1. Table of Contents
1. Table of Contents…………....……….. 2
2. Introduction………... 6
3. Standard IEEE 802.16………... 8
3.1 MAC (Medium Access Control)……….. 10
3.1.1 Service-specific CS………... 11
3.1.2 MAC SDU Formats……….……. 11
3.1.3 MAC Header………. 12
3.1.4 MAC PDU Formats……….. 14
3.2 MAC Common Part Sublayer………..…... 17
3.2.1 PMP (Point-to-MultiPoint)……… 17
3.2.2 MESH Networks………... 23
3.3 MAC Management messages……….. 25
3.3.1 MSH-NCFG Message………... 28
3.3.2 MSH-DSCH Message………... 30
3.4 Scheduling Services………. 35
3.5 Physical Layer for Mesh Networks………. 37
3.6 WirelessMAN-OFDM PHY……… 45
3.7 Data Modulation……….. 46
3.8 Preamble Structure and Modulation……… 47
4. Mesh Networks……….. 48
4.1 Techniques for Implementing Wireless Mesh Networks……… 52
4.1.1 IEEE 802.15.5………... 52
4.1.2 IEEE 802.11s……… 52
4.1.3 IEEE 802.16a……….... 52
4.1.4 IEEE 802.20……….. 53
4.2 Scalability of the Network Architecture and Protocols………... 54
4.3 Roofnet: Mesh Network Example ……….. 56
5. Resource Reservation in Wired Networks……… 57
5.1 RSVP (ReSerVation Protocol)……….... 57
5.1.1 Protocol Overview………. 58
5.1.2 RSVP Data Flows……….. 58
5.1.3 RSVP Data Flows Process……… 59
5.1.4 Quality of Service (QoS)………... 59
5.1.5 Session Startup……….. 59
5.1.6 Soft State Implementation………. 60
5.1.7 Operational Model.……… 60
5.1.8 RSVP Tunneling……… 61
5.1.9 RSVP Messages……… 62
5.1.10 Packet Format……… 63
6. Resource reservation in wireless networks………... 66
6.1 DARE (Distributed end-to-end Allocation of time slots for REal-time traffic)……….. 66
7. EBRP (End-to-end Bandwidth Reservation Protocol)……….. 71
7.1 EBRP Message……… 73
7.1.1 Path Message………. 73
7.1.2 Reservation Message………. 73
7.1.3 Confirmation Message………... 73
7.2 EBRP Benefits………. 74
7.3 Soft State Behavior...………. 75
7.3.1 Moving of the Terminal.………... 75
7.3.2 Breaking of the Link or Node……… 76
8. Resource allocation………... 78
8.1 Building of the Groups………... 80
8.1.1 Heuristic Algorithm Example……… 81
8.2 Comparison among Heuristic and Optimum Algorithm……… 82
8.2.1 Grid……… 82
8.2.2 Multiring……… 84
8.2.3 Bintree………... 85
8.2.4 Conclusion about Comparison among Heuristic and Optimum
Algorithm……….. 86
8.3 CAC (Call Admission Control)………... 87
9. Signalling……….. 91 9.1 First Phase………..… 91 9.2 Second Phase………... 92 9.3 Confirmation……… 92 9.4 Timeouts……….. 93 9.5 Dummy Packets………... 96 10. Global Example………..……….. 97
11. WiMAX Module for ns-2 Simulator………. 114
11.1 Packets………. 114 11.2 Physical Layer………..………... 118 11.3 MAC Layer………..………... 120 11.4 Topology……….. 127 11.5 Scheduler………. 129 11.6 Bandwidth Manager……… 132 12. Performance evaluation………. 150 12.1 Gateways on Vertices……….. 154 12.1.1 First Scenario………... 157 12.1.2 Second Scenario………... 162 12.1.3 Third Scenario………. 169 12.1.4 Fourth Scenario……….. 172 12.1.5 Fifth Scenario………... 178 12.2 Gateway on Center………... 184 12.2.1 First Scenario………... 186 12.2.2 Second Scenario………... 189 12.2.3 Third Scenario………. 192 13. Conclusions………... 195 4
14. References………...…….. 196