reported in [PAPA97] reached the follow-
ing conclusions:
0.880
0.923
1.265
1.264
1.065
1.000
0.929
0.868
j
11.2 / \-VIRELESS LOCAL LOOP 337
Table 11.7 Rainfall Intensity Exceeded (mm/hr) for Various Rain Regions
1. The presence of trees near subscriber sites can lead to multipath fading.
2. The principal multipath effects from the tree canopy are diffraction and scattering.
3. Measurements in regularly planted orchards have found attenuation values
between 12 and 20 dB per tree for deciduous trees and up to 40 dB for 1 to 3
coniferous trees, when the foliage is within 60% of the first Fresnel zone.
4. The multipath effects are highly variable due to wind.
Thus, when installing a WLL system, efforts should be made to avoid the pres-
ence of tree foliage within 60% of the first Fresnel zone for each subscriber. How-
ever, the presence of trees does not preclude communications, but means that
adequate countermeasures, such as forward error correction, are required.
R/Nbps
10 + (N - 1)1b/2
R/Nbps
Rbps Serial-to-
Parallel R/Nbps
Convertor
10 - (N - l)jb 12
Figure 11.11 Orthogonal Frequency Division Multiplexing
subcarriers is further modulated to a higher frequency band. For example, for the
IEEE 802.11a LAN standard, discussed in Chapter 14, the OFDM scheme con-
sists of a set of 52 subca~riers with a base frequency of 0.3125 MHz. This set of
subcarriers is then translated to the 5-GHz range for transmission.
OFDM has several advantages. First, frequency selective fading only affects
some subchannels and not the whole signal. If the data stream is protected by a
forward error-correcting code, this type of fading is easily handled. More impor-
tant, OFDM overcome intersymbol interference (lSI) in a multipath environment.
As discussed in Chapter 5, lSI has a greater impact at higher bit rates, because the
distance between bits, or symbols, is smaller. With OFDM, the data rate is reduced by
a factor of N, which increases the symbol time by a factor of N. Thus, if the symbol
period is T; for the source stream, the period for the OFDM signals is NT;. This
11.2/ \vIRElESS LOCAL LOOP 339
A
,, "'-,,
I " \
-
I
.-- I
'"
Q I
I
~ I
Q,/
'Q 0
=
.<::
Q..
e
<
-A
t-------1I(2tb) - - - - -
period = T = lItb
(a) Three subcarriers in time domain
S(n
dramatically reduces the effect of lSI. As a design criterion, N is chosen so that NTs is
significantly greater than the root-mean-square delay spread of the channel.
As a result of these considerations, with the use of OFDM, it may not be
necessary to deploy equalizers, which are complex devices whose complexity
increases with the number of symbols over which lSI is present.
A common modulation scheme used with OFDM is quadrature phase shift key-
ing (QPSK). In this case, each transmitted symbol represents two bits. An example of an
OFDMlQPSK scheme, used in a MMDS system [CISCOO], occupies 6 MHz made up of
512 individual carriers, with a carrier separation of a little under 12 kHz. To minimize
340 CHAPTER 11 / CORDLESS SYSTEMS AND \VIRELESS LOCAL LOOP
lSI, data are transmitted in bursts, with each burst consisting of a cyclic prefix followed
by data symbols. The cyclic prefix is used to absorb transients from previous bursts
caused by multipath. For this system, 64 symbols constitute the cyclic prefix, followed by
512 QPSK symbols per burst. On each subchannel, therefore, QPSK symbols are sepa-
rated by a prefix of duration 64/512 symbol times. In general, by the time the prefix is
over, the resulting waveform created by the combined multipath signals is not a func-
tion of any samples from the previous burst. Hence there is no lSI.
sight. MMDS can be used to support two-way services. MMDS is also used in other
countries for two-way access. Thus, MMDS is an alternative for broadband data
services, such as Internet access.
The principal disadvantage of MMDS, compared to LMDS, which we discuss
next, is that at the lower frequency of MMDS, it offers much less bandwidth than
LMDS. With current technology, a single MMDS channel can offer upstream (sub-
scriber to base station) transfer rates of 27 Mbps, with individual subscriber rates of 300
kbps to 3 Mbps [ORTIOO]. However, developments in OFDM may allow higher data
rates or more subscriber support for upstream MMDS. In any case, because of its lesser
bandwidth, MMDS is likely to be used mainly by residential subscribers and small busi-
nesses, whereas LMDS appeals to larger companies with greater bandwidth demands.
