You are on page 1of 5

International Journal of P2P Network Trends and Technology (IJPTT) - Volume3 Issue4- May 2013

Introduction to the Wimax and Its Related Issues and Its


Comparison with Wi-Fi

Puram Ashok, pulipati manas, Rayala Ravi Kumar

Students of K L University, Associate Professor of K L University,

Department of ECE, Vaddeswaram, India.

ABSTRACT: One of the developing technologies in the recent times which are not yet fully implemented and
which requires a lot of research work is WIMAX which was proposed for a goal of bringing the usage of broadband
till the LAST MILE. A lot of concerns and issues regarding this technology and this paper will mainly discuss
about the basics and types of WIMAX and also deals with some of questions regarding the safety in using WIMAX.
This paper is focused on description of static wimax and mobile wimax and also describes about the handover
policies which is the major advantage in mobile wimax in addition to the major drawbacks in this issue and some
comparisons are made with WIFI.

Keywords:Fixed wimax,Mobile wimax,Handover,Backhaul

NEED FOR WIMAX: INTRODUCTION:

In recent years, Broadband technology has been World wide Interoperability for Microwave access
required by a high percentage of the people. In the which is referred to as WIMAX. It can provide a low-
recent years , the demand has risen rapidly .DSL cost, locally managed, wireless metropolitan area
operators, who initially focused their deployments in network (MAN) infrastructure with capabilities that
densely-populated urban areas, now wimax can equal or surpass those of 3G/3G+/4G public
technology is available forsuburban and rural areas wireless networks.
where new markets are quickly taking root. The DSL
market, which is based on the wire line infrastructure WiMAX networks can be deployed for temporary or
, can provide this service to the millions of business permanent use and can be much more easily isolated
subscribers and private subscribers and havind a huge from large-scale failures in the electric power or
growth rate. But supplying the quick rollout of telephone grids. WiMAX is a MAC and physical
infrastructure to the last mile has become a difficult layer wireless communications technology. WiMAX
and expensive challenge for carriers who cannot was designed to provide outdoor broadband wireless
possibly keep pace with the demand.This made the access .The set of standards that define WiMAX are
subscibers provide this technology only to the urban developed and maintained by the IEEE 802.16.
areas with broadband ready infrastructure have the Theoretically IEEE 802.16 can provide single
benefits of DSl services they do not require any channel data rates up to 75 Mbps on both the Uplink
technology to fill the void .The introduction of the and downlink..Two major variants of WiMAX have
new WiMAX standard - fits this agenda perfectly. emerged: 802.16d standard supports fixed or slowly
moving users; 802.16e standard supports mobile
users. There is non line of sight, WiFi sort of service,
a small antenna on your computer connects to tower.
In this mode, It uses a lower frequency range - 2GHz

ISSN: 2249-2615 http://www.ijpttjournal.org Page 218


International Journal of P2P Network Trends and Technology (IJPTT) - Volume3 Issue4- May 2013

to 11GHz . They can able to diffract, bend around the Orthogonal Frequency Division
obstacles. Multiplexing(OFDM).The fixed wimax can support
both Frequency Division Duplexing and Time
There is a line-of-sight service, a fixed dish antenna Division Duplexing.
points straight towards at the WiMAX tower from a
rooftop. It is stronger and more stable, so it can able CHALLENGES IN FIXED WIMAX:
to send a lot of data with few errors. Line-of-sight
transmissions uses higher frequencies with ranges 1.The communication will be taking place between
reaching 66 GHz. At the higher frequencies, there is WIMAX CPE and NLOS(Non Line Of Sight)
possible of less interference and lot more of basestation and so the requirements for the link
bandwidth. security are greater than those required for a wireless
technology
WiFi access is to 4 to 6 mile of radius.
2.Another challenge is setting up high performance
radio links which are capable of providing data rates
comparable to wired broadband service, using
BASIC OPERATION AND REQUIREMENT equipment that can self installed indoors by users,
FOR WIMAX: like that of Digital Subscriber Line (DSL) and cable
modems so as to increase the data rate in non line of
Typical point to multipoint Broadband Wireless sight environment.
Access (BWA) systems are composed of two key
elements: base station and subscriber equipment. The
base station connects to network backbone and uses
an outdoor antenna to send and receive high-speed MOBILE WIMAX: Based on IEEE 802.16e
data and voice to subscriber equipment, thereby standard, this type of wimax is used to provide the
eliminating the need of extensive and expensive internet acess to vehicular class, where the user can
wireline infrastructure and providing highly flexible move from one location to another location which
and cost-effective last-mile solutions. uses base station hand off techniques, the major
advantage of mobile wimax when compared with
A wimax base station serves subscriber stations using fixed wimax.
Non-Line-of-Sight (NLOS) or LOS Point-to-Multi-
Point connectivity; and this connection is referred to It uses a low frequency of 2-11 GHz.It is based on
as the last mile communication. Ideally, Wimax Orthogonal Frequency Division Multiple
(802.16) should use NLOS Point-to-Multi-Point Acess(OFDMA) and mainly uses Time Division
antennas to connect residential or business Duplexing Mode(TDD).
subscribers to the Wimax Base Station (BS). A
Subscriber Station (Wimax CPE-Customer Premise
Equipment)typically serves a building using wired or
wireless LAN. HANDOVER TYPES: The basic role of WiMAX
handover is to provide the continuous connection
when a Mobile Station (MS) migrates from the
coverage area of one BS to the coverage area of
TYPES OF WIMAX: another BS.In the IEEE 802.16e ,three types of
handover are described:
The WIMAX has been classified into two types-
FIXED and STATIC WIMAX. 1. Hard handover,

