• Non ci sono risultati.

1. Table of Contents

N/A
N/A
Protected

Academic year: 2021

Condividi "1. Table of Contents"

Copied!
4
0
0

Testo completo

(1)

1. Table of Contents

1. Table of Contents…………....……….. 2

2. Introduction………... 6

3. Standard IEEE 802.16………... 8

3.1 MAC (Medium Access Control)……….. 10

3.1.1 Service-specific CS………... 11

3.1.2 MAC SDU Formats……….……. 11

3.1.3 MAC Header………. 12

3.1.4 MAC PDU Formats……….. 14

3.2 MAC Common Part Sublayer………..…... 17

3.2.1 PMP (Point-to-MultiPoint)……… 17

3.2.2 MESH Networks………... 23

3.3 MAC Management messages……….. 25

3.3.1 MSH-NCFG Message………... 28

3.3.2 MSH-DSCH Message………... 30

3.4 Scheduling Services………. 35

3.5 Physical Layer for Mesh Networks………. 37

3.6 WirelessMAN-OFDM PHY……… 45

3.7 Data Modulation……….. 46

3.8 Preamble Structure and Modulation……… 47

4. Mesh Networks……….. 48

4.1 Techniques for Implementing Wireless Mesh Networks……… 52

4.1.1 IEEE 802.15.5………... 52

4.1.2 IEEE 802.11s……… 52

4.1.3 IEEE 802.16a……….... 52

4.1.4 IEEE 802.20……….. 53

4.2 Scalability of the Network Architecture and Protocols………... 54

4.3 Roofnet: Mesh Network Example ……….. 56

(2)

5. Resource Reservation in Wired Networks……… 57

5.1 RSVP (ReSerVation Protocol)……….... 57

5.1.1 Protocol Overview………. 58

5.1.2 RSVP Data Flows……….. 58

5.1.3 RSVP Data Flows Process……… 59

5.1.4 Quality of Service (QoS)………... 59

5.1.5 Session Startup……….. 59

5.1.6 Soft State Implementation………. 60

5.1.7 Operational Model.……… 60

5.1.8 RSVP Tunneling……… 61

5.1.9 RSVP Messages……… 62

5.1.10 Packet Format……… 63

6. Resource reservation in wireless networks………... 66

6.1 DARE (Distributed end-to-end Allocation of time slots for REal-time traffic)……….. 66

7. EBRP (End-to-end Bandwidth Reservation Protocol)……….. 71

7.1 EBRP Message……… 73

7.1.1 Path Message………. 73

7.1.2 Reservation Message………. 73

7.1.3 Confirmation Message………... 73

7.2 EBRP Benefits………. 74

7.3 Soft State Behavior...………. 75

7.3.1 Moving of the Terminal.………... 75

7.3.2 Breaking of the Link or Node……… 76

8. Resource allocation………... 78

8.1 Building of the Groups………... 80

8.1.1 Heuristic Algorithm Example……… 81

8.2 Comparison among Heuristic and Optimum Algorithm……… 82

8.2.1 Grid……… 82

8.2.2 Multiring……… 84

8.2.3 Bintree………... 85

(3)

8.2.4 Conclusion about Comparison among Heuristic and Optimum

Algorithm……….. 86

8.3 CAC (Call Admission Control)………... 87

9. Signalling……….. 91 9.1 First Phase………..… 91 9.2 Second Phase………... 92 9.3 Confirmation……… 92 9.4 Timeouts……….. 93 9.5 Dummy Packets………... 96 10. Global Example………..……….. 97

11. WiMAX Module for ns-2 Simulator………. 114

11.1 Packets………. 114 11.2 Physical Layer………..………... 118 11.3 MAC Layer………..………... 120 11.4 Topology……….. 127 11.5 Scheduler………. 129 11.6 Bandwidth Manager……… 132 12. Performance evaluation………. 150 12.1 Gateways on Vertices……….. 154 12.1.1 First Scenario………... 157 12.1.2 Second Scenario………... 162 12.1.3 Third Scenario………. 169 12.1.4 Fourth Scenario……….. 172 12.1.5 Fifth Scenario………... 178 12.2 Gateway on Center………... 184 12.2.1 First Scenario………... 186 12.2.2 Second Scenario………... 189 12.2.3 Third Scenario………. 192 13. Conclusions………... 195 4

(4)

14. References………...…….. 196

Riferimenti

Documenti correlati

I use these ideas to discuss the possibility that the European Central Bank (ECB) might contribute to the construction of a common European identity. Thus, my aim is to

iv. Potentially explosive atmospheres. The information referred to in points 1, 2 and 3 shall be durably marked on or near the motors nameplate. The information listed in points

The correct definition for the e-dimensional Hausdorff measure is defining it first for “basic e-rectifiable sets” (see Definition 3.9) via (1), and then extending it to definable

Like Buono, Lautsi involves assertions about Italian history and culture that underwrite the defense of the classroom crucifix displays: The ordinary Catholic meaning of the

Indeed, across the time period of the revision project the Board used different argumentations to sustain its decisions: in December 2005 the IASB affirmed the need to be

Firstly closely subdued by Great Britain and later largely conditioned by United States, Australia’s foreign policy attained some degree of independence when it was expanded to

It is an ethnography because I went deep into the culture of a people that belong to an autochtonous minority, or better, an accidental diaspora, and it is a case study about

Following the definition given by professor Liemer in her article On the Origins of le Droit Moral: How non-economics Rights came to be protected in French IP Law (2011, p. 69) the