The advantages of MMDS over LMDS include the following:
1. MMDS signals have larger wavelengths (greater than 10 cm) and can travel
farther without losing significant power. Hence MMDS can operate in consid-
erably larger cells, thereby lowering base station equipment costs.
2. Equipment at lower frequencies is less expensive, yielding cost savings at both
the subscriber and base station.
3. MMDS signals don't get blocked as easily by objects and are less susceptible
to rain absorption.
." »
With the growing interest in LMDS WLL services, a need was recognized within the
industry to develop standards for this service. In response to this need the IEEE 802
committee set up the 802.16 working group in 1999 to develop broadband wireless
standards. The charter for the group is to develop standards that [MARK99]
• Use wireless links with microwave or millimeter wave radios
• Use licensed spectrum (typically)
• Are metropolitan in scale
• Provide public network service to fee-paying customers (typically)
• Use point-to-multipoint architecture with stationary rooftop or tower-mounted
antennas
• Provide efficient transport of heterogeneous traffic supporting quality of
service (QoS)
• Are capable of broadband transmissions (>2 Mbps)
In essence, IEEE 802.16 standardizes the air interface and related functions
associated with LMDS. As of this writing, standards have been developed in the
areas indicated in Table 11.9. In addition, an industry group, the WiMAX (World-
wide Interoperability for Microwave Access) Forum, has been formed to promote
the 802.16 standards and to develop interoperability specifications.
The work on 802.16 in Table 11.9 is the farthest along and is the one most likely
to generate the most industry interest, as it is targeted at available LMDS frequency
bands. In this section, we provide an overview of 802.16 architecture and services and
then look in more detail at the 802.16 specification. Finally, a summary of the 802.16a
standard is presented.
IEEE802.16c
IEEE 802.16e Physical and Medium Access Control Layers for Combined Fixed and
Mobile Operation in Licensed Bands
IEEE 802.16.2 Coexistence of Fixed Broadband Wireless Access Systems
11.3 /WIMAXAND IEEE 802.16 BROADBAND WIRELESS ACCESS STANDARDS 343
MAC delay
TBNI-l
E
Provi~ed
SNI~;n::;a<e
Subscriber Core I
terminal network I serVIce
Repeater
(optional)
service provides a communications path between a subscriber site, which may be either
a single subscriber device or a network on the subscriber's premises (e.g., a LAN, PBX,
IP-based network) and a core network (the network to which 802.16 is providing
access). Examples of a core network are the public telephone network and the Internet.
Three interfaces are defined in this model. IEEE 802.16 standards are concerned with
the air interface between the subscriber's transceiver station and the base transceiver
station. The standards specify all the details of that interface, as discussed subsequently
in this subsection. The system reference model also shows interfaces between the trans-
ceiver stations and the networks behind them (SNI and BNI). The details of these inter-
faces are beyond the scope of the 802.16 standards. The reason for showing these
interfaces in the system reference model is that the subscriber and core network tech-
nologies (such as voice,ATM, etc.) have an impact on the technologies used in the air
interface and the services provided by the transceiver stations over the air interface.
Finally, the system reference model includes the optional use of some sort of
repeater. The air interface specification allows for the possibility of repeaters or
reflectors to bypass obstructions and extend cell coverage.
Protocol Architecture Protocols defined specifically for wireless transmission
address issues relating to the transmission of blocks of data over the network. In
OSI terms, higher-layer protocols (layer 3 or 4 and above; see Figure 4.3) are inde-
pendent of network architecture and are applicable to a variety of networks and
communications interfaces. Thus, a discussion of 802.16 protocols is concerned with
lowest two layers of the OSI model.
Figure 11.14 relates the four protocol layers defined in the 802.16 protocol
architecture to the OSI model. Working from the bottom up, the lowest two layers
of the 802.16 protocol model correspond to the physical layer of the OSI model and
include such functions as
• Encoding/decoding of signals
• Preamble generation/removal (for synchronization)
• Bit transmission/reception
344 CHAPTER 11 / CORDLESS SYSTEMS AND WIRELESS LOCAL LOOP
Convergence
OSIdata
link layer
Medium access control
Transmission
OSI physical
layer
Physical
In addition, the physical layer of the 802 model includes a specification of the trans-
mission medium and the frequency band. Generally, this is considered "below" the
lowest layer of the OSI model. However, the choice of transmission medium and
frequency band is critical in wireless link design, and so a specification of the
medium is included. In general, the 802.16 physical layer is concerned with these
medium-dependent issues, and the transmission layer is concerned with the bulleted
items listed previously.