FIXED WIMAX: Based on IEEE 802.16d standard, 2. Macro Diversity Handover (MDHO) and
this type of wimax is used for point to point data
transformation, generally when the user is stable or 3. Fast Base Station Switching (FBSS).
when there is a minimum movement for example
within a room in the house. This fixed wimax uses

ISSN: 2249-2615 http://www.ijpttjournal.org Page 219


International Journal of P2P Network Trends and Technology (IJPTT) - Volume3 Issue4- May 2013

Hard handover is mandatory in WiMAX systems. simultaneous low data transmission to various users
Other two types of handover are optional. is known as OFDMA. Its main advantage is the low
data rate transmission for several users and also the
Hard Handover: delay will be reduced and it will be maintained
constant. This type of technique will be used in
During hard handover the MS communicates with Mobile WIMAX.
only just one BS in each time. Connection with the
old BS is broken before the new connection is SECURITY ISSUES:
established. Handover is executed after the signal
strength from the neighbors cell is exceeding the As we all know that the security concerns are more in
signal strength from the current cell. wireless technologies when compared with wired
technologies. The security issues can be classified
TERMINOLOGY IN WIMAX: under two categories where the first one relates to the
user and other relating to the service provider.
FREQUENCY DIVISION DUPLEXING(FDD):
Transmission and receiving of signal from base Issues relating to user: Eavesdropping and data
station and subscriber station will take place in destruction are the two major issues related to the end
different channels. user. Each layer handles different aspects of security
and the data encryption must be taken place at the
TIME DIVISION DUPLEXING(TDD): Unlike in link layer so as to provide a security from
FDD, instead of two different channels which are eavesdropping.
used by FDD for transmitting and receiving signals,
only one channel is used for both. Issues relating to the service provider: Authentication
and access control are the two major security issues
BACKHAUL: Interconnection of one base station in wimax relating to the service provider.
with another base station with the help of microwave Unauthorized access should be prevented by the
links which enables the roaming feature for wimax service provider and it can be implemented at various
levels of network such as physical layer etc in order
user from one base station coverage to another just
to avoid any inconvenience to the users. At the
like in the case of cellular roaming is known as
transport layer Secure Sockets layer (SSL) may be
backhaul.
used to add security to transport layer protocols and
packets.
ORTHOGONAL FREQUENCY DIVISION
MULTIPLEXING(OFDM): This technology is
generally used for facing the challenges that are PROTOCCOLS USED IN WIMAX:
present in the non line of sight transmission where it
uses a large number of sub carriers to carry the data 1.RADIUS(Remote Authentication Dial-In User
on several parallel channels. It uses mainly slow Service): It is client/server protocol used in the link
modulated narrow band signals instead of rapidly layer where the remote access servers communicate
modulated wideband signal. The low symbol rate with the central server so as to check and verify the
gives the added advantage of eliminating the Inter authentication of that particular user and if the user is
Symbol Interface(ISI). Channel equalization is eligible to access the requested service or not. This
simplified because OFDM uses many slowly consists of a central database where it has the details
modulated narrowband signals rather than one of all the users and it can be shared by the remote
rapidly modulated wideband signal. As a result this servers.The RADIUS server returns one of three
method is mainly preferred in the Fixed Wimax. responses to the RAS : 1) Access Reject , 2) Access
Challenge, 3) Access Accept.
ORTHOGONAL FREQUENCY DIVISION
MULTIPLE ACCESS(OFDMA): Achieving Access Reject -- The user is unconditionally denied
multiple access to the above discussed OFDM access to all requested network resources.
technique is known as OFDMA. It is a multi user
version which can be achieved by subsets of
subcarriers to individual users in order to get

ISSN: 2249-2615 http://www.ijpttjournal.org Page 220


International Journal of P2P Network Trends and Technology (IJPTT) - Volume3 Issue4- May 2013