Above the physical and transmission layers are the functions associated with
providing service to subscribers. These include
• On transmission, assemble data into a frame with address and error detec-
tion fields.
• On reception, disassemble frame, and perform address recognition and error
detection.
• Govern access to the wireless transmission medium.
These functions are grouped into a medium access control (MAC) layer. The
protocol at this layer, between the base station and the subscriber station, is
responsible for sharing access to the radio channel. Specifically, the MAC protocol
defines how and when a base station or subscriber station may initiate transmis-
sion on the channel. Because some of the layers above the MAC layer, such
as ATM, require specified service levels (QoS), the MAC protocol must be able
to allocate radio channel capacity so as to satisfy service demands. In the
downstream direction (base station to subscriber stations), there is only one trans-
mitter and the MAC protocol is relatively simple. In the upstream direction, mul-
tiple subscriber stations are competing for access, resulting in a more complex
MAC protocol.
J 1.3 /WIMAX AND IEEE 802. J 6 BRO.WBANDWIRELESS ACCESS STANDARDS 345
Above the MAC layer is a convergence layer that provides functions specific
to the service being provided. A convergence layer protocol may do the following:
• Encapsulate PDU (protocol data unit) framing of upper layers into the native
802.16 MACIPHY frames.
• Map an upper layer's addresses into 802.16 addresses.
• Translate upper layer QoS parameters into native 802.16 MAC format.
• Adapt the time dependencies of the upper layer traffic into the equivalent
MAC service.
In some cases, such as digital audio and video, no convergence layer is needed
and the stream of digital data is presented to the transmission layer. Upper-layer
services that make use of a PDU structure do require a convergence layer.
An example of the protocol structure supported by the convergence layer is
the handling ofTCP/IP based traffic, as shown in Figure 11.15 (compare Figure 4.2).
Higher-level data are passed down to LLC (logical link control), which appends
control information as a header, creating an LLC protocol data unit (PDU). This
control information is used in the operation of the LLC protocol, which is a form of
data link control protocol (see Appendix C). The entire LLC PDU is then passed
down to the MAC layer, which appends control information at the front and back of
the packet, forming a MAC frame. Again, the control information in the frame is
needed for the operation of the MAC protocol. The figure shows the use of TCP/IP
and an application layer above the 802.16 protocols.
TCP layer
I
J
I1PI
~
LLC layer
I
I
I 1-_ _'------- _
I I
- - - - - - TCP segment - - - - - -
~.-------IP datagram - - - - - - - + -
..
Services
Requirements for the IEEE 802.16 standards are defined in terms of bearer services
that the 802.16 systems must support. A bearer service refers to the type of traffic
generated by a subscriber network or core network in Figure 11.13. For example, an
802.16 interface must be able to support the data rate and QoS required by an ATM
network or an IP-based network, or support the data rate and delay requirements of
voice or video transmissions.
IEEE 802.16 is designed to support the following bearer services:
Table 11.10 summarizes requirements in three categories. The first category is the
data rate that must be supported. The second category refers to error performance. For
11.3 /\VIMAXAND IEEE 802.16 BROADBAND WIRELESS ACCESS STANDARDS 347
most services an upper limit on the bit error ration (BER) is defined. For ATM, various
specific QoS error parameters are also used.
The final category is maximum one-way delay. To place this delay in context,
Figure 11.13 shows three categories of delay defined in the 802.16 standards:
• Medium access delay: Once a transceiver station is ready to transmit, the
medium access delay measures the amount of time that the station must wait
before it can transmit.
• Transit delay: This is the delay from SNI to BNI or BNI to SNI. It includes the
medium access delay plus the processing at the MAC layer for preparing
transmission (from the STS or BTS) and at the MAC layer for reception (at
the BTS or STS).
• End-to-end delay: The total delay between a terminal in the subscriber network,
to the ultimate service beyond the core network. This includes the transit delay.
The maximum one-way delay category specified in Table 11.10 refers to
transit delay.
348 CHAPTER II/CORDLESS SYSTEMS AND WIRELESS LOCAL LOOP
_MAC
_ _____
header ~
_ _ _ _ _.....CRC 1
Payload (optional)
EC
Connection identifier
HCS
I I I
EC I EKS
I Length
I I
I C0rn;tection ide~tifier, I I I I I
I I I I I I
~~IARQI
I I I I I
I I
FC
I FSN Grant management
HCS
I I I
Grant management
.
Unsolicited grant service
~
~,-_-,-_G...L:r_a_n_ts.....:p_e_r_inL-:t_er_v......~_l_-'-_
Unsolicited grant service
with activity detection
All others
1 10
Connection identifier
HT
=1 Bandwidth request
The downlink header format is shown III Figure 11.17a. It consists of the
following fields:
• Encryption control (1 bit): Indicates whether the payload is encrypted.
• Encryption key sequence (4 bits): An index into a vector of encryption key
information, to be used if the payload is encrypted.
• Length (11 bits): Length in bytes of the entire MAC frame.
350 CHAPTER II/CORDLESS SYSTEMS AND \,VIRELESS LOCAL LOOP
that a given number of bandwidth grants be executed in the next time interval. The
latter technique is used if this is a UGS with activity detection; this simply means
that the flow may become inactive for substantial periods of time. For other types of
service, the GM field may be used to make a request for capacity. This is referred to
as a piggyback request because the request is made as part of a MAC frame carrying
user data rather than in a separate bandwidth request management MAC frame.
Finally, the bandwidth request header is used by the subscriber to request
additional bandwidth. This header is for a MAC frame with no payload. The IS-bit
bandwidth request field indicates the number of bytes of capacity requested for
uplink transmission.
downlink channels.
e Ranging request and response: The request is used by the subscriber to deter-
mine network delay and to request power and/or modulation adjustment. The
response from the BS contains the requested parameters.
• Registration request, response, and acknowledge: The request is transmitted by
the subscriber at initialization time and contains various relevant parameters. The
base station replies with a response, and the subscriber sends an acknowledge to
complete the handshake.
• Privacy key management request and response: Used to exchange information
about encryption keys.
41 Dynamic service addition request, response, and acknowledge: The request is
For the burst downstream mode, the DAMA-TDMA scheme is used for chan-
nel access. Three alternative techniques are available for duplexing traffic between
upstream and downstream:
• FDD with adaptive modulation: This is the same FDD scheme used in the
upstream mode, but with a dynamic capability to change the modulation and
forward error correction schemes.
• Frequency shift division duplexing (FSDD): This is similar to FDD, but
some or all of the subscribers are not capable of transmitting and receiving
simultaneously.
• Time division duplexing (TDD): This technique is discussed in Section 11.1.
A TDMA frame is used, with part of the time allocated for upstream transmis-
sion and part for downstream transmission.
The availability of these alternative techniques provides considerable flexibil-
ity in designing a system that optimizes the use of capacity.
IEEE 802.16a
The initial version of the 802.16 standard, ratified in 2002 and referred to simply as
IEEE 802.16, operates in the 10-to-66-GHz frequency band and requires line-of-
sight antennas. The IEEE 802.16a standard, ratified in 2003, does not require line-
of-sight transmission and allows use of lower frequencies (2 to 11 GHz), many of
which are unregulated. IEEE 802.16a can achieve a range of 50 km and data rates of
over 70 Mbps.
IEEE 802.16a provides a new physical layer standard with some modifica-
tions to the 802.16 MAC layer. Compared to the higher frequencies, the 2-to-
ll-GHz range offers the opportunity to reach many more customers less
expensively, though at generally lower data rates. This suggests that such services
will be oriented toward individual homes or small- to medium-sized enterprises.
Design of the 2-to-11-GHz physical layer is driven by the need for non-line-of-
sight (NLOS) operation. This is essential to support residential applications since
rooftops may be too low for a clear sight line to a BS antenna, possibly due to
obstruction by trees. Therefore, significant multipath propagation must be
expected. Furthermore, outdoor mounted antennas are expensive due to both
hardware and installation costs. The 802.16a standard specifies that systems
implement one of three air interface specifications, each of which provides for
interoperability:
• WirelessMAN-SCa: This uses a single-carrier modulation format.
e WirelessMAN-OFDM: This uses orthogonal frequency division multiplexing
with a 256-point transform. Access is by TDMA.