Access Challenge -- Requests additional information 4. Extensible Authentication Protocol(EAP):


from the user such as a secondary password, PIN,
token, or card. EAP authentication potocol is used in wireless and
point to point protocol connections. During the link
Access Accept -- The user is granted access. Once establishment phase of the PPP connection specific
the user is authenticated, the Remote Authentication authentication mechanism is not chosen with this
Dial-In User Service(RADIUS) server will check that EAP .Instead of this during the connection
the user is authorized to use network service authentication phase the PPP peers negotiate to
requested. perform EAP. When the connection authentication
phase is reached, the peers negotiate the use of
2.Secure Socket Layer(SSL): This protocol is specific EAP authentication scheme known as an
mainly used in the transport layer regarding the EAP method. By using a supplicant --a software
management of security in the message transmission component, the EAP peer and the EAP authenticator
on the internet. SSL has recently succeeded by send EAP messages supplicant uses EAP to
TLS(Transport Layer Security).SSL uses a program authenticate network access and a data link layer
layer located between the Internet's Hypertext transport protocol such as PPP. The authentication
Transfer Protocol (HTTP) and (TCP)Transport server and the EAP authenticator send EAP messages
Control Protocol layers. SSL uses public and private using Remote Authentication Dial-In User Service
key encryption system from the RSA, which also (RADIUS). The end result EAP messages are
includes the use of digital certificate. Digital exchanged between EAP components on the EAP
certificate are implemented at application layer which peer and the authentication server. EAP infrastructure
is depending on the network sensitivity. TLS and is as shown in figure
SSL are an integral part of most Web browsers and
the Web servers. If a Website is on a server that
supports Secure socket layer , SSL can be enabled
and specific Web pages can be identified as requiring
SSL access.

3.Privacy Key Management(PKM): The PKM


protocol will be used in WIMAX between the
customer premise equipment(CPE) and the base
station(BS). The CPE will act as a client requesting
the keying material to the base station which acts as a
server and acts according to the requests made from
the CPE and allows only the requested keying
material to be reached to the CPE and also sees that
the CPE receives only the keying material for which ADVANTAGES OF WIMAX :
they are authorized. The Privacy Key Management
(PKM) Protocol first creates an Authorization Key Coverage:
(AK), which is a secret symmetric key shared
between the Wimax CPE (Customer Premise It can provide coverage to hundreds of users at a time
Equipment) and BS. This protocol uses X.059 digital and can manage of receiving and sending of data at
certificates which is send by CPE to the BS. The BS very high speed with full of network security.
then authenticates the syntax and information and
validates the certificate, if properly verified ,it will
encrypt the Authorization Key (AK). High Speed:

Since only the Wimax CPE device contains the The High speed voice and high speed of connectivity
matching private key, only that Wimax CPE device over the long distances makes it more demanded in
can de-crypt the message and obtain the AK assigned urban and rural areas.
to it.

ISSN: 2249-2615 http://www.ijpttjournal.org Page 221


International Journal of P2P Network Trends and Technology (IJPTT) - Volume3 Issue4- May 2013

Wi-Fi is intended for LAN applications, scale from


Multi-functionality within the Wimax one to tens with one subscriber, for the each CPE
Technology: device. Fixed channel sizes (20MHz).

It can perform a variety of task at a time such as WiMAX can efficiently support from one to
video streaming and offering high speed internet hundreds of Consumer premises equipments (CPE),
voice application, transformation of data, providing with the unlimited subscribers behind each consumer
telephone service, etc. premises equipments(CPE). Flexible channel sizes
are from 1.5MHz to 20MHz.
DIADVANTAGES:
Bit rate:
1.Lack of Quality
Wi-Fi works at 2.7 bps/Hz and peak up to 54 Mbps in
It is difficult to provide high quality to each and 20 MHz channel.But WiMAX works at 5 bps/Hz and
every user because they can access from the same peak up to 100 Mbps in 20 MHz channel.
tower.
Quality of Service:
2.Expensive network
Wi-Fi does not guarantee any Quality of service but
Its installation and operational cost are more and due WiMax will provide several level of QoS.WiMAX
to heavy structure, tower and antennas makes the provides ubiquitous broadband while Wi-Fi does not.
Wimax network high cost network.
Reference:

3.Bad Weather [1] WiMAX taking wireless to the MAX by Deepak


Pareek
The quality of this wimax services varies in rainy
season because of the weather condition interrupt the [2] WiMAX a wireless technology revolution by
signal which causes bad signal and broadcasting may G.S.V.Radha Krishna Rao
stops
[3] Internet (Google and Wikipedia).
COMPARISION BETWEEN WIMAX AND WI-
FI:

IEEE Standards:

WiMAX technology is based on IEEE 802.16 and


Wi-Fi is based on IEEE 802.11 standard Both are
IEEE standards.

Range:

Wi-Fi provides local network access for a few


hundred feet with speeds of 54 Mbps, But WiMAX
antenna is expected to have a range of 40 miles with
speed of 70 Mbps.

Scalability:

ISSN: 2249-2615 http://www.ijpttjournal.org Page 222

You might also like