• WirelessMAN-OFDMA: This uses orthogonal frequency division multiple
access with a 2048-point transform. In this system, multiple access is provided
by addressing a subset of the multiple carriers to individual receivers
Because of the propagation requirements, the use of advanced antenna sys-
tems is supported. To accommodate the more demanding physical environment and
354 CHAPTER 11 / COIU)LESS SYSTEMS AND WIRELESS LOCAL LOOP
BOLCOI Bolcskei, H., et al. "Fixed Broadband Wireless Access: State of the Art,
Challenges, and Future Directions." IEEE Communications Magazine, January
2001.
DALK96 Dalke, R.; Hufford, G.; and Ketchum, R. Radio Propagation Considerations for
Local Multipoint Distribution Systems. National Telecommunications and Informa-
tion Administration Publication PB97116511, August 1996.
EKLU02 Eklund, c., et al. "IEEE Standard 802.16: A Technical Overview of the Wire-
lessMAN Air Interface for Broadband Wireless Access." IEEE Communications
Magazine, June 2002.
FREE97 Freeman, R. Radio System Design for Telecommunications. New York: Wiley, 1997.
FUNG98 Fung, P. "A Primer on MMDS Technology." Communication Systems Design,
April 1998. Available at www.commsdesign.com.
JOHN04 Johnston, D., and Yaghoobi, H. "Peering into the WiMAX Spec." Communica~
tions System Design, January 2004. Available at www.commsdesign.com.
11.5/ KEY TERMS, REVIEW QUESTIONS,AND PROBLEMS 355
Key TenTIs
Revie-w Questions
11.1 In what ways has traditional cordless telephony been extended by standardization?
11.2 What is the difference between TDD and TDM?
11.3 List and briefly define the DECT logical channels.
11.4 What are some key advantages of WLL over a wired subscriber loop?
11.5 What are the principal advantages of millimeter wave transmission compared to
transmission at longer wavelengths?
11.6 What are the principal disadvantages of millimeter wave transmission compared to
transmission at longer wavelengths?
11.7 What are the principal advantages of OFDM?
11.8 What are the relative advantages of MMDS compared to LMDS?
11.9 What are the key differences among IEEE 802.16, IEEE 802.16.2, and IEEE 802.16.3?
ProbleU1S
11.1 GSM, described in Chapter 10, makes use of a TDMA scheme in which there are a
number of duplex channels, with each channel consisting of two dedicated frequency
bands, one for transmission in each direction. Suppose that we wished to design a
comparable system, using the same total amount of bandwidth, but using TDD. List
the key parameters of a TDD-GSM system and compares these to the real GSM
parameters.
11.2 A LOS microwave link 12 km long is planned for installation in Germany, which is in
climate zone H (Table 11.7). The operational frequency is 38 GHz and the desired
time availability is 99.99%. Local rain rate statistics are not available. The antenna
polarization is horizontal.
a. What amount of attenuation is to be anticipated?
b. Repeat for 99.9% and 99% and comment on the practicality of the requirement
for various availabilities.
The linear predictive filter is based on using an approximation of the Taylor series. For a funCtion
get) that has derivatives of all orders at t, the function can be represented by its Taylor series:
g(x) = :L 00 (x -
n=O n.
, tt
g(n)(t) (11.4)
where g(n)(t) is the nth derivative of get). Now, suppose we are going to sample get) with a
sampling interval of T s. Then, defining T s = x - t, we can restate Equation (11.4) as
oo(TY
get + T s ) = :L _ s , g(n)(t) (11.5)
n.
n=O
Equation (11.5) shows that the value of the signal at time t + Ts can be predicted from
the value of its signal and its derivatives at time t. In fact, for small values of Ts (much less
than one), we can produce a good approximation with just the first derivative:
(11.6)
)
APPENDIX l1A I UNEAR PREDICTIVE FILTERS 357
Let us denote the kth sample of get) taken at time t = kTs as m(k); then
m(k ± 1) = g(kTs ± Ts). Further, we can approximateg'(kTs) by [g(kTs) - g(kTs - Ts)]/Ts'
Therefore, from Equation (11.6), we have
m (k + 1) ~ m (k) + T s [
m(k) - m(k -
T
1)]
s
= 2m(k) - m(k - 1)
Thus, we can compute an approximate predication of the sample at (k + 1) from the
preceding two samples. The approximation improves as we add more samples. If N samples
are used, the approximation formula becomes:
(11.7)
The right hand side of Equation (11.7) is m(k), the predicted value of m(k). Thus,
(11.8)
This is the linear predictor illustrated in Figure 11.5. The prediction coefficients Ai are
determined from the statistical properties of the samples.